Microprocessor
Microprocessor
3. What is the order decided by a processor or the CPU of a controller to execute an instruction?
a) decode,fetch,execute
b) execute,fetch,decode
c) fetch,execute,decode
d) fetch,decode,execute
Answer: d
Explanation: First instruction is fetched from Program Memory. After fetching, instruction is decoded to generate co
ntrol signals to perform the intended task. After decoding, instruction is executed and the complete intended task of t
hat particular instruction.
a) Data Bus
b) ALU
c) Control Bus
d) Address Bus
Answer: b
Explanation: If we say a microcontroller is 8-bit it means that it is capable of processing 8-bit data at a time. Data pr
ocessing is the task of ALU and if ALU is able to process 8-bit data then the data bus should be 8-bit wide. In most
books it tells that size of data bus but to be precise it is the size of ALU because in Harvard Architecture there are tw
o sets of data bus which can be of same size but it is not mandatory.
5. How are the performance and the computer capability affected by increasing its internal bus width?
7. Give the names of the buses present in a controller for transferring data from one place to another?
8. What is the file extension that is loaded in a microcontroller for executing any instruction?
a) .doc
b) .c
c) .txt
d) .hex
Answer: d
Explanation: Microcontrollers are loaded with .hex extension as they understand the language of 0’s and 1’s only.
9. What is the most appropriate criterion for choosing the right microcontroller of our choice?
a) speed
b) availability
c) ease with the product
d) all of the mentioned
Answer: d
Explanation: For choosing the right microcontroller for our product we must consider its speed so that the instructio
ns may be executed in the least possible time. It also depends on the availability so that the particular product may b
e available in our neighboring regions or market in our need. It also depends on the compatibility with the product s
o that the best results may be obtained.
1. How many types of architectures are available, for designing a device that is able to work on its own?
a) 3
b) 2
c) 1
d) 4
Answer: b
Explanation: There are basically two main types of architectures present, they are Von Neumann and Harvard archit
ectures.
a) Harvard architecture
b) Von Neumann architecture
c) None of the mentioned
d) All of the mentioned
Answer: b
Explanation: General purpose microprocessors make use of Von Neumann architecture as here a simpler design is of
fered.
3. Which architecture involves both the volatile and the non volatile memory?
a) Harvard architecture
b) Von Neumann architecture
c) None of the mentioned
d) All of the mentioned
Answer: a
Explanation: In Harvard architecture, both the volatile and the non volatile memories are involved. This is done to in
crease its efficiency as both the memories are being used over here.
4. Which architecture provides separate buses for program and data memory?
a) Harvard architecture
b) Von Neumann architecture
c) None of the mentioned
d) All of the mentioned
Answer: a
Explanation: Harvard Architecture provides separated buses for data and program memory to fetch program and dat
a simultaneously. By doing this access time is reduced and hence performance is increased.
a) ARM7
b) Pentium
c) SHARC
d) All of the mentioned
Answer: c
Explanation: SHARC supports harvard architecture for signal processing in DSP.
a) ARM7
b) ARM9
c) SHARC
d) None of the mentioned
Answer: c
Explanation: SHARC supports both the CISC and the Harvard architecture.
a) Harvard
b) Von Neumann
c) Harvard & Von Neumann
d) None of the mentioned
Answer: b
Explanation: As only one memory is present in the Von Neumann architecture so it saves a lot of memory.
a) Atmel
b) Philips
c) Intel
d) All of the mentioned
Answer: d
Explanation: 8051 microcontrollers are manufactured by Intel, Atmel, Philips/Signetics, Infineon, Dallas Semi/Maxi
m.
a) 128 bytes
b) 256 bytes
c) 64 bytes
d) 512 bytes
Answer: a
Explanation: It has 128 bytes of RAM in it.
a) 2
b) 3
c) 1
d) 0
Answer: a
Explanation: It has two 16 bit registers DPTR and PC.
a) PSW
b) SP
c) PC
d) None of the mentioned
Answer: c
Explanation: When 8051 wakes up, Program Counter (P
c) loaded with 0000H. Because of this in 8051 first opcode is stored in ROM address at 0000H.
5. When the microcontroller executes some arithmetic operations, then the flag bits of which register are affected?
a) PSW
b) SP
c) DPTR
d) PC
Answer: a
Explanation: It stands for program status word. It consists of carry, auxiliary carry, overflow, parity, register bank se
lect bits etc which are affected during such operations.
6. How are the status of the carry, auxiliary carry and parity flag affected if the write instruction
a) CY=0,AC=0,P=0
b) CY=1,AC=1,P=0
c) CY=0,AC=1,P=0
d) CY=1,AC=1,P=1
Answer: b
Explanation: On adding 9C and 64, a carry is generated from D3 and from the D7 bit so CY and AC are set to 1. In t
he result, the number of 1’s present are even so parity flag is set to zero.
7. How are the bits of the register PSW affected if we select Bank2 of 8051?
9. On power up, the 8051 uses which RAM locations for register R0- R7
a) 00-2F
b) 00-07
c) 00-7F
d) 00-0F
Answer: b
Explanation: On power up register bank 0 is selected which has memory address from 00H-07H.
10. How many bytes of bit addressable memory is present in 8051 based microcontrollers?
a) 8 bytes
b) 32 bytes
c) 16 bytes
d) 128 bytes
Answer: c
Explanation: 8051 microcontrollers have 16 bytes of bit addressable memory.
a) 2
b) 3
c) 1
d) Can’t be determined
Answer: a
Explanation: DJNZ is 2-byte instruction. This means jump can be of -128 to +127 locations with respect to PC. Here
-128 means upward or backward jump and +127 means downward or forward jump.
a) DPTR
b) B
c) A
d) PSW
Answer: c
Explanation: JZ and JNZ instructions checked the content of A register and if condition was satisfied or true then ju
mp to target address.
3. Calculate the jump code for again and here if code starts at 0000H
a) F3,02
b) F9,01
c) E9,01
d) E3,02
Answer: c
Explanation: Loop address is calculated by subtracting destination address and the address next to the source address
.
4. When the call instruction is executed the topmost element of stack comes out to be
a) 2 bytes
b) 4 bytes
c) 3 bytes
d) 1 byte
Answer: c
Explanation: LCALL instruction moves the pointer to a 16 bit address so it is a 3 byte instruction.
a) yes
b) no
c) none of the mentioned
d) cant be determined
Answer: b
Explanation: PUSH and POP instructions are not CALL instructions because in POP and PUSH instructions the poi
nter does not move to any location specified by its address which is the fundamental of CALL instruction, so it is no
t a type of CALL instruction.
7. What is the time taken by one machine cycle if crystal frequency is 20MHz?
a) yes
b) no
c) cant be determined
d) yes and the second one is preferred
Answer: b
Explanation: In the first statement, when the decrements approach zero then the jump moves back and in the second
statement, when the result after decrements is not zero, then it jumps back.
a) 0xFF
b) 0x00
c) 0x01
d) A port is by default an output port
Answer: d
Explanation: In 8051, a port is initialized by default in its output mode no need to pass any value to it.
2. Which out of the four ports of 8051 needs a pull-up resistor for using it is as an input or an output port?
a) PORT 0
b) PORT 1
c) PORT 2
d) PORT 3
Answer: a
Explanation: These pins are the open drain pins of the controller which means it needs a pull-up resistor for using it
as an input or an output ports.
3. Which of the ports act as the 16 bit address lines for transferring data through it?
a) SCON
b) PCON
c) A
d) PSW
Answer: b
Explanation: PCON register is not a bit addressable register.
a) MOV A,P0
b) ADD A,#05H
c) JNB PO.0, label
d) CLR P0.05H
Answer: b
Explanation: JNB which stands for Jump if no bit checks the status of the bit P0.0 and jumps if the bit is 0.
6. Which addressing mode is used in pushing or popping any element on or from the stack?
a) immediate
b) direct
c) indirect
d) register
Answer: c
Explanation: If we want to push or pop any element on or from the stack then direct addressing mode has to be used
in it, as the other way is not accepted.
7. Which operator is the most important while assigning any instruction as register indirect instruction?
a) $
b) #
c) @
d) &
Answer: b
Explanation: In register, indirect mode data is copied at that location where R0 or R1 are present, so @ operator is u
sed ex. MOV @R0,A
a) MOVX A, @DPTR
b) MOVC @A+DPTR,A
c) MOV A,R0
d) MOV @R0,A
Answer: b
Explanation: Indexed addressing mode stands for that instruction where the bits of the accumulator is also indexed w
ith the 16 bit registers.
1. When we add two numbers the destination address must always be.
a) R4+A
b) R4-A
c) A-R4
d) R4+A
Answer: c
Explanation: SUBB command subtracts with borrow the contents of an accumulator with that of the register or some
immediate value. So A-R4 is being executed.
a) CY=0,AC=1
b) CY=1,AC=1
c) CY=0,AC=0
d) no relation with AC and CY
Answer: c
Explanation: When we divide two numbers then AC and CY become zero.
a) OV
b) CY
c) AC
d) PSW
Answer: b
Explanation: If unsigned numbers operations are involved, then the status of CY flag is important and in signed num
ber operation the status of OV flag is important.
a) ANL
b) ORL
c) XRL
d) All of the mentioned
Answer: d
Explanation: These instructions are the arithmetic operations and the flags are affected by the data copy instructions,
so all these instructions don’t affect the bits of the flag.
a) the pointer to jump if the values of the destination and the source address are equal
b) sets CY=1, if the contents of the destination register are greater then that of the source register
c) sets CY=0, if the contents of the destination register are smaller then that of the source register
d) none of the mentioned
Answer: d
Explanation: In CJNE command, the pointer jumps if the values of the two registers are not equal and it resets CY if
the destination address is larger then the source address and sets CY if the destination address is smaller then the so
urce address.
a) accumulator as the destination address and any register, memory or any immediate data as the source address
b) accumulator as the destination address and any immediate data as the source address
c) any register as the destination address and accumulator, memory or any immediate data as the source address
d) any register as the destination address and any immediate data as the source address
Answer: a
Explanation: These commands have accumulator as the destination address and any register, memory or any immedi
ate data as the source address.
a) some external crystal applied to the micro-controller for executing the timer
b) from the crystal applied to the micro-controller
c) through the software
d) through programming
Answer: b
Explanation: Timer’s clock source is the crystal that is applied to the controller.
2. What is the frequency of the clock that is being used as the clock source for the timer?
4. What is the maximum delay that can be generated with the crystal frequency of 22MHz?
a) 2978.9 sec
b) 0.011 msec
c) 11.63 sec
d) 2.97 msec
Answer: d
Explanation: For generating the maximum delay we have to multiply the maximum number of counts with the time
period required to execute one machine cycle( 65536*1/22MHz).
a) Mode 0
b) Mode 1
c) Mode 2
d) Mode 3
Answer: c
Explanation: Auto reload is allowed in the Mode 2 of the timer because here in this mode, we don’t need to load the
count again and again in the register.
6. Find out the roll over value for the timer in Mode 0, Mode 1 and Mode 2?
a) 00FFH,0FFFH,FFFFH
b) 1FFFH,0FFFH,FFFFH
c) 1FFFH,FFFFH,00FFH
d) 1FFFH,00FFH,FFFFH
Answer: c
Explanation: For Mode 0 13 bit value is used so 1FFFH is chosen to be the roll over value. Similarly for Mode 1 FF
FFH and for Mode 2 FFH is the roll over value for the timers and counter.
a) load the count, start the timer, keep monitoring it, stop the timer
b) load the TMOD register, load the count, start the timer, keep monitoring it, stop the timer
c) load the TMOD register, start the timer, load the count, keep monitoring it, stop the timer
d) none of the mentioned
Answer: b
Explanation: When any timer is to turn on, then firstly we have to load the TMOD register and the count. Then the ti
mer is to get started. After then, we need to monitor the timer properly and then when the roll over condition arises t
hen the timer is to be stopped.
8. If Timer 0 is to be used as a counter, then at what particular pin clock pulse need to be applied?
a) P3.3
b) P3.4
c) P3.5
d) P3.6
Answer: b
Explanation: If Timer 0 is to be used as a counter, then a pulse has to be applied at P3.4 and if it is for Timer 1 then t
he clock pulse has to be applied at the pin P3.5.
9. In the instruction “MOV TH1,#-3”, what is the value that is being loaded in the TH1 register?
a) 0xFCH
b) 0xFBH
c) 0xFDH
d) 0xFEH
Answer: c
Explanation: Negative value is loaded in 2’s complement form. -3 represented in 2’s complement form as FDH.
a) TMOD
b) SCON
c) TCON
d) SMOD
Answer: c
Explanation: All of these bits are part of TCON (Timer Control) register. TF0 and TF1 are used to check overflow o
f timer 0 and timer 1 respectively. TR0 and TR1 are timer control bits used to start and stop of timer 0 and timer 1 re
spectively.
1. Which devices are specifically being used for converting serial to parallel and from parallel to serial respectively?
a) timers
b) counters
c) registers
d) serial communication
Answer: c
Explanation: Some registers like the parallel in serial out and serial in parallel out are used to convert serial data into
parallel and vice versa respectively.
a) they are the names of the same particular thing, just the difference of A and S is there in it
b) one uses asynchronous means of communication and the other uses synchronous means of communication
c) one uses asynchronous means of communication and the other uses asynchronous and synchronous means of com
munication
d) one uses angular means of the communication and the other uses linear means of communication
Answer: c
Explanation: UART stands for Universal Asynchronous receiver-transmitter and USART stands for Universal Sync
hronous and Asynchronous receiver-transmitter.
3. Which of the following best describes the use of framing in asynchronous means of communication?
a) RTS
b) DTR
c) RTS & DTR
d) None of the mentioned
Answer: a
Explanation: RTS is a request to send control signal which is a control for the flow of data. On the other hand DTR i
s a Data Terminal Ready control signal which tells about the current status of the DTE.
a) no data transmission
b) no MAX232
c) the RxD of one is the TxD for the other
d) no serial communication
Answer: c
Explanation: In null modem connection the RxD of one is the TxD for the other.
7. Which of the following best states the reason that why baud rate is mentioned in serial communication?
8. With what frequency UART operates( where f denoted the crystal frequency )?
a) f/12
b) f/32
c) f/144
d) f/384
Answer: d
Explanation: UART frequency is the crystal frequency f/12 divided by 32, that comes out to be f/384.
1. When an interrupt is enabled, then where does the pointer moves immediately after this interrupt has occurred?
2. What are the contents of the IE register, when the interrupt of the memory location 0x00 is caused?
a) 0xFFH
b) 0x00H
c) 0x10H
d) 0xF0H
Answer: b
Explanation: When interrupt of 0x00 is caused (the reset interrupt) then all the other interrupts will be disabled or th
e contents of the IE register becomes null.
3. After RETI instruction is executed then the pointer will move to which location in the program?
a) pin no 10
b) pin no 11
c) pin no 12
d) pin no 13
Answer: c
Explanation: INT0 interrupt is caused when pin no 12 in the hardware of the 8051 controller is enabled with a low le
veled pulse.
a) IE.D5
b) IE.D2
c) IE.D3
d) IE.D4
Answer: d
Explanation: IE.D4 is used to enable RS interrupt or the serial communication interrupt.
6. Which of the following combination is the best to enable the external hardware interrupt 0 of the IE register (assu
ming initially all bits of the IE register are zero)?
a) EX0=1
b) EA=1
c) any of the mentioned
d) EX0=1 & EA=1
Answer: d
Explanation: For executing the EX0 interrupt, the EX0 and EA bits of the IE register should be set. EA is set to enab
le all the interrupts and EX0 is set to enable the external hardware interrupt 0 interrupt and mask the other enabled in
terrupts.
7. Why normally LJMP instructions are the topmost lines of the ISR?
a) so as to jump to some other location where there is a wider space of memory available to write the codes
b) so as to avoid overwriting of other interrupt instructions
c) all of the mentioned
d) none of the mentioned
Answer: c
Explanation: There is a small space of memory present in the vector table between two different interrupts so in orde
r to avoid overwriting of other interrupts we normally jump to other locations where a wide range of space is availab
le.
8. Which register is used to make the interrupt level or an edge triggered pulse?
a) TCON
b) IE
c) IPR
d) SCON
Answer: a
Explanation: TCON register is used to make any interrupt level or edge triggered.
10. What is the correct order of priority that is set after a controller gets reset?
1. How many rows and columns are present in a 16*2 alphanumeric LCD?
a) rows=2, columns=32
b) rows=16, columns=2
c) rows=16, columns=16
d) rows=2, columns=16
Answer: d
Explanation: 16*2 alphanumeric LCD has 2 rows and 16 columns.
a) pin no 1
b) pin no 2
c) pin no 3
d) pin no 4
Answer: c
Explanation: Pin no 3 is used for controlling the contrast of the LCD.
a) set
b) reset
c) set & reset
d) none of the mentioned
Answer: b
Explanation: For writing commands on an LCD, RS pin is reset.
5. Which command of an LCD is used to shift the entire display to the right?
a) 0x1C
b) 0x18
c) 0x05
d) 0x07
Answer: a
Explanation: 0x1C is used to shift the entire display to the right.
6. Which command is used to select the 2 lines and 5*7 matrix of an LCD?
a) 0x01
b) 0x06
c) 0x0e
d) 0x38
Answer: d
Explanation: 0x38 is used to select the 2 lines and 5*7 matrix of an LCD.
7. Which of the following step/s is/are correct for sending data to an LCD?
9. Which instruction is used to select the first row first column of an LCD?
a) 0x08
b) 0x0c
c) 0x80
d) 0xc0
Answer: c
Explanation: 0x80 is used to select the first row first column of an LCD.
a) input
b) output
c) input & output
d) none of the mentioned
Answer: a
Explanation: The RS pin is an input pin for an LCD.
1. Which of the following steps detects the key in a 4*4 keyboard matrix about the key that is being pressed?
a) masking of bits
b) ensuring that initially, all keys are open
c) checking that whether the key is actually pressed or not
d) all of the mentioned
Answer: d
Explanation: For detecting that whether the key is actually pressed or not, firstly this must be ensured that initially al
l the keys are closed. Then we need to mask the bits individually to detect that which key is pressed. Then we need t
o check that is the key actually pressed or not, by checking that whether the key pressed for a time more than 20 mic
ro seconds.
a) it masks the bit and then jumps to the label where ROW1 is written
b) it makes the value of the accumulator 0FH and then jumps at the address where ROW1 label is written
c) it compares the value of the accumulator with 0FH and jumps to the location where ROW1 label is there if the val
ue becomes equal
d) it compares the value of the accumulator with 0FH and jumps to the location where ROW1 label is there if the val
ue is not equal
Answer: d
Explanation: This particular command CJNE A,#00001111b, ROW1 compares the value of the accumulator with O
FH and jumps to ROW1 address if the value is not equal.
4. In reading the columns of a matrix, if no key is pressed we should get all in binary notation
a) 0
b) 1
c) F
d) 7
Answer: b
Explanation: If no key is pressed, then all the keys show 1 as they are all connected to power supply.
5. If we need to operate a key of a keyboard in an interrupt mode, then it will generate what kind of interrupt?
a) ES
b) EX0/EX1
c) T0/T1
d) RESET
Answer: b
Explanation: If a key is to operate in an interrupt mode then it will generate an external hardware interrupt.
a) its active high input used to inform ADC0804 to the end of conversion
b) its active low input used to inform ADC0804 to the end of conversion
c) its active low input used to inform ADC0804 to the start of conversion
d) its active high input used to inform ADC0804 to the start of conversion
Answer: c
Explanation: WR is active low input used to inform the ADC0804 to start the conversion process.
a) CLK IN pin used for External Clock Input or Internal Clock with external RC element
b) INTR pin tells about the end of the conversion
c) ADC0804 IC is an 8 bit parallel ADC in the family of the ADC0800 series
d) None of the mentioned
Answer: d
Explanation: CLK IN pin is used to tell about the conversion time, INTR pin tells about the end of the conversion an
d ADC0804 has a resolution of 8 bits only so all three statements are true.
a) select the analog channel, start the conversion, monitor the conversion, display the digital results
b) select the analog channel, activate the ALE signal (L to H pulse), start the conversion, monitor the conversion, rea
d the digital results
c) select the analog channel, activate the ALE signal (H to L pulse), start the conversion, monitor the conversion, rea
d the digital results
d) select the channel, start the conversion, end the conversion
Answer: b
Explanation: While programming the ADC0808/0809 IC firstly we need to select the channel from the A, B, C pins.
Then we need to activate the ALE signal, this is needed to latch the address. Then we start the conversion from the
WR pin. After monitoring the INTR pin we get to know about the end of the conversion. Then we activate the OE e
nable to read out data out of the ADC chip.
a) Vref
b) Vin
c) Vref/2 & Vin
d) None of the mentioned
Answer: a
Explanation: Step Size is calculated by formula Vref/(2n). As ADC0808/0809 8-bit ADC value of n=8. Therefore fo
rmula becomes Vref/(28) = Vref/256. If Vref = 5V then Step Size will be 5/256 i.e. 19.53mV.
a) ADC0804 has 8 bits and MAX1112 has 1 bit for data output
b) ADC0804 is used for adc and dac conversions whereas MAX1112 is used for serial data transmissions
c) ADC0804 has 32 bits and MAX1112 has 3 bit for data output
d) None of the mentioned
Answer: a
Explanation: ADC0804 is used for parallel ADC and MAX1112 is used for serial ADC.
1. A thermistor is a __________
a) sensor
b) adc
c) transducer
d) micro controller
Answer: c
Explanation: A thermistor is a device which is used to convert the temperature into electrical signals, so it acts as a tr
ansducer.
3. An electronic device which converts physical quantity or energy from one form to another is called ______
a) Sensor
b) Transistor
c) Transducer
d) Thyristor
Answer: c
Explanation: An electronic device that converts physical quantity or energy from one form to another is called Trans
ducer. Examples: Sensor, Speaker, Microphone, etc.
a) make the appropriate connections with the controller, ADC conversion, analyse the results
b) interface sensor with ADC and ADC with 8051
c) interface sensor with the MAX232, send now to microcontroller, analyse the results
d) none of the mentioned
Answer: b
Explanation: For interfacing a sensor with an 8051 microcontroller, we need ADC in between because output of sen
sor is analog and microcontroller works on digital signals only. So whatever signal generated by the sensor is conver
ted into its digital equivalent using ADC and equivalent digital signal is given to the microcontroller for processing.
a) 2
b) 1
c) 3
d) 4
Answer: c
Explanation: LM35 has 3 pins.
7. Why Vref is set of ADC0848 to 2.56 V if analog input is connected to the LM35?
a) to set the step size of the sampled input
b) to set the ground for the chip
c) to provide supply to the chip
d) all of the mentioned
Answer: a
Explanation: Vref is used to set the step size of the ADC conversion, if it is selected to 2.56 then the step size will be
selected to 10mV, so for every step increase of the analog voltage an increase of 10 mV will be there.
a) Input/Output
b) Analog to Digital
c) Digital to analog
d) None of the mentioned
Answer: a
Explanation: The 8255 is Input/Output (I/O) chip. It has three separate accessible ports. The 8255 chip is used to exp
and the I/O ports of microcontrollers.
a) RD
b) WR
c) D0-D7
d) All of the mentioned
Answer: d
Explanation: RD, WR, D0-D7 all are directly connected to the 8051 for telling the chip about the control signals and
also for transferring the data.
3. Find the control word for PA = out, PB = in, PCL = out, PCH = out (Mode0)?
a) 0x02H
b) 0x82H
c) 0x83H
d) 0x03H
Answer: b
Explanation: The value that is being loaded in the control word is 10000010b for PB as an input port and all others a
s the output ports being operated in mode0. The hex equivalent of 10000010b → 0x82H.
4. Which pins are used to select the ports and the control register?
a) CS
b) A1
c) A0
d) All of the mentioned
Answer: d
Explanation: CS pin is an active low input pin for 8255 and it is used for selecting a chip. A0 and A1 pins are used f
or select ports and the control register.
5. What is the value of the control register when RESET button is set to zero?
a) 0x00H
b) 0xFFH
c) 0x11H
d) value remains the same
Answer: d
Explanation: RESET is active-high signal input into the 8255 used to clear the control register. When RESET is acti
vated (i.e. set to high), all ports are initialized as input mode. Hence the value of the control register remains the sam
e as it is even when the RESET button is set to zero.
6. Why MOVX instruction is being used to access the ports of the 8255?
8. How many pins of the 8255 can be used as the I/O ports?
a) 8
b) 16
c) 24
d) 32
Answer: c
Explanation: There are 3 ports available in the 8255 so 24 pins are available for the I/O ports pins.
1. DS12887 is a ____________
a) Timer IC
b) Serial communication IC
c) RTC IC
d) Motor
Answer: c
Explanation: DS12887 is a real time clock that is widely used to provide accurate time and date for many application
s.
a) 14 bytes
b) 114 bytes
c) 128 bytes
d) 64 bytes
Answer: c
Explanation: DS12887 has 128 bytes of non-volatile RAM.
a) 9 bytes
b) 114 bytes
c) 128 bytes
d) 14 bytes
Answer: b
Explanation: DS12887 has 128 bytes of non-volatile RAM. Out of 128 bytes, 14 bytes of RAM for clock/calendar a
nd control registers, and another 114 bytes of RAM for general purpose data storage.
4. In DS12887, which bits of the Register A are used to turn on the oscillator?
a) D4
b) D5
c) D6
d) All of the mentioned
Answer: d
Explanation: In DS12887, D4-D6 bits of register A are used to turn on the oscillator. A specific value of 010 of D4-
D6 is desirable for turning on the oscillator.
5. In DS12887, which out of the following is correct about the SQW pin?
a) it is an output pin
b) it can provide up to 15 different square waves
c) the frequency of the square wave is set by the register A
d) all of the mentioned are correct
Answer: d
Explanation: In DS12887, SQW pin stands for SQuare Wave. It is an output pin that can provide us with 15 differen
t square waves. The frequency of the square wave is selected by programming register A.
7. In DS12887, what is the range of RAM addresses which are used to store the values of time, calendar and alarm d
ata?
a) 00-7FH
b) 00-09H
c) 0EH-7FH
d) 0A-0DH
Answer: b
Explanation: In DS12887, the first ten locations i.e. 00-09H are used to store the values of time, calendar and alarm
data.
a) Yes
b) No
c) Can’t be determined
d) None of the mentioned
Answer: a
Explanation: Yes, DS12887 has non-volatile RAM.
a) register A, register B
b) register B, register C
c) register C, register D
d) register D, register A
Answer: c
Explanation: Register C and D are the read only registers in the DS12887 found at memory locations 0C-0DH.
10. In DS12887, when the external source is turned-off, how does DS12887 get power to retain its data?
a) electromagnetic induction
b) motor control
c) switching
d) none of the mentioned
Answer: a
Explanation: Electromagnetic relays work on the principle of electromagnetic induction. It is used as a switch in ind
ustrial controls, automobile and appliances. It allows the isolation of the sections of a system with two different volt
age sources.
a) it is a driver
b) it is a thing isolated from the entire world
c) it is a device that can be used as an electromagnetic relay without a driver
d) none of the mentioned
Answer: c
Explanation: Optoisolators are devices that can be used as an electromagnetic relay without a driver. It usually consi
sts of a led (transmitter) and a photoresistive receiver.
a) kg/m2
b) ounce-inch
c) kg-m3
d) g/m
Answer: b
Explanation: Torque is equal to the force applied at a particular distance. So its unit can be ounce-inch.
a) Yes
b) No
c) Cant be said
d) None of the mentioned
Answer: b
Explanation: If LDI Rd,k is written then the range of Rd varies from R16-R31, as R3 is less than R16 so this instruct
ion will generate an error.
4. The total space for the data memory available in the AVR based microcontroller is?
a) FFH
b) FFFH
c) FFFFH
d) FFFFFH
Answer: c
Explanation: The maximum value that can be loaded in the code memory of an AVR based microcontroller is FFFF
H.
5. Which of the following instructions affect the flags of the status register?
a) AND
b) INC
c) OR
d) All of the mentioned
Answer: d
Explanation: AND, INC, OR could affect status register flags. All arithmetic and logical instructions affect status re
gister flags except SER Rd instruction. SER Rd is used to SEt Register i.e. after the execution of this instruction Rd l
oaded with FFH value and no flag is affected.
a) One copies the hexadecimal value to R16 and the other copies the decimal value to the R16 register
b) One is for command, other is for data
c) One is for assignment, other is for operations
d) Both the commands are the same
Answer: d
Explanation: Both the above commands are the same. They both are used for assigning the hexadecimal values to th
e registers.
a) .EQU
b) .DEVICE
c) .ORG
d) .LDI
Answer: d
Explanation: .EQU, .DEVICE, .ORG all are the directives to the assembler whereas LDI is a command.
a) Yes
b) No
c) Can’t be said
d) None of the mentioned
Answer: b
Explanation: Assembly language is not high level language rather it is low level language because it deals directly w
ith the internal structure of CPU. To program in assembly, the internal structure of the CPU must be known. Wherea
s in high level programming languages programmers don’t bother about the internal structure of the CPU because th
is is done by the compiler.
a) 4K
b) 8K
c) 16K
d) 64K
Answer: c
Explanation: A 14-bit program counter can access 214 bytes of memory locations i.e. 16k bytes.
214 = 24 x 210
a) 00H
b) 000H
c) 0000H
d) 00000H
Answer: d
Explanation: When an AVR wakes up, then the PC starts at the memory location 00000H.
a) 10
b) 70
c) 700
d) none of the mentioned
Answer: b
Explanation: As the R21 register is loaded with 70, so to make it zero it needs to be decremented 70 times then only
the OUT instruction will be executed so this loop repeats 70 times.
a) BRLO
b) BRMI
c) BRVC
d) None of the mentioned
Answer: d
Explanation: BRLO is used to branch if C=1, BRMI is used when N=1 and BRVC are used when V=0, so all are the
conditional jumps.
4. What is the relation between the target and the relative address?
5. In the JMP instruction, how many bits are there for determining the target address?
a) 16
b) 32
c) 22
d) 10
Answer: c
Explanation: In the JMP instruction of 4 bytes space, 22 bits are there for determining the target address and the othe
r 10 are for the op code verification.
a) MEM
b) LASTRAM
c) RAMEND
d) None of the mentioned
Answer: c
Explanation: RAMEND is a micro used to represent the last RAM address. In AVR, Stack Pointer is initialized on t
op of the stack i.e. last address of RAM.
8. Which of the following statements are correct about the RCALL instruction?
a) it is a 2 byte instruction
b) it is a 4 byte instruction
c) it is a 16 byte instruction
d) none of the mentioned
Answer: a
Explanation: RCALL instruction is used to go to the target address in the memory from -2048 to 2047.
1. In AVR, which registers are there for the I/O programming of ports?
a) PORT
b) PIN
c) DDR
d) All of the mentioned
Answer: d
Explanation: For I/O programming of the ports in AVR microcontrollers, there are basically three main registers. Th
ey are PORT, PIN, DDR, so all of the mentioned is the right option.
2. The data will not go from the port registers to the pin unless:
a) 0
b) 1
c) None of the mentioned
d) 0 & 1
Answer: a
Explanation: On reset, the DDR registers of all the ports are set to 0 which means that the by default all ports are set
as input ports.
a) PIN register of a port is used to bring data into CPU from pins
b) PORT register is used to send data out to pins
c) DDR register is used to control the direction of a port
d) All of the mentioned
Answer: d
Explanation: There are three registers that are related to a port. They are PIN, PORT, DDR. PIN register is used to b
ring data into CPU from pins, PORT register is used to send data to pins and DDR register is used to control the dire
ction of the data transfer. So all are the right options.
a) true
b) false
c) none of the mentioned
d) can’t be determined
Answer: b
Explanation: In the AVR family, all I/O ports don’t have 8 pins. Number of I/O pins depends on the total number of
pins of the controller. Eg. ATtinyxx is an 8 pin controller and it has 6 I/O pins.
a) SBI
b) PORT
c) CBI
d) All of the mentioned
Answer: b
Explanation: PORT is not an instruction. It is the name of a register in AVR.
9. Which of the following instruction can be used to toggle a bit of the PORT?
a) SBI
b) CBI
c) SBI & CBI
d) None of the mentioned
Answer: c
Explanation: If SBI and CBI are used together, then they can be used to toggle a bit of a port successfully.
10. What is the main function of the SBIC instruction?
1. In AVR microcontrollers, ADD instruction affects the status of which of the following bits of a status register?
a) Z
b) C
c) N
d) All of the mentioned
Answer: d
Explanation: ADD instruction affects the status of Z, C, N, V, H and S bits of a status register.
a) SUB
b) SBC
c) SUBI
d) All of the mentioned
Answer: d
Explanation: AVR supports five types of subtraction instructions. They are SUB, SBC, SUBI, SBCI, SBIW.
4. What steps are involved when we subtract two numbers present at two different locations?
8. To set the bits of a register R1 to 1, we must OR the contents of the register with?
a) 00H
b) 11H
c) FFH
d) 0FH
Answer: c
Explanation: To make the contents of the register R1 to 1 we must OR the contents of that register with FFH becaus
e according to Or algorithm 0+1=1 and 1+0=1.
a) true
b) false
c) none of the mentioned
d) can’t be said
Answer: b
Explanation: CP command is used to compare the contents of the two registers. It doesn’t actually alter the value of t
he register.
1. In AVR, which of the following registers are not used for programming timers?
a) TCNT
b) TCON
c) TIFR
d) None of the mentioned
Answer: b
Explanation: In the timer programming of an AVR microcontroller, mainly used registers are TCNTn that stores the
values of the count. TCCRn that is used to assign the mode of operation of a timer and TIFR that stores the status of
various flags of the timers. Two more registers are used they are OCRn and OCFn. They are used for comparison wi
th the count register.
a) Normal mode
b) CTC mode
c) PWM mode
d) All of the mentioned
Answer: d
Explanation: Modes of a timer are decided by the WGM00 and WGM01 bit of the TCCR0 register and for timer0 th
ese modes are normal mode, CTC mode, pwm mode and the fast pwm mode.
a) timer0
b) timer1
c) timer2
d) all of the mentioned
Answer: b
Explanation: Timer0 and Timer2 can operate in the 8 bit condition while only Timer 1 operates in the 16 bit conditio
n.
a) f/2
b) f/4
c) f/16
d) f/32
Answer: d
Explanation: f/32 has the lowest frequency as it is divided by the maximum value of the constant, so as time and fre
quency are inversely related to each other so this will generate the maximum amount of machine cycle which will as
a result generate the greatest delay.
7. What is the difference in the operation of a normal and a CTC mode of a timer?
8. We can count the pulses on the positive or the negative edge triggered pulse of the clock?
a) true
b) false
c) can’t be determined
d) depends on the circumstances
Answer: a
Explanation: A counter can count pulses on the positive or the negative edge of the clock.
a) PORTB.0
b) PORTB.1
c) PORTB.2
d) PORTB.3
Answer: a
Explanation: In ATmega32/16, T0 is the alternative function of PORTB.0. T0 is Timer/Counter 0 External Clock In
put.
10. Which resource provides the clock pulse to AVR timers if CS02-00=6?
a) 00h
b) ffh
c) 1fh
d) 11h
Answer: a
Explanation: On reset, all the interrupts are masked and so the contents of the SREG register is also set to zero as it s
hows the status of the flags.
a) 0002h
b) 0004h
c) 0006h
d) all of the mentioned
Answer: d
Explanation: The ISR addresses for the external hardware interrupts are 0002h, 0004h, 0006h.
5. What is the address in the interrupt service routine assigned for the timer0 overflow flag?
a) 0012h
b) 000Ah
c) 0016h
d) all of the mentioned
Answer: c
Explanation: 0016h is the address in the interrupt service routine assigned for the timer0 overflow flag.
6. Is the same address is assigned for the timer0 and timer1 overflow flag in the interrupt vector table of the interrupt
s?
a) true
b) false
c) can’t be determined
d) depends on the situation
Answer: b
Explanation: Different addresses are assigned for Timer0 and Timer1 overflow flags in the interrupt vector table. Th
ey are 0016h and 0012h for timer0 and timer1 respectively.
a) PORTD.2
b) PORTD.3
c) PORTB.2
d) All of the mentioned
Answer: d
Explanation: There are three external hardware interrupts in the atmega32 microcontrollers. They are assigned to bit
s PORTD.2, PORTD.3 and PORTB.2.
8. Which register is responsible for handling all the external hardware interrupts?
a) TIMSK
b) GICR
c) MCUCR
d) IVCE
Answer: b
Explanation: GICR register is responsible for all the external hardware interrupts in the AVR.
a) edge triggered
b) level triggered
c) all of the mentioned
d) none of the mentioned
Answer: b
Explanation: By default, INT0-INT2 are the level triggered pulses. The low level of the pulse generates the interrupt
.
10. What will happen in that condition, if an interrupt occurs while the microcontroller is serving any other interrupt
?
1. What actually are the DB9, DB25 ports available in our computers?
a) they are connectors used to transfer data either serially or parallelly
b) they are the RS232 connectors used to connect two incompatible devices
c) they are the TTL logic connector pins used for communication
d) they are just data transfer pins used to transfer the data
Answer: b
Explanation: DB9 and the DB25 ports are the ports that are based on the RS232 logic that is basically used for com
municating two incompatible devices.
4. Which of the following is correct about the baud rate during serial transmission?
5. With fosc=8 MHz, what will the count that has to filled in the UBRR register to account for the 9600 baud rate?
a) 67H
b) CEH
c) 33H
d) 34H
Answer: c
Explanation: The count that had to be filled in the UBRR register is calculated as (fosc/16(desired baud rate))-1.
6. The USART in AVR based microcontrollers operate at which of the following modes?
7. Which bit of the UCSRA is used for doubling the baud rate of the transmission?
a) DOR
b) PE
c) U2X
d) MPCM
Answer: c
Explanation: U2X bit of the UCSRA is used for doubling the baud rate of the transmission.
8. What is the use of the PE and the FE bits of the UCSRA register?
a) they are used for keeping a check at the speed of transmission and reception
b) they are used for keeping a check at the data bits to be transferred
c) they are used to keep the transmission error free
d) they are used as extra redundant bits with no use
Answer: c
Explanation: PE and the FE bits of the UCSRA register are used for error checking in the transmission.
9. Which of the following bits are used for setting the data frame size?
a) UCSZ0
b) U2X
c) DOR
d) MPCM
Answer: a
Explanation: UCSZ0 and UCSZ1 bits of the UCSRB register and the UCSZ2 bit of the UCSRC register are used for
setting the data frame size in AVR based microcontrollers.
10. Which of the following parameters should the transmitter and the receiver agree upon before starting a serial tran
smission?
a) baud rate
b) frame size
c) stop bit
d) all of the mentioned
Answer: d
Explanation: Before starting the serial transmission, the following parameters should be taken care of. They are the b
aud rate, frame size, stop bit and the parity bit.
1. In AVR, the LCD operates in two main modes, it can be in 8 bit or 4 bit data.
a) true
b) false
c) depends on the situation
d) can’t be said
Answer: a
Explanation: In AVR, the LCD operates in two main modes, they are in the 8 bit data transfer mode and the 4 bit dat
a transfer mode.
2. What can be the sequence of commands that may be used for initializing an LCD?
3. When the LCD operates in the 4 bit mode, then what more commands are added to it?
a) 33
b) 32
c) 28
d) all of the mentioned
Answer: d
Explanation: When an LCD operates in the 4 bit mode than 33, 32, 28 in hex are sent to it. They represent 3, 3, 3, 2
nibbles which tell the LCD to do into the 4 bit mode for saving the i/o pins of the port.
a) input pin
b) output pin
c) any of the mentioned depending on the conditions
d) none of the mentioned
Answer: a
Explanation: The RS pin of the LCD is used for selecting a particular register used for sending a command or the dat
a to the LCD.
8. What is the address of the second column and the second row of the 2*20 LCD?
a) 0x80
b) 0x81
c) 0xc0
d) 0xc1
Answer: d
Explanation: 0xc0 acts as the address for selecting the second row and the first column of the LCD, so according to i
t if we need to select the second row and the second column of the LCD, then the address should be 0xc1.
9. Which of the following commands takes more than 100 microseconds to run?
a) 1
b) 0
c) F
d) 10
Answer: a
Explanation: For selecting the data pins of the LCD, the RS pin of the LCD should be set to 1.
1. In reading the columns of a keyboard matrix, when no key is pressed then all the pins show?
a) 0
b) 1
c) F
d) 7
Answer: b
Explanation: When no key is pressed, in a keyboard then all the pins will read 1 as they all are connected to the main
power supply.
a) true
b) false
c) can’t be said
d) depends on the conditions
Answer: a
Explanation: To see that whether any key is pressed or not then all the rows are grounded so that columns can be rea
d to deliver the better results.
3. Identify the row and the column for the following case when for the row D3-D0= 1110 and for the column D3-D0
= 1101
4. What are the actual steps that are followed in identifying any key that is being pressed?
5. To identify that the key is present in which row and the column
6. The key detection and the key identification are two different procedures?
a) true
b) false
c) depends on the circumstances
d) difficult to tell
Answer: a
Explanation: The key detection and the key identification are the two different procedures, one is used to detect that
whether any key is pressed or not and the other technique is used to find that the pressed key is located in which row
and column.
9. What will happen if the two keys of the keyboard are pressed at a time?
10. Why initially all keys are considered open before detecting the key pressed?
1. Which of the following is correct about the word resolution in ADC DAC converters in AVR’s?
4. Which of the following factors can affect the step size calculation?
a) number of bits
b) input current
c) output current
d) all of the mentioned
Answer: a
Explanation: There are mainly two factors that can affect the step size calculation of an ADC converter, they are the
number of bits and the Vref voltage.
a) parallel
b) 12 bit
c) serial
d) all of the mentioned
Answer: c
Explanation: MAX1112 is a serial ADC converter, as it has only one pin for the data output.
6. Why do we connect a capacitor between the Vref and the Gnd pin?
7. Which of the following are the registers that are used for controlling the ADC conversion in the AVR?
a) ADCSRA
b) ADMUX
c) SPIOR
d) All of the mentioned
Answer: d
Explanation: For programming the ADC conversion in an AVR, we require the following registers. They are ADCS
RA, ADMUX, SPIOR. There are two more registers used for handling the output data, they are ADCH and ADCL r
egisters.
a) 5V
b) 3.3V
c) 2.56V
d) all of the mentioned
Answer: c
Explanation: 2.56V is the internal Vref selected for an Atmega32 series based microcontrollers.
a) electrical pulse
b) current
c) voltage
d) all of the mentioned
Answer: b
Explanation: The output of a DAC0808 is in the form of a current.
a) analog, digital
b) current, voltage
c) digital, analog
d) analog, current
Answer: c
Explanation: In a DAC, the input is digital and the output is analog in nature.
a) true
b) false
c) can’t say
d) depends on the conditions
Answer: a
Explanation: For analyzing purposes, every transducer must be connected to a signal conditioning circuit in order to
measure its value as a practical platform.
a) 1
b) 0.1
c) 0.001
d) 10
Answer: c
Explanation: LM35 provides 10mV for every degree change of the Celsius scale.
7. Why for the 8 bit analog input we select Vref as the 2.56V?
8. What is the temperature for LM35 sensor if the analog output is 0011 1001?
a) 3
b) 9
c) 57
d) 41
Answer: c
Explanation: The binary for the above output is 57, so in case of LM35 sensors we obtain the output as 57 C.
9. In an external hardware, there are how many pins available for the LM35 and the LM34 based sensors?
a) 2
b) 3
c) 10
d) 1
Answer: b
Explanation: LM35 consists of mainly 3 pins, they are Vcc, Gnd, analog output.
a) yes
b) no
c) depends on the conditions
d) can’t say
Answer: a
Explanation: LM34 and the LM35 based sensors are linearly proportional to their corresponding Fahrenheit and the
Celsius scale, so they are linear by nature.
a) Input/Output
b) Analog to Digital
c) Digital to analog
d) None of the mentioned
Answer: a
Explanation: The 8255 is Input/Output (I/O) chip. It has three separate accessible ports. The 8255 chip is used to exp
and the I/O ports of microcontrollers.
a) RD
b) WR
c) D0-D7
d) All of the mentioned
Answer: d
Explanation: RD, WR, D0-D7 all are directly connected to the 8051 for telling the chip about the control signals and
also for transferring the data.
3. Find the control word for PA= out, PB= in, PCL=out, PCH=out (Mode0)?
a) 0x02H
b) 0x82H
c) 0x83H
d) 0x03H
Answer: b
Explanation: The value that is being loaded in the control word is 10000010b for PB as an input port and all others a
s the output ports being operated in mode0. The hex equivalent of 10000010b → 0x82H.
4. Which pins are used to select the ports and the control register?
a) CS
b) A1
c) A0
d) All of the mentioned
Answer: d
Explanation: CS pin is an active low input pin for 8255 and it is used for selecting a chip. A0 and A1 pins are used f
or select ports and the control register.
5. What is the value of the control register when RESET button is set to zero?
a) 0x00H
b) 0xFFH
c) 0x11H
d) value remains the same
Answer: d
Explanation: RESET is active-high signal input into the 8255 used to clear the control register. When RESET is acti
vated (i.e. set to high), all ports are initialized as input mode. Hence the value of the control register remains the sam
e as it is even when the RESET button is set to zero.
6. Why MOVX instruction is being used to access the ports of the 8255?
8. How many pins of the 8255 can be used as the I/O ports?
a) 8
b) 16
c) 24
d) 32
Answer: c
Explanation: They are 3 ports available in the 8255 so 24 pins are available for the I/O ports pins.
a) 16
b) 8
c) 40
d) 60
Answer: c
Explanation: 8255 is a 40 pin IC.
a) yes
b) no
c) cant be said
d) depends on the conditions
Answer: a
Explanation: 8255 is a device that with the help of its handshaking property gets interfaced with any microcontroller
.
a) 2 modes
b) 3 modes
c) 4 modes
d) 5 modes
Answer: c
Explanation: 8255 can be programmed in any of the 4 modes.
a) conversion
b) communication
c) real time and clock measurement
d) memory management
Answer: c
Explanation: RTC is a device that is basically used for all the real time clock related issues.
2. RTC chips use ______ to compute time, date when the power is off.
a) ac supply
b) generators
c) rectifiers
d) battery
Answer: d
Explanation: RTC chips require batteries in order to calculate the time and date when the power of the device is off.
a) Communication device
b) Good battery device
c) RTC chip
d) All of the mentioned
Answer: c
Explanation: DS12887 is known as an RTC chip.
a) true
b) false
c) cant be said
d) depends on the conditions
Answer: b
Explanation: DS1307 is a serial RTC with I2C bus.
5. DS1307 is a _______ pin IC and operates on _______ clock frequency.
a) 16, 8Mhz
b) 8, 16Mhz
c) 16, 32Mhz
d) 8, 32Khz
Answer: d
Explanation: DS1307 is a 8 pin IC and operates on a 32KHz clock frequency.
a) 3V
b) 5V
c) 9V
d) 12V
Answer: a
Explanation: Vbat requires a positive signal of 3V which can be obtained through a battery.
7. In DS1307, which out of the following is correct about the SQW pin?
a) input pin
b) output pin
c) i/o pin
d) none of the mentioned
Answer: b
Explanation: In DS1307, SQW pin is an output pin. It provides a clock of frequency 1khz, 4khz, 8khz, 32khz if the p
in is enabled.
a) 32
b) 64
c) 128
d) 256
Answer: c
Explanation: DS1307 has a total of 64 bytes(00-3F) of RAM space.
a) 00H
b) 03H
c) 07H
d) 10H
Answer: b
Explanation: DS1307 control register has an address of 07H.
2. Why are ULN2803 normally used between the microcontrollers and the relays?
3. Why are opto isolators normally used between the microcontrollers and the ULN2803?
a) SPST
b) SPDT
c) DPDT
d) All of the mentioned
Answer: d
Explanation: There are normally three kinds of electromagnetic relays. They are SPST(single pole single throw), SP
DT(single pole double throw) and the DPDT(double pole double throw) relays.
5. Reed switches show connectivity whenever they are in the presence of an electrical field?
a) true
b) false
c) can’t say
d) depends on the conditions
Answer: b
Explanation: Reed switches are the devices that show connectivity whenever they are in the presence of some magne
tic field.
a) in printers
b) in robots
c) in vehicles
d) all of the mentioned
Answer: d
Explanation: Stepper motors are used wherever there is a need of a movement at an angle, maybe it in printers, in m
otors or in vehicles stepper motors are used everywhere.
7. What are normal 4 step sequence of a stepper motor if we start to move in clockwise direction with 0110 value?
a) 1100,1001,0011,0110
b) 0011,1001,1100,0110
c) 1001,1100,0110,0011
d) 0101,1010,0101,1010
Answer: b
Explanation: For a normal 4 step sequence of a stepper motor, if we start to move in a clockwise direction then we r
otate towards right direction with every rotation.
9. For a normal 4 step sequence, what are the number of teeth required to accomplish a 2 degree step angle?
a) 180
b) 90
c) 360
d) 45
Answer: d
Explanation: For a 2 degree step angle there will be 180 step per rotation, so the total number of rotor teeth are (180/
4=45).
a) true
b) false
c) can’t say
d) depends on the situation
Answer: a
Explanation: Torque is a quantity which is obtained by multiplying the amount of force that is applied at a particular
angle. It is measured in terms of ounch-inch.
1. Why do we make the connection of the SCLK for communicating serially between two devices?
a) true
b) false
c) can’t be said
d) depends on the cases
Answer: d
Explanation: In SPI write, MSB goes first.
a) SPSR
b) SPCR
c) SPDR
d) All of the mentioned
Answer: b
Explanation: In AVR, SPSR(SPI Status Register), SPCR(SPI Control Register) and SPDR(SPI Data Register) are us
ed for programming the SPI module.
a) We set the MSTR bit, and make the CPOL= 1 and CPHA=0
b) We set the MSTR bit, and make the CPOL= 0 and CPHA=1
c) We reset the MSTR bit, and make the CPOL= 1 and CPHA=0
d) We reset the MSTR bit, and make the CPOL= 0 and CPHA=1
Answer: b
Explanation: In SPI, to make it work in the master mode, we make the MSTR bit is equal to 1 and for operating it in
the mode 1 we make the CPOL=0 and CPHA=1.
a) true
b) false
c) depends on the conditions
d) can’t be said
Answer: d
Explanation: No, SPI can’t work in the half duplex transmission mode.
a) fosc/4
b) fosc/64
c) fosc/16
d) fosc/2
Answer: a
Explanation: fosc/2 is not recommended frequency for SPI transfer in AVR.
a) I2C is a technique by which data is transmitted with the help of only eight pins
b) SDA is used to synchronize data transfer between two chips
c) TWI is another name for I2C
d) All of the mentioned
Answer: c
Explanation: I2C is a technique by which data is transmitted between two devices by the help of only 2 pins so it is a
lso called Two wire Serial Interface.
a) the data line cannot change when the clock line is high
b) the data line can change when the clock line is high
c) the clock line cannot change when the data line is high
d) the clock line can change when the data line is high
Answer: a
Explanation: According to I2C protocols, the data line(SD
a) changes only if the clock line(SCL) is at its active low level.
a) true
b) false
c) cant be said
d) depends on the conditions
Answer: a
Explanation: I2C is a connection oriented protocol i.e each transmission is initiated by a START condition and is ter
minated by a STOP condition.
a) high to low change in the SDA line when the SCL is low
b) high to low change in the SDA line when the SCL is high
c) low to high change in the SDA line when the SCL is low
d) low to high change in the SDA line when the SCL is high
Answer: c
Explanation: The STOP condition is generated when there is a low to high change in the SDA line when the SCL is l
ow.
a) true
b) false
c) cant be said
d) depends on the conditions
Answer: a
Explanation: I2C is that module of the AVR, which is used for short distances.
8. Which of the following is a register used for programming AVR’s I2C module?
a) TWBR
b) TWCR
c) TWSR
d) All of the mentioned
Answer: d
Explanation: TWBR( TWI Bit rate register), TWCR( TWI Control Register), TWSR(TWI Status Register), TWAR(
TWI Address Register), TWDR( TWI Data Register) are used for programming an AVR’s I2C module.
9. Which bit is polled to know that whether the TWI is ready or not?
a) TWWC
b) TWINT
c) TWEA
d) All of the mentioned
Answer: b
Explanation: TWINT is the bit that is polled to know that whether the TWI is ready or not.
a) 1 byte
b) 2 bytes
c) 1 bit
d) 2 bit
Answer: b
Explanation: In MSP430, the size of the status register is 2 bytes. The bits of the status register consists of the C flag
, Z flag, N flag, GIE flag, CPU off, OSC off, SCG0, SCG1, V flag and 7 reserved bits.
2. Which of the following bit/s of the status register that allows the microcontroller to operate in its low power mode
?
a) Z
b) Reserved
c) CPU off
d) N
Answer: d
Explanation: The CPU off bit, OSC off bit, SCG0 bit, SCG1 bit of the status register are used to allow the microcont
roller to operate in its low power mode.
a) true
b) false
c) cant be said
d) depends on the conditions
Answer: a
Explanation: MSP430 supports only post increment addressing. For performing pre increment addressing, we requir
e some special functions that accomplish that work.
a) ADC(.
b) dst
b) ADD(.
b) src,dst
c) ADDC(.
b) src,dst
d) AND(.
b) src,dst
Answer: a
Explanation: “ADC(.
b) dst” this is emulated to “ADDC.B #0,dst” hence this is an emulated instruction. The emulated instructions use cor
e instructions combined with the architecture and implementation of the CPU for higher code efficiency and faster e
xecution.
1. There are _____ number of addressing modes found for the source and _____ number of modes for the destinatio
n part.
a) 4,4
b) 2,4
c) 7,4
d) 2,2
Answer: c
Explanation: In MSP430, Seven addressing modes for the source operand and four addressing modes for the destinat
ion operand can address the complete address space with no exceptions.
a) Format1 addressing
b) Format2 addressing
c) Jump addressing
d) None of the mentioned
Answer: b
Explanation: MSP430 describes reti instruction as that type of addressing which consists of only single operand, so i
t comes under Format2 addressing.
a) one cycle
b) two cycles
c) four cycles
d) eight cycles
Answer: a
Explanation: mov.w R3, R4 takes only one cycle to transfer the data from register R3 to R4. This type of mode of ad
dressing is called the register mode of addressing.
a) source
b) destination
c) source & destination
d) none of the mentioned
Answer: c
Explanation: Indexed addressing is used for both the source and the destination addresses.
a) R6 = X+PC
b) R6 = PC-X
c) R6 = -X-PC
d) R6 = -X+PC
Answer: a
Explanation: This instruction mov.w X(PC), R6 means that the contents of X+PC address are copied to the R6 regist
er.
a) source register
b) destination register
c) source & destination register
d) none of the mentioned
Answer: a
Explanation: Indirect addressing mode is used only by the source register.
8. Indirect mode and the indirect auto increment mode have which common operator in them
a) +
b) –
c) @
d) &
Answer: c
Explanation: Both the indirect and the indirect auto increment mode use the @ operator for the source register to tra
nsfer the data from one memory location to a register.
a) yes
b) no
c) cant be said
d) depends on the conditions
Answer: b
Explanation: MOV @R10,0(R11) → Move the contents of the source address (contents of R10) to the destination ad
dress (contents of R11).
a) Register Mode
b) Indirect Register Mode
c) Immediate Mode
d) Indirect Autoincrement Mode
Answer: b
Explanation: The type of given instruction is Indirect Register Mode.
a) MOV
b) GO
c) CALL
d) All of the mentioned
Answer: c
Explanation: CALL instruction is used for going to a particular address in MSP430. It actually causes the pointer to j
ump at a particular address and push the current address of the PC to the stack.
3. According to conventions being followed, R12 to R15 are used for _________
a) parameter passing
b) preserved for call
c) all of the mentioned
d) none of the mentioned
Answer: a
Explanation: According to the conventions, R12 to R15 are used for parameter passing and hence are not preserved f
or the call.
4. We can store the temporary results across a call instruction with the help of which of the following registers
a) R1-R4
b) R4-R11
c) R12-R15
d) All of the mentioned
Answer: b
Explanation: Temporary results are stored by the registers R4-R11.
a) yes
b) no
c) cant be said
d) depends on the conditions
Answer: a
Explanation: Yes, we can allocate the variables on the stack, it is a very effective way of storing the variables.
6. Which registers are reserved for passing the parameters to a subroutine and then returning the final result?
a) R1-R4
b) R4-R11
c) R12-R15
d) All of the mentioned
Answer: c
Explanation: Originally, R12-R15 registers are reserved for passing the parameters to a subroutine and then returnin
g the final result.
7. What actually is the order of stack frame for a parameter to pass to a subroutine?
8. When any subroutine is called, then the first value of stack will be
a) value of PC
b) the return address
c) none of the mentioned
d) both are one and the same things
Answer: d
Explanation: When any subroutine is called then the first place of the stack will be filled with the return address, or t
he address of the PC so that the pointer may return back to its appropriate place after the return instruction of the sub
routine.
9. Which of the following instruction/s is/are used to return back to the main program after the subroutine is complet
ed?
a) ret
b) reti
c) ret and reti
d) none of the mentioned
Answer: c
Explanation: For returning back from the subroutine, both ret and reti can be used, the main difference between the t
wo is that reti just resets the interrupt flag before the return, so that the interrupt can occur again.
a) yes
b) no
c) cant be said
d) depends on the conditions
Answer: a
Explanation: The approach of making subroutine is indeed very effective, as with its help we don’t need to retrace/w
rite a particular set of codes again and again. It makes our approach modular.
a) true
b) false
c) cant be said
d) depends on the conditions
Answer: a
Explanation: MSP430 has vectored interrupts i.e. the address of each ISR is stored in a vector table, that’s why it has
vectored interrupts.
2. Which of the following is true?
3. After the interrupt has occurred, the stack is filled with ______________
a) return address
b) status register
c) return address & status register
d) none of the mentioned
Answer: c
Explanation: When an interrupt had occurred, the top place of the stack is filled with the return address, so that imm
ediately after the reti instruction the pointer moves to the main program, the stack is also filled with the bits of the st
atus register so that all the temporary values get stored in it.
a) GIE=0
b) GIE=1
c) None of the mentioned
d) GIE=0 & 1
Answer: b
Explanation: If GIE is set to 1, then only other hardware interrupts are enabled.
a) true
b) false
c) cant be said
d) depends on the conditions
Answer: b
Explanation: Nonmaskable interrupts are stored in the same vector location, it may be of higher or the lower priority
.
a) true
b) false
c) cant be said
d) depends on the conditions
Answer: a
Explanation: Yes, external RST/NMI pin is a nonmaskable interrupt( The function of the RST/NMI pin is configure
d in the control register for the watchdog timer module, WDTCTL).
10. How many cycles are used by MSP430, when reti instruction is executed?
a) 3
b) 4
c) 5
d) depends on the conditions
Answer: c
Explanation: When reti instruction is executed, five cycles are used because it firstly pops the stack register complet
ely and then takes the top of the stack into the PC to return to the next address of the main program.
1. There are how many MSP430’s low power modes available in the chip?
a) two
b) three
c) four
d) five
Answer: d
Explanation: There are five low power modes available in the MSP430, out of which two are rarely employed in the
current devices.
a) LPM0
b) LPM3
c) LPM4
d) All of the mentioned
Answer: d
Explanation: LPM0, LPM3, LPM4 all are the low power modes that are available in the MSP430.
3. Which of the following modes is also known as the RAM retention mode?
a) LPM0
b) LPM3
c) LPM4
d) All of the mentioned
Answer: c
Explanation: LPM4 is known as the RAM retention mode. Here, the CPU and all clocks are disabled, I ≈ 0.1A. The
device can be woken only by an external signal.
4. Waking a device simply means that switching that device’s operation from a low power mode to an active mode.
a) true
b) false
c) cant be said
d) depends on the conditions
Answer: a
Explanation: When a device is operating in a low power mode, it can also be assumed that the device is sleeping, so
waking a device simply means to turn that device’s operation from a low power mode to an active mode.
5. When an interrupt is accepted, the contents of the status register are ___________
a) set
b) reset
c) remains the same
d) cant be said
Answer: d
Explanation: When an interrupt is accepted, the contents of the status register are cleared, it actually puts the process
or in the active mode.
6. Which of the following basic clock modules supplies clock signals to the MSP430?
a) ACLK
b) MCLK
c) SMCLK
d) All of the mentioned
Answer: a
Explanation: All of the mentioned options are correct. The basic clock module supplies the MSP430 with three cloc
k signals as follows:
8. More power can be saved by using low_power mode 0 than low_power mode 3.
a) true
b) false
c) cant be said
d) depends on the conditions
Answer: b
Explanation: More power is saved in low_ power mode 3.
a) P1SEL
b) P1DIR
c) P1IES
d) All of the mentioned
Answer: d
Explanation: All of the mentioned registers are related to Port1.
a) it is an interrupt
b) it is a timer
c) it is an analog to Digital Converter
d) it is a serial communication module
Answer: c
Explanation: SD16_A is an analog to the digital module.
5. P1IE and P1IES are registers that are used to ___________
6. Unused pins must never be left unconnected in their default state as inputs.
a) true
b) false
c) cant be said
d) depends on the conditions
Answer: a
Explanation: Unused pins must never be left unconnected in their default state as inputs. This follows a general rule
that inputs to CMOS must never be left unconnected or “floating”.
a) it turns slowly varying inputs, which might cause problems while they pass slowly through the undefined range of
input voltages, into abrupt, clean logical transitions
b) It eliminates the effect of noise on the input, provided that it is not large enough to span the gap between the upwa
rd and downward thresholds
c) none of the mentioned
d) all of the mentioned
Answer: d
Explanation: Schmidt trigger has two of the above mentioned effects in it.
8. To ensure that a negative fluctuation does not trigger an unwanted downward transition by pulling the input down
through VIT−, we must choose
a) minimum hysteresis
b) maximum hysteresis
c) all of the mentioned
d) none of the mentioned
Answer: a
Explanation: To ensure that a negative fluctuation does not trigger an unwanted downward transition by pulling the i
nput down through VIT−, we must choose a minimum hysteresis of 0.3V.
a) detecting circuit
b) debouncing circuit
c) devaluing circuit
d) degenerating circuit
Answer: b
Explanation: The SPDT(single pole, double pole) switch can be used as a debouncing circuit of a switch.
10. Debouncing can be carried out at a hardware as well as the software end?
a) yes
b) no
c) cant be said
d) depends on the conditions
Answer: a
Explanation: Debouncing can be carried out at both the fronts both at the software as well as the hardware front, to c
arry out the process appropriately.
a) three
b) four
c) five
d) seven
Answer: c
Explanation: MSP430 has mainly five types of timers in it. They are Watchdog Timer, Basic Timer1, Real clock Ti
me, Timer_A, Timer_B.
a) true
b) false
c) cant be said
d) depends on the conditions
Answer: a
Explanation: A Watchdog Timer can act as an interval timer if the protection is not needed for it.
6. LCD_A controllers make use of the Basic Timer1 timer for providing a clock to the LCD?
a) true
b) false
c) cant be said
d) depends on the conditions
Answer: b
Explanation: Basic Timer1 is not used in LCD_A controllers, because these provide an internal clock of its own to al
l of its devices.
a) true
b) false
c) cant be said
d) depends on the conditions
Answer: a
Explanation: Real time clock is an extension of Basic Timer1 and is present in almost all devices for controlling its r
eal time clock.
a) generate interrupts
b) handle external inputs
c) drive outputs
d) all of the mentioned
Answer: d
Explanation: Timer_A can be used to generate the interrupts, handle the external inputs or for driving the outputs.
a) yes
b) no
c) cant be said
d) depends on the conditions
Answer: a
Explanation: Yes, time stamp inputs can be measured by a Timer_A.
a) sampling inputs
b) driving outputs
c) sampling inputs & driving outputs
d) none of the mentioned
Answer: b
Explanation: Timer_B is used for driving the outputs as with Timer_A but it lacks the property of Timer_A of sampl
ing inputs.
a) true
b) false
c) cant be said
d) depends on the conditions
Answer: a
Explanation: The watchdog timer is used for the protection of the device. It keeps a track at the counter so that the c
ode doesn’t reach an infinite unending loop. So it actually resets the counter before this particular condition.
a) it is a 16 bit register
b) it is guided against accidental writes that require a password
c) a reset will occur if a value with an incorrect password is written to WDTCTL
d) all of the mentioned
Answer: d
Explanation: WDTCTL is a 16 bit register that is used for protecting the microcontroller. It actually resets the value
when an incorrect password is written to WDTCTL.
4. Which of the following bits reads 0 under normal conditions but goes 1 when it wants to initiate some action?
a) WDTNMI
b) WDTHOLD
c) WDTTMSEL
d) WDTCNTCL
Answer: d
Explanation: WDTCNTCL is the bit that reads 0 under normal conditions but goes 1 when it wants to initiate some a
ction like resetting the counter.
a) petting
b) feeding
c) kicking
d) all of the mentioned
Answer: d
Explanation: the process of setting the WDTCNTCL bit in the WDTCTL register is by the processes like petting, fee
ding and kicking.
7. What is the function of this instruction “WDTCTL = WDTPW | WDTCONFIG”, where **#define WDTCONFIG
(WDTCNTCL|WDTSSEL)**
a) yes
b) no
c) cant be said
d) depends on the conditions
Answer: b
Explanation: No WDTCTL_bit.WDTCNTCL = 1; is an incorrect way of setting the bits of the WDTCTL register be
cause it violates the password protection.
9. Setting the WDTTMSEL bit of the WDTCTL register makes the watchdog timer act as
a) interrupt
b) communication device
c) converter
d) interval timer
Answer: d
Explanation: The WDTTMSEL bit of the WDTCTL register makes the watchdog timer act as the interval timer.
1. Which of the following is true about the FRFQx bits of the BTCTL register?
a) 2hz-256hz
b) 12hz-512hz
c) 128hz-1khz
d) 1khz-10khz
Answer: c
Explanation: For fACLK = 32khz, the desirable range of the fLCD is the fACLK/256 to fACLK/32. This value com
es out to be in the range of 128hz-1khz.
a) true
b) false
c) cant be said
d) depends on the conditions
Answer: a
Explanation: LCD’s controllers nowadays don’t require a clock pulse, so the only main function of the BTCNT1 is t
o provide a prescalar for the BNTCNT2.
a) true
b) false
c) cant be said
d) depends on the conditions
Answer: b
Explanation: BNTCNT2 has no outputs. Instead, it raises the BTIFG flag at a frequency determined by the BTIPx bi
ts.
6. RTCSEC, RTCMIN, RTCDOW etc. are the bytes of a set of registers that are used to store
a) seconds
b) minutes
c) days of a week
d) all of the mentioned
Answer: d
Explanation: The current time and date are held in a set of registers that contain the following bytes like RTCSEC, R
TCMIN, RTCHOUR, RTCDOW etc.
8. The RTC module makes use of the Basic Timer1 because of _________
a) yes
b) no
c) cant be said
d) depends on the conditions
Answer: a
Explanation: There is only one TAR in Timer_A so all of its channels share the same timer block.
a) RTC module in it
b) Compare/ capture channel
c) Communication channel
d) Converter channel
Answer: b
Explanation: Timer_A has compared/ capture channel inbuilt inside it.
6. TAxCCTLn is a _________
a) set of 2 bits used for selecting the mode of operation of the timer
b) a register of 8 bits used for giving the count to the timer
c) a register of 16 bits used to select the compare/capture channel of the Timer_Ax
d) a register of 16 bits used to cause the timer interrupt
Answer: c
Explanation: TAxCCTLn is a register of 16 bits used to select the compare/capture channel of the Timer_Ax.
a) ACLK
b) CAOUT
c) SCLK
d) TACLK
Answer: b
Explanation: CCI1B comes from CAOUT.
a) Capture/compare input. The selected input signal can be read by this bit
b) Synchronized capture/compare input. The selected CCI input signal is latched with the EQUx signal and can be re
ad from this bit
c) Holds the data for the comparison to the timer value in the Timer_A Register, TAR
d) None of the mentioned
Answer: c
Explanation: Compare mode: TAxCCRn holds the data for the comparison to the timer value in the Timer_A Regist
er, TAR.
a) true
b) false
c) cant be said
d) depends on the conditions
Answer: b
Explanation: Immediate mode offers no double buffering condition. As here, values are copied to TBCLn as soon as
they are written to TBCCRn.
5. The capture/compare registers TBCCRn are double-buffered when used for compare events?
a) true
b) false
c) cant be said
d) depends on the conditions
Answer: a
Explanation: The capture/compare registers TBCCRn are double-buffered when used for compare events.
a) 8 bits
b) 12 bits
c) 16 bits
d) all of the mentioned
Answer: d
Explanation: The length of TBR can be programmed to be 8, 12, 16 or 10 bits long.
a) a comparator
b) compare latch
c) controller
d) control logic
Answer: b
Explanation: TBCLn is actually a compare latch that is provided in its every channel.
1. Which of the following is the analog to digital converter that is present in the MSP430 based processors?
a) comparator
b) successive approximation ADC
c) sigma delta ADC
d) all of the mentioned
Answer: d
Explanation: A comparator module, a successive approximation ADC module and a sigma delta ADC converters are
found in the MSP based processors.
2. Higher resolution along with the slow speed is given by which ADC module?
a) comparator
b) successive approximation ADC
c) sigma delta ADC
d) all of the mentioned
Answer: c
Explanation: Higher resolution along with the slow speed is given by the sigma delta ADC module.
a) resolution
b) accuracy
c) precision
d) all of the mentioned
Answer: c
Explanation: The degree of closeness of the measured value to the actual true value is its accuracy, while on the othe
r hand the measure of the repeated accuracy is termed as the precision.
5. Resolution is _________
a) levelling
b) signalling
c) quantization
d) converting
Answer: c
Explanation: The process of reduction of a continuous input to a discrete output is called as quantization.
7. Which of the following functions can be used for converting the nearest integer to its argument?
a) int
b) mint
c) uint
d) nint
Answer: d
Explanation: nint is the function that is priorly used for converting the nearest integer to its argument.
a) remains constant
b) goes up
c) goes down
d) goes asymmetrically
Answer: b
Explanation: The SNR goes up with the number of bits.
10. The intervals between the samples are obtained from _________
a) Fs
b) Ts
c) Us
d) Ks
Answer: b
Explanation: The intervals between the samples is obtained by Ts that is equal to 1/fs.
a) CACTL1
b) CACTL2
c) CACTL1 & CACTL2
d) None of the mentioned
Answer: c
Explanation: Comparator_A+ is controlled by the CACTL1 and the CACTL2 registers.
a) start a timer
b) start an A/D conversion
c) switch on the comparator module
d) switch on the bit transmission
Answer: c
Explanation: CAON bit is used to switch on the comparator module namely, Comparator_A+.
5. Which of the following bits are not actually associated with the comparator module?
a) CAREFx
b) CLLDx
c) CAON
d) CAIFG
Answer: b
Explanation: CLLDx bit is related to the Timer_2 module. All others are related to the comparator module.
7. Setting a bit in the Port Disable register CAPD causes the circuits for the usual digital input and output buffers to
be disconnected from the appropriate pin.
a) true
b) false
c) cant be said
d) depends on the conditions
Answer: a
Explanation: Setting a bit in the Port Disable register CAPD causes the circuits for the usual digital input and output
buffers to be disconnected from the appropriate pin.
8. Which bit is used for exchanging the two inputs of the comparator and invert its output to compensate?
a) CAIFG
b) CASHORT
c) CAPD
d) CAEX
Answer: d
Explanation: CAEX is used for exchanging the two inputs of the comparator and invert its output to compensate.
a) true
b) false
c) cant be said
d) depends on the conditions
Answer: a
Explanation: When some variation is made in the value of Vcc, in the same manner, itself the value of the V+ chang
es because, the voltage from the potential divider is proportional to Vcc. This changing effect can be reduced if the s
imilar change takes place in the value of V- itself.
10. The relaxation oscillator circuit helps in _______
a) 8-10 bits
b) 10-12 bits
c) 12-16 bits
d) 16-32 bits
Answer: b
Explanation: The successive approximation converters have a resolution of about 10-12 bits in it.
2. In SAR based conversions, each bit typically requires one clock cycle (sometimes two) to make a comparison and
set up the new voltage.
a) true
b) false
c) cant be said
d) depends on the conditions
Answer: a
Explanation: In SAR based conversions, each bit typically requires one clock cycle (sometimes two) to make a com
parison and set up the new voltage.
3. The main operations that are basically performed in a SAR ADC are?
4. Usually, a capacitor is inserted between an analog input and the ground because
a) true
b) false
c) cant be said
d) depends on the conditions
Answer: b
Explanation: ADC12 needs external capacitors on its voltage reference as compared to the ADC10 module.
a) ADC10ON
b) ADC10MEM
c) ADC10BUSY
d) ADC10DF
Answer: c
Explanation: While conversion is in progress, then ADC10BUSY flag is set.
a) 4
b) 8
c) 16
d) all of the mentioned
Answer: d
Explanation: ADC10SHTx bits allow 4,8,16 and 64 cycles of the ADC10CLK.
10. The input to the ADC10 is selected from_______bits of the ADC10CTL1 register?
a) INCHx
b) ADC10SC
c) ADC10ON
d) ENC
Answer: a
Explanation: The input to the ADC10 is selected from the INCHx bits of the ADC10CTL1 register.
********** Join:- https://t.me/AKTU_Notes_Books_Quantum **********
a) 1 bit converter
b) 2 bit converter
c) 3 bit converter
d) 4 bit converter
Answer: a
Explanation: Sigma delta converter is a 1 bit converter.
a) yes
b) no
c) cant be said
d) depends on the conditions
Answer: b
Explanation: Sigma delta converter is having poor resolution quality.
a) final frequency
b) oversampling frequency
c) oversampling frequency/final frequency
d) final frequency/oversampling frequency
Answer: c
Explanation: Oversampling ratio is defined as the ration of the oversampling frequency fm to the final frequency fs.
a) subtraction
b) differentiation
c) integration
d) none of the mentioned
Answer: c
Explanation: In a sigma delta converter, sigma word represents that the output obtained from the delta function is get
ting integrated.
a) true
b) false
c) cant be said
d) depends on the conditions
Answer: a
Explanation: The second part of the ADC handles purely digital signals.
a) multipled by 10
b) multiplied by 100
c) divided by 10
d) divided by 100
Answer: c
Explanation: Decimated means to divide the result by 10.
a) sinc filter
b) sinc2 filter
c) sinc3 fiter
d) rect filter
Answer: c
Explanation: The SD16 has a second-order modulator with a sinc3 filter.
2. SPI, I2C, Asynchronous serial communication are the means of communicating a processor with its associate part
ners?
a) true
b) false
c) cant be said
d) depends on the conditions
Answer: a
Explanation: SPI, I2C, Asynchronous serial communication are the means for the processor by which communicatio
n is made possible.
a) true
b) false
c) cant be said
d) depends on the conditions
Answer: b
Explanation: Clock is the prior need for any communication to occur. This is because synchronization is maintained
with the help of a clock.
a) less
b) same
c) more
d) depends on the conditions
Answer: c
Explanation: In SPI, there is no control of transmission in software—no addresses or acknowledgment, that’s why it
requires more amount of wires.
a) SPI
b) I2C
c) SPI & I2C
d) None of the mentioned
Answer: c
Explanation: USI(Universal Serial Interface) supports both the types of synchronous communication i.e. SPI and I2
C.
a) one channel
b) two channels
c) three channels
d) four channels
Answer: b
Explanation: USCI consists of mainly two channels, A and B. These are largely independent but share a few register
s and interrupt vectors.
a) A
b) B
c) C
d) D
Answer: a
Explanation: Channel A is the asynchronous receiver/ transmitter channel. It can detect the baud rate of an incoming
signal, which enables its use on a local interconnect network (LIN).
a) yes
b) no
c) depends on the conditions
d) cant be said
Answer: a
Explanation: Yes, one device can have more than one USC interfaces. There is a small difference because the interru
pt flags and enable bits for the “0” modules are in a special function registers IFG2 and IE2, while those for the “1”
modules are in their own registers, UC1IFG and UC1IE.
a) synchronous masters
b) synchronous slaves
c) asynchronous masters
d) asynchronous slaves
Answer: d
Explanation: Synchronous slaves are the most difficult to attain because the problem is that the slave must react quic
kly when a clock transition arrives from the master.
a) SPI
b) I2C
c) Asynchronous Serial Communication
d) All of the mentioned
Answer: c
Explanation: Timer_A is used in the Asynchronous Serial Communication.
a) yes
b) no
c) cant be said
d) depends on the conditions
Answer: a
Explanation: Yes, SPI is a technique where a data can be transmitted/ received in both the directions.
a) two counters
b) four flip flops
c) two shift registers
d) four steady state machines
Answer: c
Explanation: The concept of the SPI is based on the two shift registers, one for the transmitter and the other is there f
or the receiver terminal.
3. Writing on the trailing edge of the clock pulse and reading on the leading edge of the clock pulse is done when
a) CPHA is set
b) CPHA is reset
c) CPOL is set
d) CPOL is reset
Answer: b
Explanation: When CPHA is reset to zero, then writing on the trailing edge of the clock pulse and reading on the lea
ding edge of the clock pulse.
a) yes
b) no
c) cant be said
d) depends on the conditions
Answer: b
Explanation: CPKL=CPOL and CPKH=(not CPHA).
a) P1.0-2
b) P1.2-4
c) P1.4-6
d) P1.5-7
Answer: d
Explanation: SCLK, SDO, and SDI are found at P1.5-7 on F20x3.
a) true
b) false
c) cant be said
d) depends on the conditions
Answer: a
Explanation: Transmission and reception occur at a time in SPI. This means that a value is received only if the trans
mitter is active.
a) empty, reset
b) having one byte, reset
c) full, reset
d) empty, two
Answer: c
Explanation: When the buffer is full, the low power mode is cleared.
a) CLK
b) MISO
c) SDA
d) All of the mentioned
Answer: c
Explanation: The I2C bus uses only two lines. They are SDA and SCL.
a) yes
b) no
c) depends on the conditions
d) cant be said
Answer: b
Explanation: I2C is a slower means of transfer than SPI because here only one line is there for the two way commun
ication to occur.
a) true
b) false
c) cant be said
d) depends on the conditions
Answer: a
Explanation: Yes, in I2C protocol each slave has its own unique address, in order to differentiate it from others.
6. Which of the following is an issue while programming I2C using the software?
a) open-collector output
b) open-drain output
c) totem pole output
d) all of the mentioned
Answer: b
Explanation: There are two main issues while programming I2C using software, they are the open-drain output and t
he detection of start and stop conditions.
7. Which of the following is the slave to be addressed when a device acts as a master?
a) UCB0I2COA
b) UCB0I2CSA
c) UCB0I2CIE
d) All of the mentioned
Answer: b
Explanation: UCB0I2CSA is the slave to be addressed when a device acts as a master.
a) yes
b) no
c) cant be said
d) depends on the conditions
Answer: a
Explanation: Yes, baud rate is also selected in the I2C module, as is the case with the SPI module.
1. Asynchronous serial communication usually requires two wires for each direction plus a common ground.
a) true
b) false
c) cant be said
d) depends on the conditions
Answer: b
Explanation: Asynchronous serial communication usually requires only a single wire for each direction plus a comm
on ground.
2. In an asynchronous mode of transmission, usually the data is sent along with the
3. The _____ rate gives the frequency at which the bits are transmitted on the line.
a) bit rate
b) packet rate
c) baud rate
d) data rate
Answer: c
Explanation: Baud rate is the rate which determines us the frequency at which the bits are transmitted on the line.
4. Baud rate is the reverse of the ________
a) baud time
b) baud period
c) bit time
d) bit period
Answer: b
Explanation: Baud rate is the reverse of the baud period.
a) yes
b) no
c) cant be said
d) depends on the conditions
Answer: b
Explanation: No clock is transmitted in the asynchronous communication, so the transmitter and the receiver are allo
wed to work independently at their own terminals.
a) high
b) low
c) same
d) changed
Answer: b
Explanation: Framing error occurs if the bit is low.
a) the bits are either high or low and have no gaps between them
b) the bits are either high or low and have gaps between them
c) the bits are high and have gaps between them
d) the bits are low and have no gaps between them
Answer: a
Explanation: Non-return to zero format represents a format in which the bits are either high or low and have no gaps
between them.
a) true
b) false
c) cant be said
d) depends on the conditions
Answer: a
Explanation: In non-return to zero format, normally LSB is sent first.
a) 1
b) 2
c) 3
d) 4
Answer: c
Explanation: they are 3 clocks in the USCI_A. They are BRCLK, BITCLK and BITCLK16.
Date-16/06/2021
Subject Name-KCS-403-Microprocessor_CSE-Semester 4
UNIT-1
a. 0030H
b. 0024H
c. 0048H
d. 0060H
Answer: (a).0030H
d. end of program
3. What is SIM?
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
a. MROM
b. PROM
c. EPROM
d. EEPROM
Answer: (a).MROM
a. MROM
b. PROM
c. FROM
d. FPROM
Answer: (b).PROM
a. Micro-operations
b. Macro-operations
c. Multi-operations
d. Bi control-operations
Answer: (b).Macro-operations
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
a. incremented by one.
d. data processing with registers takes fewer cycles than that with memory
Answer: (d).data processing with registers takes fewer cycles than that with memory
b. A fetch cycle
12. The output data lines of microprocessor and memories are usually tristated
because
a. More than one device can transmit information over the data bus by enabling
only one device at a time
b. More than one device can transmit over the data bus at the same time
c. The data line can be multiplexed for both input and output
Answer: (a).More than one device can transmit information over the data bus by
enabling only one device at a time
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
13. The correct sequence of steps in the instruction cycle of a basic computer is
14. The register which holds the information about the nature of results of
arithmetic and logic operations is called as
a. Accumulator
c. Flag register
a. 1, 2, 3 and 4
b. 1, 2 and 3
c. 1 and 2 only
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
d. 3 and 4 only
17. Both the ALU and control section of CPU employ which special purpose
storage location?
a. Buffers
b. Decoders
c. Accumulators
d. Registers
Answer: (c).Accumulators
c. all the registers and counters are being reset and this signal can be used to
reset external support chip
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
Answer: (c).all the registers and counters are being reset and this signal can be
used to reset external support chip
20. The content of the A15-A8 (higher order address lines) while executing “IN
8-bit port address” instruction are
b. irrelevant
a. TRAP
b. RST 7.5
d. RST 6.5
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
22. Which one of the following instruction may be used to clear the
accumulator content irrespective of its initial value?
a. CLR A
b. ORA A
c. SUB A
d. MOV A, 00H
Answer: (c).SUB A
23. ___________ signal prevent the microprocessor from reading the same data
more than one.
a. pipelining
b. handshaking
c. controlling
d. signaling
Answer: (b).handshaking
24. Data transfer between the microprocessor for peripheral takes place
through __________.
a. I/O port
b. input port
c. output port
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
d. multi port
a. +5V
b. -5V
c. -10V
d. +10V
Answer: (a).+5V
26. The _______ allow data transfer between memory and peripherals.
a. DMA technique
b. Microprocessor
c. Register
d. Decoder
a. P2
b. P4
c. P6
d. P8
Answer: (c).P6
29. The number of hardware chips needed for multiple digit display can be
minimized by using the technique called ______.
a. interfacing
b. multiplexing
c. demultiplexing
d. multiprocessing
Answer: (b).multiplexing
a. a parallel interface
b. a serial interface
c. printer interface
d. a modem interface
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
a. medium voltage
b. higher voltage
c. lower voltage
c. interrupt is Masked
a. clock
d. signal bus
36. The advantage of memory mapped I/O over I/O mapped I/O is _________
a. faster operation
37. In 8279 Status Word, data is read when ________ pins are low, and write to
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
38. In 8279, the keyboard entries are de bounced and stored in an _________,
that is further accessed by the CPU to read the key codes.
a. 8-bit FIFO
b. 8-byte FIFO
c. 16 byte FIFO
d. 16 bit FIFO
39. For the most Static RAM the write pulse width should be at least
a. 10 ns
b. 60 ns
c. 300 ns
d. 350 ns
Answer: (b).60 ns
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
a. Motorala
b. Intel
c. Stephen Mors
d. HCL
Answer: (b).Intel
a. bidirection
b. unidirection
c. mulidirection
d. circular
Answer: (b).unidirection
a. 40
b. 45
c. 20
d. 35
Answer: (a).40
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
a. +5V
b. -5V
c. +12V
d. -12V
Answer: (a).+5V
44. Which is used to store critical pieces of data during subroutines and
interrupts ?
a. Stack
b. Queue
c. Accumulator
d. Data register
Answer: (a).Stack
a. Pushing data
b. Pushed
c. Pulling
d. None of these
46. The external system bus architecture is created using from ______
architecture.
a. Pascal
b. Dennis Ritchie
c. Charles Babbage
d. Von Neumann
b. Compiler
c. Operating system
d. All of these
a. Auxiliary
b. Backup store
c. Both A and B
d. None of these
49. The lower red curvy arrow show that CPU places the address extracted
from the memory location on the_____.
a. Address bus
b. System bus
c. Control bus
d. Data bus
50. The CPU sends out a ____ signal to indicate that valid data is available on
the data bus.
a. Read
b. Write
c. Both a and b
d. None of these
Answer: (b).Write
UNIT-2
1. In 8085 microprocessor, how many interrupts are maskable.
a. Two
b. Three
c. Four
d. Five
Answer. c
2. Which stack is used in 8085 microprocessors?
a. FIFO
b. FILO
c. LIFO
d. LILO
Answer. c
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
3. In the instruction of the 8085 microprocessor, how many bytes are present?
a. One or two
b. One, two or three
c. One only
d. Two or three
Answer. b
4. Which one of the following addressing technique is not used in 8085
microprocessor?
a. Register
b. Immediate
c. Register indirect
d. Relative
Answer. d
5. Which one of the following register of 8085 microprocessor is not a part of the
programming model?
a. Instruction register
b. Memory address register
c. Status register
d. Temporary data register
Answer. c
6. The program counter in 8085 microprocessor is a 16-bit register, because
a. It counts 16 bits at a time
b. There are 16 address times
c. It facilitates the users storing 16-bit data temporarily
d. It has to fetch two 8-bit data at a time.
Answer. b
7. A direct memory access (DMA) transfer replies
a. Direct transfer of data between memory and accumulator
b. Direct transfer of data between memory and I/O devices without the use of
microprocessor
c. Transfer of data exclusively within microprocessor registers
d. A fast transfer of data between microprocessor and I/O devices
Answer. b
8. Handshaking mode of data transfer is
a. Synchronous data transfer
b. asynchronous data transfer
c. interrupt driven data transfer
d. level Mode of DMA data transfer
Answer. a
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
a. Micro-operations
b. Macro-operations
c. Multi-operations
d. Bi control-operations
Answer. c
27. Consider the following registers:
1. Accumulator and flag register
2. B and C registers
3. D and E registers
4. H and L registers
Which of these 8-bit registers of 8085 μP can be paired together to make a 16-bit
register?
a. (a) 1, 3 and 4
b. 2, 3 and 4
c. 1, 2 and 3
d. 1, 2 and 4
Answer. b
28. The first microprocessor to include virtual memory in the Intel
microprocessor family is
a. 80286
b. 80386
c. 80486
d. Pentium
Answer. a
29. Program counter in a digital computer
a. counts the numbers of programs run in the machine ,
b. counts the number of times a subroutine is called
c. counts the number of times the loops are executed
d. points the memory address of the current or the next instruction to be
executed
Answer
Answer. d
30. Assuming LSB is at position 0 and MSB at position 7, which bit positions are
not used (undefined) in Flag Register of an 8085 microprocessor?
a. 1, 3, 5
b. 2, 3, 5
c. 1, 2, 5
d. 1, 3, 4
Answer. a
31. At the beginning of a fetch cycle, the contents of the program counter are
a. incremented by one
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
c. T3 and T4
d. T4 and T1
Answer. c
37. Which one of the following circuits transmits two messages simultaneously in
one direction?
a. Duplex
b. Diplex
c. Simplex
d. Quadruplex
Answer. b
38. A microprocessor is ALU
a. and control unit on a single chip
b. and memory on a single chip
c. register unit and I/O device on a single chip
d. register unit and control unit on a single chip
Answer. d
39. In Intel 8085 microprocessor, ALE signal is made high to
a. Enable the data bus to be used as low order address bus
b. To latch data D0— D7 from the data bus
c. To disable data bus
d. To achieve all the functions listed above
Answer. a
40. Output of the assembler in machine codes is referred to as
a. Object program
b. Source program
c. Macro instruction
d. Symbolic addressing
Answer. a
41. Which one of the following statements for Intel 8085 is correct?
a. Program counter (PC) specifies the address of the instruction last executed
b. PC specifies the address of the instruction being executed
c. PC specifies the address of the instruction be executed
d. PC specifies the number of instruction executed so far
Answer. c
42. The instruction RET executes with the following series of machine cycle
a. Fetch, read, write
b. Fetch, write, write
c. Fetch, read, read
d. Fetch, read
Answer. c
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
43. Which one of the following statements is correct regarding the instruction
CMP A?
a. Compare accumulator with register A
b. Compare accumulator with memory
c. Compare accumulator with register H
d. This instruction does not exist
Answer. a
44. The instruction JNC 16-bit refers to jump to 16-bit address if
a. Sign flag is set
b. Carry flag is reset
c. Zero flag is set
d. Parity flag is reset
Answer. b
45. Consider the following interrupts for 8085 microprocessor:
1. INTR
2. RST 5.5
3. RST 6.5
4. RST 7.5
5. TRAP
If the interrupt is to be vectored to any memory location then which of the above
interrupt is/are correct?
a. 1 and 2 only
b. 1, 2, 3 and 4
c. 5 only
d. 1 only
Answer. d
46. Consider the following statements:
1. Auxiliary carry flag is used only by the DAA and DAS instruction.
2. Zero flag is set to 1 if the two operands compared are equal.
3. All conditional jumps are long type jumps.
Which of the above statements are correct?
a. 1, 2 and 3 only
b. 1 and 2 only
c. 1 and 3 only
d. 2 and 3 only
Answer. b
47. Among the given instructions, the one which affects maximum number of
flags is
a. RAL
b. POP PSW
c. XRA A
d. DCR A
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
Answer. c
48. XCHG instruction of 8085 exchanges the content of
a. top of stack with contents of register pair
b. BC and DE register pairs
c. HL and DE register pairs
d. None of the above
Answer. c
49. Direction flag is used with
a. String instructions
b. Stack instructions
c. Arithmetic instructions
d. Branch instructions
Answer. a
50. What will be the contents of DE and HL register pairs respectively after the
execution of the following instructions?
LXIH, 2500 H
LXID, 0200 H
DAD D
XCHG
a. 0200 H, 2500 H
b. 0200 H, 2700 H
c. 2500 H, 0200 H
d. 2700 H, 0200 H
Answer. d
UNIT-3
51. In 8085 microprocessor, the address for ‘TRAP’ interrupt is
a. 0024 H
b. 002C H
c. 0034 H
d. 003C H
Answer. a
52. A ‘DAD H” instruction is the same as shifting each bit by one position to the
a. left
b. right
c. left with a zero inserted in LSB position
d. right with a zero inserted in LSB position
Answer. c
53. When a program is being executed in an 8085 microprocessor, its program
counter contains
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
a.
the memory address as the instruction that is to be executed next.
b.
the memory address of the instruction that is being currently matched.
c.
the total number of instructions in the program being executed.
d.
the number of instructions in the current program that have already been
executed.
Answer. a
54. Which of the following data transfer is not possible in microprocessor?
a. Memory to accumulator
b. Accumulator to memory
c. Memory to memory
d. I/O device to accumulator
Answer. c
55. LOADER is a program that
a. loads the memories and generates a hex file
b. loads the hex file and converts to the executable file
c. loads the COM file and generates the binary code
d. loads English like command and generates the binary code
Answer. b
56. Which of the following instructions is closest match to the instruction POP
PC?
a. RET
b. PCHL
c. POP PSW
d. DAD SP
Answer. a
57. How many machine cycles are required by STA instruction?
a. 2
b. 3
c. 4
d. 5
Answer. c
58. Which of the following 8085 instruction will require maximum T-states for
execution?
a. XRI byte
b. STA address
c. CALL address
d. JMP address
Answer. c
59. In 8085 microprocessor, which mode of addressing does the instruction CMP
M use?
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
a. Direct addressing
b. Register addressing
c. Indirect addressing
d. Immediate addressing
Answer. c
60. With reference to 8085 microprocessor, which of the following statements
are correct?
1. INR is 1 byte instruction
2. OUT is 2 byte instruction
3. STA is 3 byte instruction
a. 1 and 2 only
b. 2 and 3 only
c. 1 and 3 only
d. 1, 2 and 3
Answer. d
61. Assume that the accumulator and the register C of 8085 microprocessor
contain respectively F0 H
and OF H initially. What will be the content of accumulator after execution of
instruction ADD C?
a. 00 H
b. FF H
c. EF H
d. FE H
Answer. b
62. It is desired to multiply the numbers 0A H by OB H and store the result in the
accumulator. The numbers are available in registers B and C respectively. A part
of the 8085 program for this purpose is given below:
MVI A, OO H
Loop; ………..
………..
………..
HLT END
The sequence of instruction to complete the program would be
a. JNZ LOOP; ADD B, DCR C
63. Find the content of the accumulator after the execution of the following
program:
MVI A, F0 H
ORI FF H
XRI F0 H
a. 00 H
b. F0 H
c. 0F H
d. FF H
Answer. c
64. The following program starts at location 0100 H
LXI SP, 00FF
LXI H, 0701 H
MVI A, 20 H
SUB M
The content of accumulator when the program counter reaches 0107 H is
a. 20 H
b. 02 H
c. 00 H
d. FF H
Answer. c
65. The difference between 8085 instructions RST n and PCHL is
a. RST n is equivalent to a sub-routine call while PCHL is equivalent to
unconditional branch.
b. RST n uses direct addressing while PCHL uses register indirect addressing.
c. RST n is a software interrupt while PCHL simulates a hardware interrupt
d. RST n resets the processor while PCHL restarts the processor.
Answer. a
66. The content of accumulator are 70 H. Initially all flags are zero. What will be
values of CY and S after executing instruction RLC?
a. CY = 0 and S = 0
b. CY = 1 and S = 1
c. CY = 1 and S = 0
d. CY = 0 and S = 1
Answer. d
67. A software delay subroutine is written as given below:
DELAY: MVI H, 255D H
MVI L, 255D H
LOOP: DCR L
JNZ LOOP
DCR H
JNZ LOOP
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
a. 255
b. 510
c. 65025
d. 65279
Answer. d
68. What is content of accumulator of 8085 microprocessor after the execution of
XRI F0 H instruction?
a. Only the upper nibble of accumulator is complemented
b. Only the lower nibble is complemented
c. Only the upper nibble is reset to zero
d. Only the lower nibble is reset to zero
Answer. a
69. The 8085 programming manual says that it takes seven T states to fetch and
execute the MOV instruction. If the system clock has a frequency of 2.5 MHz, how
long is an instruction Cycle?
a. 2.8 s
b. 2.5ns
c. 2.8 ns
d. 2.8 μs
Answer. d
70. The instruction PCHL, in 8085 is used for
a. STA address
b. LDAX B
c. LHLD address
d. LDA address
Answer. a
72. The instruction that exchanges top of stack with HL pair is
a. XTHL
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
b. SPHL
c. PUSH H
d. POP H
Answer. a
73. In 8085 microprocessor, during PUSH PSW Operation, Stack pointer is
a. Decremented by one
b. Decremented by two
c. Incremented by one
d. Incremented by two
Answer. b
74. While a program is being executed in an Intel 8085 microprocessor, the
program counter of the microprocessor contains:
a. The memory address of the instruction that is being currently executed.
b. The memory address of the instruction that is to be executed next.
c. The number of instructions that have already been executed.
d. The total number of instructions in the current program still to be
executed.
Answer. b
75. The description of a program counter (PC) in 8085 microprocessor is
a. An up/down counter
b. An 8-bit register
c. Initialized automatically by microprocessor
d. Used to point to stack memory area
Answer. c
76. If the status of the control lines SI and SO is LOW, then 8085 microprocessor
is performing
a. Reset operation
b. HOLD operation
c. Halt operation
d. Interrupt acknowledge
Answer. c
77. LXI SP, 7FFF H
MVI A, 25 H
XRI 02 H
PUSH PSW
POP H
MOV A,L
ORI 10 H
HLT
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
What are the contents of A, H, L, SP and PSW registers after executing the above
set of instructions? Assume undefined flags always remain clear.
a. 10H, 25H, 00H, 7FFFH, 00H respectively
b. 14H, 27H, 04H, 7FFFH, 04H respectively
c. 14H, 25H, 00H. 7FFFH, 04H respectively
d. 10H, 27H, 04H, 7FFFH, 00H respectively
Answer. b
78. The content of the programme counter of an 8085 microprocessor is
a. the total number of instructions in the program already executed.
a. ADI
b. ACI
c. ADC
d. ADD
Answer. b
80. MVI A, AA H
ORI FFH
RRC
RRC
CMC
INR A
What are the contents of A and PSW registers after executing the above set of
instructions in sequence?
a. AAH and 00H
b. FFH and 66H
c. 00H and 54H
d. 00H and 00H
Answer. c
81. For which one of the following, the instruction XRA A in 8085 microprocessor
can be used?
a. Set the carry flag
b. Set the zero flag
c. Reset the carry flag and clear the accumulator
d. Transfer FFH to the accumulator
Answer. b
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
Answer. b
85. When the operand requires for instruction is stored inside the processor, then
What this addressing mode is called?
a. Direct
b. Register
c. Implicit
d. Immediate
Answer. b
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
86. Which one of the following addressing technique is not used in 8085
microprocessor?
a. Register
b. Immediate
c. Register indirect
d. Relative
Answer. d
87. In an instruction of 8085 microprocessor, how many bytes are present?
a. One or two
b. One, two or three
c. One only
d. Two or three
Answer. b
88. Which one is the indirect addressing mode in the following instructions?
a. LXI H 2050 H
b. MOV A, B
c. LDAX B
d. LDA 2050 H
Answer. c
89. The addressing mode used in the instruction JMP F347 H in case of an Intel
8085A microprocessor is which one of the following?
a. Direct
b. Register—indirect
c. Implicit
d. Immediate
Answer. d
90. Carry flag is not affected after the execution of
a. ADD B
b. SBB B
c. INR B
d. ORA B
Answer. c
91. The contents of the Program Counter (PC), when the microprocessor is
reading from 2FFF H memory location, will be
a. 2FFE H
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
b. 2FFF H
c. 3000 H
d. 3001 H
Answer. c
92. If the HLT instruction of an Intel 8085A microprocessor is executed
a. the microprocessor is disconnected from the system bus till the RESET is
pressed.
b. the microprocessor halts the execution of the program and returns to the
monitor.
c. the microprocessor enters into a HALT state and the buses are tri-stated.
d. the microprocessor reloads the program counter from the locations 0024 H
and 0025 H.
Answer. c
93. The stack pointer of an 8085 A microprocessor contains ABCD H.
PUSH PSW
XTHL
PUSH D
JMP EC75 H
At the end of the execution of the above instructions, what would be the content
of the stack pointer?
a. ABCB H
b. ABCA H
c. ABC9 H
d. ABC8 H
Answer. c
94. In an Intel 8085 A, what is the content of the Instruction Register (IR)?
Answer. c
96. Which one of the following statement does not describe
property/characteristic of a stack pointer register in 8085 microprocessor?
a. MVI A
b. LDAX B
c. JMP 2050 H
d. MOV A,M
Answer. c
98. In 8085, the DAA instruction is used for
UNIT-4
ANS: B
ANS: C
ANS: C
4) How many memory locations are required to store the instruction LXIH,
0800H in an 8085 assembly language program?
A) 1
B) 2
C) 3
D) 4
ANS: B
ANS: A
6) In 8085 microprocessor, the value of the most significant bit of the result
following the execution of any arithmetic or Boolean instruction is stored in
the
A) carry status flag
B) auxiliary carry status flag
C) sign status flag
D) zero status flag
ANS: C
ANS: B
ANS: C
Answer: c
Clarification: An assembler is a software used to convert the programs into
machine instructions.
12) The instructions like MOV or ADD are called as ______
a) OP-Code
b) Operators
c) Commands
d) None of the mentioned
Answer: a
Clarification: This OP – codes tell the system what operation to perform on the
operands.
13) The alternate way of writing the instruction, ADD #5,R1 is ______
a) ADD [5],[R1];
b) ADDI 5,R1;
c) ADDIME 5,[R1];
d) There is no other way
Answer: b
Clarification: The ADDI instruction, means the addition is in immediate
addressing mode.
14) Instructions which won’t appear in the object program are called as
_____
a) Redundant instructions
b) Exceptions
c) Comments
d) Assembler Directives
Answer: d
Clarification: The directives help the program in getting compiled and hence
won’t be there in the object code.
15) The assembler directive EQU, when used in the instruction: Sum EQU
200 does ________
a) Finds the first occurrence of Sum and assigns value 200 to it
b) Replaces every occurrence of Sum with 200
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
Answer: b
Clarification: This basically is used to replace the variable with a constant value.
16) The purpose of the ORIGIN directive is __________
a) To indicate the starting position in memory, where the program block is
to be stored
b) To indicate the starting of the computation code
c) To indicate the purpose of the code
d) To list the locations of all the registers used
Answer: a
Clarification: This does the function similar to the main statement.
17) The directive used to perform initialization before the execution of
the code is ______
a) Reserve
b) Store
c) Dataword
d) EQU
Answer: c
Clarification: None.
18) _____ directive is used to specify and assign the memory required for
the block of code.
a) Allocate
b) Assign
c) Set
d) Reserve
Answer: d
Clarification: This instruction is used to allocate a block of memory and to store
the object code of the program there.
19) _____ directive specifies the end of execution of a program.
a) End
b) Return
c) Stop
d) Terminate
Answer: b
Clarification: This instruction directive is used to terminate the program
execution.
20) The last statement of the source program should be _______
a) Stop
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
b) Return
c) OP
d) End
Answer: d
Clarification: This enables the processor to load some other process.
21) When dealing with the branching code the assembler ___________
a) Replaces the target with its address
b) Does not replace until the test condition is satisfied
c) Finds the Branch offset and replaces the Branch target with it
d) Replaces the target with the value specified by the DATAWORD directive
Answer: c
Clarification: When the assembler comes across the branch code, it immediately
finds the branch offset and replaces it with it.
22) The assembler stores all the names and their corresponding values in
______
a) Special purpose Register
b) Symbol Table
c) Value map Set
d) None of the mentioned
Answer: b
Clarification: The table where the assembler stores the variable names along with
their corresponding memory locations and values.
23) The assembler stores the object code in ______
a) Main memory
b) Cache
c) RAM
d) Magnetic disk
Answer: d
Clarification: After compiling the object code, the assembler stores it in the
magnetic disk and waits for further execution.
24) The utility program used to bring the object code into memory for
execution is ______
a) Loader
b) Fetcher
c) Extractor
d) Linker
Answer: a
Clarification: The program is used to load the program into memory.
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
Answer: d
Clarification: This creates entries into the symbol table first and then creates the
object code.
26) In 8085 microprocessor, the address for ‘TRAP’ interrupt is
a. 0024 H
b. 002C H
c. 0034 H
d. 003C H
Answer. a
27) A ‘DAD H” instruction is the same as shifting each bit by one position
to the
a. left
b. right
c. left with a zero inserted in LSB position
d. right with a zero inserted in LSB position
Answer. c
28) When a program is being executed in an 8085 microprocessor, its
program counter contains
a. the memory address as the instruction that is to be executed next.
b. the memory address of the instruction that is being currently matched.
c. the total number of instructions in the program being executed.
d. the number of instructions in the current program that have already been
executed.
Answer. a
29) Which of the following data transfer is not possible in
microprocessor?
a. Memory to accumulator
b. Accumulator to memory
c. Memory to memory
d. I/O device to accumulator
Answer. c
30) LOADER is a program that
a. loads the memories and generates a hex file
b. loads the hex file and converts to the executable file
c. loads the COM file and generates the binary code
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
a. 20 H
b. 02 H
c. 00 H
d. FF H
Answer. c
40) The difference between 8085 instructions RST n and PCHL is
a. RST n is equivalent to a sub-routine call while PCHL is equivalent to
unconditional branch.
b. RST n uses direct addressing while PCHL uses register indirect addressing.
c. RST n is a software interrupt while PCHL simulates a hardware interrupt
d. RST n resets the processor while PCHL restarts the processor.
Answer. a
41) The content of accumulator are 70 H. Initially all flags are zero. What
will be values of CY and S after executing instruction RLC?
a. CY = 0 and S = 0
b. CY = 1 and S = 1
c. CY = 1 and S = 0
d. CY = 0 and S = 1
Answer. d
42) A software delay subroutine is written as given below:
DELAY: MVI H, 255D H
MVI L, 255D H
LOOP: DCR L
JNZ LOOP
DCR H
JNZ LOOP
How many times DCR instruction will be executed?
a. 255
b. 510
c. 65025
d. 65279
Answer. d
43) What is content of accumulator of 8085 microprocessor after the
execution of XRI F0 H instruction?
a. Only the upper nibble of accumulator is complemented
b. Only the lower nibble is complemented
c. Only the upper nibble is reset to zero
d. Only the lower nibble is reset to zero
Answer. a
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
44) The 8085 programming manual says that it takes seven T states to
fetch and execute the MOV instruction. If the system clock has a frequency
of 2.5 MHz, how long is an instruction Cycle?
a. 2.8 s
b. 2.5ns
c. 2.8 ns
d. 2.8 μs
Answer. d
45) The instruction PCHL, in 8085 is used for
a. STA address
b. LDAX B
c. LHLD address
d. LDA address
Answer. a
47) The instruction that exchanges top of stack with HL pair is
a. XTHL
b. SPHL
c. PUSH H
d. POP H
Answer. a
48) In 8085 microprocessor, during PUSH PSW Operation, Stack pointer
is
a. Decremented by one
b. Decremented by two
c. Incremented by one
d. Incremented by two
Answer. b
49) While a program is being executed in an Intel 8085 microprocessor,
the program counter of the microprocessor contains:
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
UNIT-5
1. The block of 8237 that decodes the various commands given to the 8237 by the
CPU is
a) timing and control block
b) program command control block
c) priority block
d) none of the mentioned
Answer: b
Explanation: The program control block decodes various commands given to the
8237 by the CPU before servicing a DMA request.
2. The priority between the DMA channels requesting the services can be
resolved by
a) timing and control block
b) program command control block
c) priority block
d) none of the mentioned
Answer: c
Explanation: The priority encoder block resolves the priority between the DMA
channels requesting the services.
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
Answer: b
Explanation: The current address register holds the current memory address. The
current address register is accessed during the DMA transfer.
4. The register that holds the data byte transfers to be carried out is
a) current word register
b) current address register
c) base address register
d) command register
Answer: a
Explanation: The current word register is a 16-bit register that holds the data
transfers. The word count is decremented after each transfer, and the new value
is stored again in the register.
5. When the count becomes zero in the current word register then
a) Input signal is enabled
b) Output signal is enabled
c) EOP (end of process) is generated
d) Start of process is generated
Answer: c
Explanation: When the count becomes zero, the EOP signal is generated. This can
be written in successive bytes by the CPU, in program mode.
Answer: c
Explanation: The contents of base address register cannot be read by the CPU.
These contents are used internally for auto-initialization.
8. The register that maintains an original copy of the respective initial current
address register and current word register is
a) mode register
b) base address register
c) command register
d) mask register
Answer: b
Explanation: The base address register maintains an original copy of the current
address register and current word register, before incrementing or
decrementing.
Answer: d
Explanation: The address is automatically incremented or decremented after
each DMA transfer, and the resulting address value is again stored in the current
address register.
Answer: d
Explanation: Memory read, memory write and verify transfer are the three types
of DMA transfer.
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
a. 24
b. 20
c. 32
d. 40
Answer: d. 40
Question 2: In which mode do all the Ports of the 8255 PPI work as Input-Output
units for data transfer?
a. BSR mode
b. Mode 0 of I/O mode
c. Mode 1 of I/O mode
d. Mode 2 of I/O mode
Question 3: Which of the following pins are responsible for handling the on the
Read Write control logic unit of the 8255 PPI?
a. CS'
b. RD'
c. WR'
d. ALL of the above
a. BSR mode
b. Mode 0 of I/O mode
c. Mode 1 of I/O mode
d. Mode 2 of I/O mode
Question 5: How many bits of data can be transferred between the 8255 PPI and
the interfaced device at a time? or What is the size of internal bus of the 8255
PPI?
a. 16 bits
b. 12 bits
c. 8 bits
d. None of the above
Answer: c. 8 bits
Question 6: Which port of the 8255 PPI is capable of performing the handshaking
function with the interfaced devices?
a. Port A
b. Port B
c. Port C
d. All of the above
Answer: c. Port C
Question 7: In which of the following modes of the 8255 PPI, only port C is taken
into consideration?
a. BSR mode
b. Mode 0 of I/O mode
c. Mode 1 of I/O mode
d. Mode 2 of I/O mode
Question 8: In mode 2 of I/O mode, which of the following ports are capable of
transferring the data in both the directions?
a. Port A
b. Port B
c. Port C
d. All of the above
Answer: a. Port A
Question 9: In which of the following modes we do not consider the D6, D5 and
D4 bits of the control word?
a. BSR mode
b. Mode 0 of I/O mode
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
Question 10: How many data lines in total are there in the 8255 PPI IC?
a. 8 data lines
b. 32 data lines
c. 24 data lines
d. None of the above
1. The number of counters that are present in the programmable timer device
8254 is
a) 1
b) 2
c) 3
d) 4
Answer: c
Explanation: There are three counters that can be used as either counters or
delay generators.
Answer: b
Explanation: The control word register can only be written and cannot be read.
3. The mode that is used to interrupt the processor by setting a suitable terminal
count is
a) mode 0
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
b) mode 1
c) mode 2
d) mode 3
Answer: a
Explanation: Mode 0 is also called as an interrupt on the terminal count.
4. In mode 2, if N is loaded as the count value, then after (N-1) cycles, the output
becomes low for
a) 1 clock cycle
b) 2 clock cycles
c) 3 clock cycles
d) 4 clock cycles
Answer: a
Explanation: After (N-1) cycles, the output becomes low for only 1 clockcycle. If
the count N is reloaded and again the output becomes high and remains so for (N-
1) clock pulses.
Answer: c
Explanation: When the count N loaded is even, then for half of the count, the
output remains high and for the remaining half it remains low. If the count loaded
is odd, the first clock pulse decrements it by 1 resulting in an even count value.
6. In control word register, if SC1=0 and SC0=1, then the counter selected is
a) counter 0
b) counter 1
c) counter 2
d) none
Answer: b
Explanation: SC denotes select counter.
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
Answer: c
Explanation: To access 16 bit, first LSB is loaded first, and then MSB.
Answer: b
Explanation: If BCD=0 then hexadecimal count. If BCD=1, then the operation is
BCD count.
Answer: b
Explanation: If the GATE signal is enabled, then the counter starts counting.
Answer: d
Explanation: The control word register contents are used for
i) initializing the operating modes (mode 0-mode 4)
ii) selection of counters (counter0-counter2)
iii) choosing binary or BCD counters
iv) loading of the counter registers.
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
Answer: c
Explanation: The processor 8085 has five hardware interrupt pins. Out of these
five, four pins were alloted fixed vector addresses but the pin INTR was not
alloted by vector address, rather an external device was supposed to hand over
the type of the interrupt to the microprocessor.
2. The register that stores all the interrupt requests in it in order to serve them
one by one on a priority basis is
a) Interrupt Request Register
b) In-Service Register
c) Priority resolver
d) Interrupt Mask Register
Answer: a
Explanation: The interrupts at IRQ input lines are handled by Interrupt Request
Register internally.
3. The register that stores the bits required to mask the interrupt inputs is
a) In-service register
b) Priority resolver
c) Interrupt Mask register
d) None
Answer: c
Explanation: Also, Interrupt Mask Register operates on IRR(Interrupt Request
Register) at the direction of the Priority Resolver.
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
Answer: d
Explanation: The interrupt control logic performs all the operations that are
involved within the interrupts like accepting and managing interrupt
acknowledge signals, interrupts.
Answer: d
Explanation: A single 8259A provides 8 vectored interrupts. In cascade mode, 64
vectored interrupts can be provided.
6. When the PS(active low)/EN(active low) pin of 8259A used in buffered mode,
then it can be used as a
a) input to designate chip is master or slave
b) buffer enable
c) buffer disable
d) none
Answer: b
Explanation: When the pin is used in buffered mode, then it can be used as a
buffer enable to control buffer transreceivers. If it is not used in buffered mode,
then the pin is used as input to designate whether the chip is used as a master or
a slave.
Answer: d
Explanation: The initialization procedure involves
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
Answer: b
Explanation: When non-specific EOI command is issued to 8259A it will
automatically reset the highest ISR.
9. In the application where all the interrupting devices are of equal priority, the
mode used is
a) Automatic rotation
b) Automatic EOI mode
c) Specific rotation
d) EOI
Answer: a
Explanation: The automatic rotation is used in the applications where all the
interrupting devices are of equal priority.
Answer: c
Explanation: Basically, there are three modes of data transmission. simplex,
duplex and half duplex.
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
Answer: a
Explanation: In simplex mode, the data transmission is unidirectional. For
example, a CPU may transmit data for a CRT display unit in this mode.
3. If the data transmission takes place in either direction, but at a time data may
be transmitted only in one direction then, it is of
a) simplex mode
b) duplex mode
c) semi duplex mode
d) half duplex mode
Answer: d
Explanation: In half duplex mode, data transmission is bidirectional but not at a
time. For example, Walkie-Talkie.
4. In 8251A, the pin that controls the rate at which the character is to be
transmitted is
a) TXC(active low)
b) TXC(active high)
c) TXD(active low)
d) RXC(active low)
Answer: a
Explanation: Transmitter Clock Input (TXC(active low)) is a pin that controls the
rate at which the character is to be transmitted.
Answer: d
Explanation: Transmitted Data Output pin carries a serial stream of the
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
transmitted data bits along with other information like start bits, stop bits and
parity bits etc.
6. The signal that may be used either to interrupt the CPU or polled by the CPU is
a) TXRDY(Transmitter ready)
b) RXRDY(Receiver ready output)
c) DSR(active low)
d) DTR(active low)
Answer: b
Explanation: RXRDY(Receiver ready output) may be used either to interrupt the
CPU or polled by the CPU.
Answer: d
Explanation: RS232C has been used for long and has a few disadvantages like
limited speed of communication, high-voltage level signaling and big-size
communication adapters.
Answer: d
Explanation: The USB standards support the signaling rates. Also, USB signaling is
implemented in a differential in low- and full-speed options.
9. The bit packet that commands the device either to receive data or transmit
data in transmission of USB asynchronous communication is
a) Handshake packet
b) Token packet
c) PRE packet
d) Data packet
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
Answer: b
Explanation: The token packet is the second type of packet which commands the
device either to receive data or transmit data.
Answer: c
Explanation: PRE packets are only of importance to low-speed USB devices.
→Telegram Channel
→Telegram Group
www.studymaterialz.in
IMPORTANT MCQ- MICROPROCESSORS
1. The minimum number of transistors required to implement a two input AND gate is
A. 2
B. 4
C. 6
D. 8
Answer: C
2. Using DeMorgan’s Theorem we can convert any AND-OR structure into
A. NAND-NAND
B. OR-NAND
C. NAND-NOR
D. NOR-NAND
Answer: A
3. For a memory with a 16-bit address space, the addressability is
A. 16 bits
B. 8 bits
C. 2^16 bits
D. Cannot be determined
Answer: D
4. Because we wish to allow each ASCII code to occupy one location in memory, most memories are
_____ addressable.
A. BYTE
B. NIBBLE
C. WORD (16 bits)
D. DOUBLEWORD (32 bits)
Answer: A
5. Circuit A is a 1-bit adder; circuit B is a 1 bit multiplier.
A. Circuit A has more gates than circuit B
B. Circuit B has more gates than circuit A
C. Circuit A has the same number of gates as circuit B
(Hint: Construct the truth table for the adder and the multiplier)
Answer: A
6. When the write enable input is not asserted, the gated D latch ______ its output.
A. can not change
B. clears
C. sets
D. complements
Answer: A
7. A structure that stores a number of bits taken “together as a unit” is a
A. gate
B. mux
C. decoder
D. register
Answer: D
www.studymaterialz.in
8. We say that a set of gates is logically complete if we can build any circuit without using any other
kind of gates. Which of the following sets are logically complete
A. set of {AND,OR}
B. set of {EXOR, NOT}
C. set of {AND,OR,NOT}
D. None of the above
Answer: C
9. Of the following circuits, the one which involves storage is
A. RS Latch
B. mux
C. nand
D. decoder
Answer: A
10. If the number of address bits in a memory is reduced by 2 and the
addressability is doubled, the size of the memory (i.e., the number of bits stored in the memory)
A. doubles
B. remains unchanged
C. halves
D. increases by 2^(address bits)/addressability
Answer : C
12. If m is a power of 2, the number of select lines required for an m-input mux is:
A. m
B. 2^m
C. log2 (m)
D. 2*m
Answer: C
13. For the number A[15:0] = 0110110010001111, A[14:13] is ______ A[3:2].
A. less than
B. greater than
C. the same as
d . cannot be determined
Answer: C
14. Which of the following conditions is not allowed in an RS latch?
A. R is asserted, S is asserted
B. R is asserted, S is negated
C. R is negated, S is asserted
D. R is negated, S is negated
Answer: A
15. Which of the following pair of gates can form a latch?
A. a pair of cross coupled OR
B. a pair of cross copled AND
C. a pair of cross coupled NAND
D. a cross coupled NAND/OR
Answer: C
www.studymaterialz.in
16. ‘Burst refresh’ in DRAM is also called
A. Concentrated refresh
B. Distributed refresh
C. Hidden refresh
D. None of the above
Answer: A
17. The number of interrupt lines in 8085 is
A. 2
B. 3
C. 4
D. 5
Answer: D
18. A real number consists of
A. integer part
B. integer part and fraction part
C. integer part, fraction part along with positive or negative sign
D. none of the above
Answer: C
19. Assertion (A): Negative values of incremental operator in DO loop are allowed in Fortran 77 but
not in earlier versions of Fortran.
Reason (R): Fortran 77 has better array facilities than earlier versions of Fortran.
A. Both A and R are correct and R is correct explanation of A
B. Both A and R are correct but R is not correct explanation of A
C. A is correct R is wrong
D. A is wrong R is correct
Answer: B
20. Which of the following is not treated as hexadecimal constant by assembler in 8085?
A. 45 H
B. 6 AFH
C. 234
D. 64 H
Answer: C
21. IC 7485 cannot be cascadeD.
A. True
B. False
Answer: B
22. An I/O processor controls the flow of information between
A. cache memory and I/O devices
B. main memory and I/O devices
C. two I/O devices
D. cache and main memory
Answer: B
www.studymaterialz.in
23. MS Access is a DBMS software.
A. True B. False
Answer: A
24. When .9432 E – 4 is subtracted from .5452 E – 3 in normalized floating point mode
A. none of the numbers is changed
B. .9432 E – 4 is changed to .09432 E – 3 and .5452 E – 3 is not changed
C. .5452 E – 3 is changed to 5.452 E – 4 but .9432 E – 4 is not changed
D. both Ihe numbers are changed and their exponents are, made equal to -5
Answer: B
25. DS directive in 8085
A. forces the assembler to reserve one byte of memory
B. forces the assembler to reserve a specified number of bytes in the memory
C. forces the assembler to reserve a specified number of consecutive bytes in the memory
D. none of the above
Answer: C
26. Which of the following is a valid integer constant?
A. 127
B. 127.0
C. 127
D. 125 + 3
Answer: A
27. The five flags in 8085 are designated as
A. Z, CY, S, P and AC
B. D, Z, S, P, AC
C. Z, C, S, P, AC
D. Z, CY, S, D, AC
Answer: A
28. In 8085 which addressing mode is also called inherent addressing?
A. Direct
B. Register
C. Implicit
D. Immediate
Answer: C
29. It is possible to copy a file in the same directory.
A. True
B. False
Answer: A
30. In a computer the data transfer between hard disk and CPU is nearly the same as that between
diskette and CPU.
A. True
B. False
Answer: B
www.studymaterialz.in
31. The timing difference between a slow memory and fast processor can be resolved if
A. processor is capable of waiting
B. external buffer is used
C. either (a) or (b)
D. neither (a) nor (b)
Answer: C
32. In 8086 the number of bytes which can be addressed directly is about
A. 1000
B. 10000
C. 100000
D. one million
Answer: D
33. In Fortran 77 a variable name can contain special characters.
A. True
B. False
Answer: B
34. Which of the following is not a general purpose peripheral?
A. I/O port
B. Programmable interrupt controller
C. Programmable CRT controller
D. Programmable interval timer
Answer: C
35. Each instruction in assembly language program has the following fields:
Lable field
Mnemonic field
Operand field
Comment field
The correct sequence of these fields is?
A. 1, 2, 3, 4
B. 1, 2, 4, 3
C. 2, 1, 3, 4
D. 2, 1, 4, 3
Answer: A
36. In one’s complement 8 bit representation 11111111 represents
A. +0
B. -0
C. +1
D. -1
Answer: B
www.studymaterialz.in
37. The operating modes of 8255 A are called
A. mode 0 and mode 1
B. mode 0, mode 1 and mode 2
C. mode 0 and mode 2
D. mode 0, mode 2 and mode 3
Answer: B
38. Which of the following is type declaration statement in C?
A. int bar
B. s = s + 1
C. king = horse + 1
D. prin = prin * prin
Answer: A
39. Internet is a worldwide network of computers where most of the information is freely available.
A. True
B. False
Answer: A
40. A 37 bit mantissa has an accuracy of
A. 6 decimal places
B. 8 decimal places
C. 10 decimal places
D. 11 decimal places
Answer: D
41. In a C expression using assignment operators, relational operators and arithmetic operators, the
hierarchy of operations (in the absence of parenthesis) is
A. assignment, relational, arithmetic
B. relational, assignment, arithmetic
C. arithmetic, assignment, relational
D. arithmetic, relational, assignment
Answer: D
42. In 8085, the pins for SID and SOD are
A. 4 and 5 respectively
B. 5 and 4 respectively
C. 3 and 4 respectively
D. 4 and 3 respectively
Answer: B
43. Assertion (A): Each memory chip has its own address latch.
Reason (R): ALE signal comes out of microprocessor 8085 and goes to memory chip.
A. Both A and R are correct and R is correct explanation of A
B. Both A and R are correct but R is not correct explanation of A
C. A is correct R is wrong
D. A is wrong R is correct
Answer: D
www.studymaterialz.in
44. An e-mail message can be sent to many recipients.
A. True
B. False
Answer: A
45. In C the keywords are also called
A. special words
B. reserved words
C. class words
D. character words
Answer: B
46. The character set of Fortran 77 includes lower case alphabets a to z.
A. True
B. False
Answer: B
47. Which memory has read operation, byte erase, byte write and chip erase?
A. RAM
B. UVEPROM
C. EEPROM
D. both (b) and (c)
Answer: C
48. The forms of IF statements in FORTRAN 77 are called
A. logical IF and Block IF
B. logical IF, block IF and arithmetic IF
C. logic IF, block IF, arithmetic IF and negate IF
D. logical IF and arithmetic IF
Answer: B
49. In 8085
A. P flag is set when the result has even parity
B. P flag is set when the result has odd parity
C. P flag is reset when the result has odd parity
D. P flag is reset when the result has even parity
Answer: A
50. If the sign bit of mantissa is 0 and the exponent is increased from a positive to a more negative
number the result is
A. a larger floating point number
B. a smaller floating point number
C. either (a) or (b) depending on the actual number
D. a negative floating point number
Answer: A
Microprocessors and Microcontrollers/ Multiple Choice Questions
Architecture of Microprocessors
d) During subtraction
19. The advantage of memory mapped I/O over I/O mapped I/O is,
a) Faster
b) Many instructions supporting memory mapped I/O
c) Require a bigger address decoder
d) All the above
20. BHE of 8086 microprocessor signal is used to interface the
a) Even bank memory
b) Odd bank memory
c) I/O
d) DMA
21. In 8086 microprocessor the following has the highest priority among all type
interrupts.
a) NMI
b) DIV 0
c) TYPE 255
d) OVER FLOW
22. In 8086 microprocessor one of the following statements is not true.
a) Coprocessor is interfaced in MAX mode
b) Coprocessor is interfaced in MIN mode
c) I/O can be interfaced in MAX / MIN mode
d) Supports pipelining
23. 8088 microprocessor differs with 8086 microprocessor in
a) Data width on the output
b) Address capability
c) Support of coprocessor
d) Support of MAX / MIN mode
24. Address line for TRAP is?
a) 0023H b) 0024H c) 0033H
Key:
1.1 C 1.2 C 1.3 C 1.4 B 1.5 B 1.6 B
1.7 A 1.8 B 1.9 A 1.10 C 1.11 B 1.12 B
1.13 A 1.14 C 1.15 B 1.16 C 1.17 C 1.18 B
1.19 D 1.20 B 1.21 A 1.22 B 1.23 A 1.24 B
d) During subtraction
19. The advantage of memory mapped I/O over I/O mapped I/O is,
a) Faster
b) Many instructions supporting memory mapped I/O
c) Require a bigger address decoder
d) All the above
20. BHE of 8086 microprocessor signal is used to interface the
a) Even bank memory
b) Odd bank memory
c) I/O
d) DMA
21. In 8086 microprocessor the following has the highest priority among all type
interrupts.
a) NMI
b) DIV 0
c) TYPE 255
d) OVER FLOW
22. In 8086 microprocessor one of the following statements is not true.
a) Coprocessor is interfaced in MAX mode
b) Coprocessor is interfaced in MIN mode
c) I/O can be interfaced in MAX / MIN mode
d) Supports pipelining
23. 8088 microprocessor differs with 8086 microprocessor in
a) Data width on the output
b) Address capability
c) Support of coprocessor
d) Support of MAX / MIN mode
24. Address line for TRAP is?
a) 0023H b) 0024H c) 0033H
Key:
1.1 C 1.2 C 1.3 C 1.4 B 1.5 B 1.6 B
1.7 A 1.8 B 1.9 A 1.10 C 1.11 B 1.12 B
1.13 A 1.14 C 1.15 B 1.16 C 1.17 C 1.18 B
1.19 D 1.20 B 1.21 A 1.22 B 1.23 A 1.24 B
Q.1 If the crystal oscillator is operating at 15 MHz, the PCLK output of 8284 is
(A) 2.5 MHz. (B) 5 MHz.
(C) 7.5 MHz. (D) 10 MHz.
Ans: (A)
Q.2 In which T-state does the CPU sends the address to memory or I/O and the ALE signal
for demultiplexing
(A) T1. (B) T2.
(C) T3. (D) T4.
Ans, During the first clocking period in a bus cycle, which is called T1, the address of
the memory or I/O location is sent out and the control signals ALE, DT/R’ and IO/M’
are also output. Hence answer is (A).
Q.3 If a 1M ×1 DRAM requires 4 ms for a refresh and has 256 rows to be refreshed, no
more than _ of time must pass before another row is refreshed.
(A) 64 ms. (B) 4 ns.
(C) 0.5 ns. (D) 15.625 µs .
Ans A DMA writes operation transfers data from an I/O device to memory. Hence
answer is (A).
Q.5 Which type of JMP instruction assembles if the distance is 0020 h bytes
(A) near. (B) far.
(C) short. (D) none of the above.
Ans The three byte near jump allows a branch or jump within ± 32K bytes. Hence
answer is (A).
1
WWW.ALLEXAMREVIEW.COM ALL EXAM REVIEW ADDA
Q.9 Number of the times the instruction sequence below will loop before coming out of
loop is
MOV AL, 00h
A1: INC AL
JNZ A1
(A) 00 (B) 01
(C) 255 (D) 256
Q.10 What will be the contents of register AL after the following has been executed
MOV BL, 8C
MOV AL, 7E
ADD AL, BL
(A) 0A and carry flag is set (B) 0A and carry flag is reset
(C) 6A and carry flag is set (D) 6A and carry flag is reset
Ans The direction flag is used only with the string instructions. Hence answer is (A).
Ans This input is controlled to insert wait states into the timing of the microprocessor.
Hence answer is (C).
Q.13 These are two ways in which a microprocessor can come out of Halt state.
(A) When hold line is a logical 1.
(B) When interrupt occurs and the interrupt system has been enabled.
(C) When both (A) and (B) are true.
(D) When either (A) or (B) are true.
Q.16 In case of DVD, the speed is referred in terms of n X (for example 32 X). Here, X
refers to
(A) 150 KB/s (B) 300 KB/s
(C) 1.38 MB/s (D) 2.4 MB/s
Ans The Pentium microprocessor is organized with three execution units. One
executes floating-point instructions, and the other two (U-pipe and V-pipe) execute
3
WWW.ALLEXAMREVIEW.COM ALL EXAM REVIEW ADDA
Ans The EPROM is erasable if exposed to high-intensity ultraviolet light for about 20
minutes or less. Hence answer is (A)
Q.21 Signal voltage ranges for a logic high and for a logic low in RS-232C standard are
(A) Low = 0 volt to 1.8 volt, high = 2.0 volt to 5 volt
(B) Low =-15 volt to –3 vol, high = +3 volt to +15 volt
(D) Low = +3 volt to +15 volt, high = -3 volt to -15 volt
(E) Low = 2 volt to 5.0 volt, high = 0 volt to 1.8 volt
Q.22 The PCI bus is the important bus found in all the new Pentium systems because
(A) It has plug and play characteristics
(B) It has ability to function with a 64 bit data bus
(C) Any Microprocessor can be interfaced to it with PCI controller or bridge
(D) All of the above
Ans An instruction cycle consists of several machine cycles. Hence Answer is (B).
Q.24 8251 is a
(A) UART
(B) USART
(C) Programmable Interrupt controller
(D) Programmable interval timer/counter
Ans The 8088 is a 16-bit microprocessor with an 8-bit data bus. The 16-bit address
bus. Hence answer is (D).
4
WWW.ALLEXAMREVIEW.COM ALL EXAM REVIEW ADDA
Q.26 By what factor does the 8284A clock generator divide the crystal oscillator’s output
frequency?
(A) One (B) Two
(C) Three (D) Four
Ans When F/C’ is at logic 0; The oscillator output is steered through to the divide- by-
3 counter. Hence answer is (c).
Q.28 When the 82C55 is reset, its I/O ports are all initializes as
(A) output port using mode 0 (B) Input port using mode 1
(C) output port using mode 1 (D) Input port using mode 0
Ans A RESET input to the 82C55 causes all ports to be set up as simple input ports
using mode 0 operations. Hence answer is (D).
Q.29 Which microprocessor pins are used to request and acknowledge a DMA transfer?
(A) reset and ready (B) ready and wait
(C) HOLD and HLDA (D) None o these
Ans, The HOLD pin is an input that is used request a DMA action and the HLDA
pin is an output that that acknowledges the DMA action. Hence answer is (C).
Ans Operating systems, like Windows, defer many tasks and do not guarantee their
execution in predictable time. Hence answer is (B).
Ans The VESA local bus operates at 33 MHz. Hence answer is (B).
Ans, ENIAC (Electronic Numerical Integrator And Computer) was the first general-
purpose electronic computer. It was a Turing-complete, digital computer capable of
being reprogrammed to solve a full range of computing problems. ENIAC was
5
WWW.ALLEXAMREVIEW.COM ALL EXAM REVIEW ADDA
designed to calculate artillery firing tables for the U.S. Army's Ballistic Research
Laboratory. Hence answer is (c).
Q.34 The first task of DOS operating system after loading into the memory is to use the file
called .
(A) HIMEM.SYS (B) CONFIG.SYS
(C) AUTOEXEC.BAT (D) SYSTEM.INI
Ans, The first task of the DOS operating system, after loading into memory, is to
use a file called the CONFIG.SYS file. This file specifies various drivers that load
into the memory, setting up or configuring the machine for operation under DOS.
Q.35 If the programmable counter timer 8254 is set in mode 1 and is to be used to count
six events, the output will remain at logic 0 for number of counts
(A) 5 (B) 6
(C) 0 (D) All of the above
Ans. OUT continues for the total length of the count. Hence answer is (B).
Ans The flash memory device requires a 12V programming voltage to erase and write
new data. Hence answer is (A).
Q.37 A plug and play (PnP) interface is one that contains a memory that holds
configuration information of the system.
(A) TRUE (B) FALSE
Ans, this port probably will never be used for any devices other than the video card.
Hence answer is (B).
6
WWW.ALLEXAMREVIEW.COM ALL EXAM REVIEW ADDA
Ans Typically, the bus-cycle of the 8086 and 8088 processors consist of four clock
cycles or pulses. Thus, duration of a bus-cycle is = ‘4*T’. Hence Answer is (C).
Ans The capacitor Cs discharges through the internal resistance of the NMOS transistor
T1. Typically Cs = 0.2 pF and the internal resistance Rin = 1010 ohms, so:
Cs x Rin = 0.2 x 10-12 x 1010 x 103 ms = 2 ms
So the typical refresh time interval is 2 ms. Hence Answer is (C).
Q.42 The no. of wait states required to interface 8279 to 8086 with 8MHz clock are
(A) Two (B) Three
(C) One (D) None
Ans Two wait states used so that device can function with an 8 MHz. Hence answers is
( A).
Ans Data transfer speeds are 12 Mbps for full speed operation and 1.5 Mbps for slow
speed operation. Hence answer is (c).
Q.45 In 80186, the timer which connects to the system clock is
(A) timer 0 (B) timer 1
(C) timer 2 (D) Any one can be connected
Ans. Timer 2 is internal and clocked by the master clock. Hence answer is (c).
Q.46 Conversion of the +1000 decimal number into signed binary word results
(A) 0000 0011 1110 1000 (B) 1111 1100 0001 1000
(C) 1000 0011 1110 1000 (D) 0111 1100 0001 1000
7
WWW.ALLEXAMREVIEW.COM ALL EXAM REVIEW ADDA
Ans
1000 /2 =>500 €0
500/2=>250€0
250/2=>125€0
125/2=>62€1
62/2=>31€0
31/2=>15€1
15/2=>7€1
7/2=>3€1
3/2=>1€1
16 bit signed number is 1000,0011,1110,1000
Hence Answer is (C).
Q.49 Which pins are general purpose I/O pins during mode-2 operation of the 82C55?
(A) PA0 – PA7 (B) PB0-PB7
(C) PC3-PC7 (D) PC0-PC2
Ans In mode 2 Port-A can be programmed to operate as bidirectional port. The mode-2
operation is only for Port-A. Hence Answer is (A)
8
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
Date-16/06/2021
Subject Name-KCS-403-Microprocessor_CSE-Semester 4
UNIT-1
a. 0030H
b. 0024H
c. 0048H
d. 0060H
Answer: (a).0030H
d. end of program
3. What is SIM?
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
a. MROM
b. PROM
c. EPROM
d. EEPROM
Answer: (a).MROM
a. MROM
b. PROM
c. FROM
d. FPROM
Answer: (b).PROM
a. Micro-operations
b. Macro-operations
c. Multi-operations
d. Bi control-operations
Answer: (b).Macro-operations
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
a. incremented by one.
d. data processing with registers takes fewer cycles than that with memory
Answer: (d).data processing with registers takes fewer cycles than that with memory
b. A fetch cycle
12. The output data lines of microprocessor and memories are usually tristated
because
a. More than one device can transmit information over the data bus by enabling
only one device at a time
b. More than one device can transmit over the data bus at the same time
c. The data line can be multiplexed for both input and output
Answer: (a).More than one device can transmit information over the data bus by
enabling only one device at a time
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
13. The correct sequence of steps in the instruction cycle of a basic computer is
14. The register which holds the information about the nature of results of
arithmetic and logic operations is called as
a. Accumulator
c. Flag register
a. 1, 2, 3 and 4
b. 1, 2 and 3
c. 1 and 2 only
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
d. 3 and 4 only
17. Both the ALU and control section of CPU employ which special purpose
storage location?
a. Buffers
b. Decoders
c. Accumulators
d. Registers
Answer: (c).Accumulators
c. all the registers and counters are being reset and this signal can be used to
reset external support chip
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
Answer: (c).all the registers and counters are being reset and this signal can be
used to reset external support chip
20. The content of the A15-A8 (higher order address lines) while executing “IN
8-bit port address” instruction are
b. irrelevant
a. TRAP
b. RST 7.5
d. RST 6.5
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
22. Which one of the following instruction may be used to clear the
accumulator content irrespective of its initial value?
a. CLR A
b. ORA A
c. SUB A
d. MOV A, 00H
Answer: (c).SUB A
23. ___________ signal prevent the microprocessor from reading the same data
more than one.
a. pipelining
b. handshaking
c. controlling
d. signaling
Answer: (b).handshaking
24. Data transfer between the microprocessor for peripheral takes place
through __________.
a. I/O port
b. input port
c. output port
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
d. multi port
a. +5V
b. -5V
c. -10V
d. +10V
Answer: (a).+5V
26. The _______ allow data transfer between memory and peripherals.
a. DMA technique
b. Microprocessor
c. Register
d. Decoder
a. P2
b. P4
c. P6
d. P8
Answer: (c).P6
29. The number of hardware chips needed for multiple digit display can be
minimized by using the technique called ______.
a. interfacing
b. multiplexing
c. demultiplexing
d. multiprocessing
Answer: (b).multiplexing
a. a parallel interface
b. a serial interface
c. printer interface
d. a modem interface
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
a. medium voltage
b. higher voltage
c. lower voltage
c. interrupt is Masked
a. clock
d. signal bus
36. The advantage of memory mapped I/O over I/O mapped I/O is _________
a. faster operation
37. In 8279 Status Word, data is read when ________ pins are low, and write to
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
38. In 8279, the keyboard entries are de bounced and stored in an _________,
that is further accessed by the CPU to read the key codes.
a. 8-bit FIFO
b. 8-byte FIFO
c. 16 byte FIFO
d. 16 bit FIFO
39. For the most Static RAM the write pulse width should be at least
a. 10 ns
b. 60 ns
c. 300 ns
d. 350 ns
Answer: (b).60 ns
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
a. Motorala
b. Intel
c. Stephen Mors
d. HCL
Answer: (b).Intel
a. bidirection
b. unidirection
c. mulidirection
d. circular
Answer: (b).unidirection
a. 40
b. 45
c. 20
d. 35
Answer: (a).40
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
a. +5V
b. -5V
c. +12V
d. -12V
Answer: (a).+5V
44. Which is used to store critical pieces of data during subroutines and
interrupts ?
a. Stack
b. Queue
c. Accumulator
d. Data register
Answer: (a).Stack
a. Pushing data
b. Pushed
c. Pulling
d. None of these
46. The external system bus architecture is created using from ______
architecture.
a. Pascal
b. Dennis Ritchie
c. Charles Babbage
d. Von Neumann
b. Compiler
c. Operating system
d. All of these
a. Auxiliary
b. Backup store
c. Both A and B
d. None of these
49. The lower red curvy arrow show that CPU places the address extracted
from the memory location on the_____.
a. Address bus
b. System bus
c. Control bus
d. Data bus
50. The CPU sends out a ____ signal to indicate that valid data is available on
the data bus.
a. Read
b. Write
c. Both a and b
d. None of these
Answer: (b).Write
UNIT-2
1. In 8085 microprocessor, how many interrupts are maskable.
a. Two
b. Three
c. Four
d. Five
Answer. c
2. Which stack is used in 8085 microprocessors?
a. FIFO
b. FILO
c. LIFO
d. LILO
Answer. c
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
3. In the instruction of the 8085 microprocessor, how many bytes are present?
a. One or two
b. One, two or three
c. One only
d. Two or three
Answer. b
4. Which one of the following addressing technique is not used in 8085
microprocessor?
a. Register
b. Immediate
c. Register indirect
d. Relative
Answer. d
5. Which one of the following register of 8085 microprocessor is not a part of the
programming model?
a. Instruction register
b. Memory address register
c. Status register
d. Temporary data register
Answer. c
6. The program counter in 8085 microprocessor is a 16-bit register, because
a. It counts 16 bits at a time
b. There are 16 address times
c. It facilitates the users storing 16-bit data temporarily
d. It has to fetch two 8-bit data at a time.
Answer. b
7. A direct memory access (DMA) transfer replies
a. Direct transfer of data between memory and accumulator
b. Direct transfer of data between memory and I/O devices without the use of
microprocessor
c. Transfer of data exclusively within microprocessor registers
d. A fast transfer of data between microprocessor and I/O devices
Answer. b
8. Handshaking mode of data transfer is
a. Synchronous data transfer
b. asynchronous data transfer
c. interrupt driven data transfer
d. level Mode of DMA data transfer
Answer. a
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
a. Micro-operations
b. Macro-operations
c. Multi-operations
d. Bi control-operations
Answer. c
27. Consider the following registers:
1. Accumulator and flag register
2. B and C registers
3. D and E registers
4. H and L registers
Which of these 8-bit registers of 8085 μP can be paired together to make a 16-bit
register?
a. (a) 1, 3 and 4
b. 2, 3 and 4
c. 1, 2 and 3
d. 1, 2 and 4
Answer. b
28. The first microprocessor to include virtual memory in the Intel
microprocessor family is
a. 80286
b. 80386
c. 80486
d. Pentium
Answer. a
29. Program counter in a digital computer
a. counts the numbers of programs run in the machine ,
b. counts the number of times a subroutine is called
c. counts the number of times the loops are executed
d. points the memory address of the current or the next instruction to be
executed
Answer
Answer. d
30. Assuming LSB is at position 0 and MSB at position 7, which bit positions are
not used (undefined) in Flag Register of an 8085 microprocessor?
a. 1, 3, 5
b. 2, 3, 5
c. 1, 2, 5
d. 1, 3, 4
Answer. a
31. At the beginning of a fetch cycle, the contents of the program counter are
a. incremented by one
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
c. T3 and T4
d. T4 and T1
Answer. c
37. Which one of the following circuits transmits two messages simultaneously in
one direction?
a. Duplex
b. Diplex
c. Simplex
d. Quadruplex
Answer. b
38. A microprocessor is ALU
a. and control unit on a single chip
b. and memory on a single chip
c. register unit and I/O device on a single chip
d. register unit and control unit on a single chip
Answer. d
39. In Intel 8085 microprocessor, ALE signal is made high to
a. Enable the data bus to be used as low order address bus
b. To latch data D0— D7 from the data bus
c. To disable data bus
d. To achieve all the functions listed above
Answer. a
40. Output of the assembler in machine codes is referred to as
a. Object program
b. Source program
c. Macro instruction
d. Symbolic addressing
Answer. a
41. Which one of the following statements for Intel 8085 is correct?
a. Program counter (PC) specifies the address of the instruction last executed
b. PC specifies the address of the instruction being executed
c. PC specifies the address of the instruction be executed
d. PC specifies the number of instruction executed so far
Answer. c
42. The instruction RET executes with the following series of machine cycle
a. Fetch, read, write
b. Fetch, write, write
c. Fetch, read, read
d. Fetch, read
Answer. c
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
43. Which one of the following statements is correct regarding the instruction
CMP A?
a. Compare accumulator with register A
b. Compare accumulator with memory
c. Compare accumulator with register H
d. This instruction does not exist
Answer. a
44. The instruction JNC 16-bit refers to jump to 16-bit address if
a. Sign flag is set
b. Carry flag is reset
c. Zero flag is set
d. Parity flag is reset
Answer. b
45. Consider the following interrupts for 8085 microprocessor:
1. INTR
2. RST 5.5
3. RST 6.5
4. RST 7.5
5. TRAP
If the interrupt is to be vectored to any memory location then which of the above
interrupt is/are correct?
a. 1 and 2 only
b. 1, 2, 3 and 4
c. 5 only
d. 1 only
Answer. d
46. Consider the following statements:
1. Auxiliary carry flag is used only by the DAA and DAS instruction.
2. Zero flag is set to 1 if the two operands compared are equal.
3. All conditional jumps are long type jumps.
Which of the above statements are correct?
a. 1, 2 and 3 only
b. 1 and 2 only
c. 1 and 3 only
d. 2 and 3 only
Answer. b
47. Among the given instructions, the one which affects maximum number of
flags is
a. RAL
b. POP PSW
c. XRA A
d. DCR A
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
Answer. c
48. XCHG instruction of 8085 exchanges the content of
a. top of stack with contents of register pair
b. BC and DE register pairs
c. HL and DE register pairs
d. None of the above
Answer. c
49. Direction flag is used with
a. String instructions
b. Stack instructions
c. Arithmetic instructions
d. Branch instructions
Answer. a
50. What will be the contents of DE and HL register pairs respectively after the
execution of the following instructions?
LXIH, 2500 H
LXID, 0200 H
DAD D
XCHG
a. 0200 H, 2500 H
b. 0200 H, 2700 H
c. 2500 H, 0200 H
d. 2700 H, 0200 H
Answer. d
UNIT-3
51. In 8085 microprocessor, the address for ‘TRAP’ interrupt is
a. 0024 H
b. 002C H
c. 0034 H
d. 003C H
Answer. a
52. A ‘DAD H” instruction is the same as shifting each bit by one position to the
a. left
b. right
c. left with a zero inserted in LSB position
d. right with a zero inserted in LSB position
Answer. c
53. When a program is being executed in an 8085 microprocessor, its program
counter contains
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
a.
the memory address as the instruction that is to be executed next.
b.
the memory address of the instruction that is being currently matched.
c.
the total number of instructions in the program being executed.
d.
the number of instructions in the current program that have already been
executed.
Answer. a
54. Which of the following data transfer is not possible in microprocessor?
a. Memory to accumulator
b. Accumulator to memory
c. Memory to memory
d. I/O device to accumulator
Answer. c
55. LOADER is a program that
a. loads the memories and generates a hex file
b. loads the hex file and converts to the executable file
c. loads the COM file and generates the binary code
d. loads English like command and generates the binary code
Answer. b
56. Which of the following instructions is closest match to the instruction POP
PC?
a. RET
b. PCHL
c. POP PSW
d. DAD SP
Answer. a
57. How many machine cycles are required by STA instruction?
a. 2
b. 3
c. 4
d. 5
Answer. c
58. Which of the following 8085 instruction will require maximum T-states for
execution?
a. XRI byte
b. STA address
c. CALL address
d. JMP address
Answer. c
59. In 8085 microprocessor, which mode of addressing does the instruction CMP
M use?
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
a. Direct addressing
b. Register addressing
c. Indirect addressing
d. Immediate addressing
Answer. c
60. With reference to 8085 microprocessor, which of the following statements
are correct?
1. INR is 1 byte instruction
2. OUT is 2 byte instruction
3. STA is 3 byte instruction
a. 1 and 2 only
b. 2 and 3 only
c. 1 and 3 only
d. 1, 2 and 3
Answer. d
61. Assume that the accumulator and the register C of 8085 microprocessor
contain respectively F0 H
and OF H initially. What will be the content of accumulator after execution of
instruction ADD C?
a. 00 H
b. FF H
c. EF H
d. FE H
Answer. b
62. It is desired to multiply the numbers 0A H by OB H and store the result in the
accumulator. The numbers are available in registers B and C respectively. A part
of the 8085 program for this purpose is given below:
MVI A, OO H
Loop; ………..
………..
………..
HLT END
The sequence of instruction to complete the program would be
a. JNZ LOOP; ADD B, DCR C
63. Find the content of the accumulator after the execution of the following
program:
MVI A, F0 H
ORI FF H
XRI F0 H
a. 00 H
b. F0 H
c. 0F H
d. FF H
Answer. c
64. The following program starts at location 0100 H
LXI SP, 00FF
LXI H, 0701 H
MVI A, 20 H
SUB M
The content of accumulator when the program counter reaches 0107 H is
a. 20 H
b. 02 H
c. 00 H
d. FF H
Answer. c
65. The difference between 8085 instructions RST n and PCHL is
a. RST n is equivalent to a sub-routine call while PCHL is equivalent to
unconditional branch.
b. RST n uses direct addressing while PCHL uses register indirect addressing.
c. RST n is a software interrupt while PCHL simulates a hardware interrupt
d. RST n resets the processor while PCHL restarts the processor.
Answer. a
66. The content of accumulator are 70 H. Initially all flags are zero. What will be
values of CY and S after executing instruction RLC?
a. CY = 0 and S = 0
b. CY = 1 and S = 1
c. CY = 1 and S = 0
d. CY = 0 and S = 1
Answer. d
67. A software delay subroutine is written as given below:
DELAY: MVI H, 255D H
MVI L, 255D H
LOOP: DCR L
JNZ LOOP
DCR H
JNZ LOOP
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
a. 255
b. 510
c. 65025
d. 65279
Answer. d
68. What is content of accumulator of 8085 microprocessor after the execution of
XRI F0 H instruction?
a. Only the upper nibble of accumulator is complemented
b. Only the lower nibble is complemented
c. Only the upper nibble is reset to zero
d. Only the lower nibble is reset to zero
Answer. a
69. The 8085 programming manual says that it takes seven T states to fetch and
execute the MOV instruction. If the system clock has a frequency of 2.5 MHz, how
long is an instruction Cycle?
a. 2.8 s
b. 2.5ns
c. 2.8 ns
d. 2.8 μs
Answer. d
70. The instruction PCHL, in 8085 is used for
a. STA address
b. LDAX B
c. LHLD address
d. LDA address
Answer. a
72. The instruction that exchanges top of stack with HL pair is
a. XTHL
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
b. SPHL
c. PUSH H
d. POP H
Answer. a
73. In 8085 microprocessor, during PUSH PSW Operation, Stack pointer is
a. Decremented by one
b. Decremented by two
c. Incremented by one
d. Incremented by two
Answer. b
74. While a program is being executed in an Intel 8085 microprocessor, the
program counter of the microprocessor contains:
a. The memory address of the instruction that is being currently executed.
b. The memory address of the instruction that is to be executed next.
c. The number of instructions that have already been executed.
d. The total number of instructions in the current program still to be
executed.
Answer. b
75. The description of a program counter (PC) in 8085 microprocessor is
a. An up/down counter
b. An 8-bit register
c. Initialized automatically by microprocessor
d. Used to point to stack memory area
Answer. c
76. If the status of the control lines SI and SO is LOW, then 8085 microprocessor
is performing
a. Reset operation
b. HOLD operation
c. Halt operation
d. Interrupt acknowledge
Answer. c
77. LXI SP, 7FFF H
MVI A, 25 H
XRI 02 H
PUSH PSW
POP H
MOV A,L
ORI 10 H
HLT
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
What are the contents of A, H, L, SP and PSW registers after executing the above
set of instructions? Assume undefined flags always remain clear.
a. 10H, 25H, 00H, 7FFFH, 00H respectively
b. 14H, 27H, 04H, 7FFFH, 04H respectively
c. 14H, 25H, 00H. 7FFFH, 04H respectively
d. 10H, 27H, 04H, 7FFFH, 00H respectively
Answer. b
78. The content of the programme counter of an 8085 microprocessor is
a. the total number of instructions in the program already executed.
a. ADI
b. ACI
c. ADC
d. ADD
Answer. b
80. MVI A, AA H
ORI FFH
RRC
RRC
CMC
INR A
What are the contents of A and PSW registers after executing the above set of
instructions in sequence?
a. AAH and 00H
b. FFH and 66H
c. 00H and 54H
d. 00H and 00H
Answer. c
81. For which one of the following, the instruction XRA A in 8085 microprocessor
can be used?
a. Set the carry flag
b. Set the zero flag
c. Reset the carry flag and clear the accumulator
d. Transfer FFH to the accumulator
Answer. b
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
Answer. b
85. When the operand requires for instruction is stored inside the processor, then
What this addressing mode is called?
a. Direct
b. Register
c. Implicit
d. Immediate
Answer. b
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
86. Which one of the following addressing technique is not used in 8085
microprocessor?
a. Register
b. Immediate
c. Register indirect
d. Relative
Answer. d
87. In an instruction of 8085 microprocessor, how many bytes are present?
a. One or two
b. One, two or three
c. One only
d. Two or three
Answer. b
88. Which one is the indirect addressing mode in the following instructions?
a. LXI H 2050 H
b. MOV A, B
c. LDAX B
d. LDA 2050 H
Answer. c
89. The addressing mode used in the instruction JMP F347 H in case of an Intel
8085A microprocessor is which one of the following?
a. Direct
b. Register—indirect
c. Implicit
d. Immediate
Answer. d
90. Carry flag is not affected after the execution of
a. ADD B
b. SBB B
c. INR B
d. ORA B
Answer. c
91. The contents of the Program Counter (PC), when the microprocessor is
reading from 2FFF H memory location, will be
a. 2FFE H
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
b. 2FFF H
c. 3000 H
d. 3001 H
Answer. c
92. If the HLT instruction of an Intel 8085A microprocessor is executed
a. the microprocessor is disconnected from the system bus till the RESET is
pressed.
b. the microprocessor halts the execution of the program and returns to the
monitor.
c. the microprocessor enters into a HALT state and the buses are tri-stated.
d. the microprocessor reloads the program counter from the locations 0024 H
and 0025 H.
Answer. c
93. The stack pointer of an 8085 A microprocessor contains ABCD H.
PUSH PSW
XTHL
PUSH D
JMP EC75 H
At the end of the execution of the above instructions, what would be the content
of the stack pointer?
a. ABCB H
b. ABCA H
c. ABC9 H
d. ABC8 H
Answer. c
94. In an Intel 8085 A, what is the content of the Instruction Register (IR)?
Answer. c
96. Which one of the following statement does not describe
property/characteristic of a stack pointer register in 8085 microprocessor?
a. MVI A
b. LDAX B
c. JMP 2050 H
d. MOV A,M
Answer. c
98. In 8085, the DAA instruction is used for
UNIT-4
ANS: B
ANS: C
ANS: C
4) How many memory locations are required to store the instruction LXIH,
0800H in an 8085 assembly language program?
A) 1
B) 2
C) 3
D) 4
ANS: B
ANS: A
6) In 8085 microprocessor, the value of the most significant bit of the result
following the execution of any arithmetic or Boolean instruction is stored in
the
A) carry status flag
B) auxiliary carry status flag
C) sign status flag
D) zero status flag
ANS: C
ANS: B
ANS: C
Answer: c
Clarification: An assembler is a software used to convert the programs into
machine instructions.
12) The instructions like MOV or ADD are called as ______
a) OP-Code
b) Operators
c) Commands
d) None of the mentioned
Answer: a
Clarification: This OP – codes tell the system what operation to perform on the
operands.
13) The alternate way of writing the instruction, ADD #5,R1 is ______
a) ADD [5],[R1];
b) ADDI 5,R1;
c) ADDIME 5,[R1];
d) There is no other way
Answer: b
Clarification: The ADDI instruction, means the addition is in immediate
addressing mode.
14) Instructions which won’t appear in the object program are called as
_____
a) Redundant instructions
b) Exceptions
c) Comments
d) Assembler Directives
Answer: d
Clarification: The directives help the program in getting compiled and hence
won’t be there in the object code.
15) The assembler directive EQU, when used in the instruction: Sum EQU
200 does ________
a) Finds the first occurrence of Sum and assigns value 200 to it
b) Replaces every occurrence of Sum with 200
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
Answer: b
Clarification: This basically is used to replace the variable with a constant value.
16) The purpose of the ORIGIN directive is __________
a) To indicate the starting position in memory, where the program block is
to be stored
b) To indicate the starting of the computation code
c) To indicate the purpose of the code
d) To list the locations of all the registers used
Answer: a
Clarification: This does the function similar to the main statement.
17) The directive used to perform initialization before the execution of
the code is ______
a) Reserve
b) Store
c) Dataword
d) EQU
Answer: c
Clarification: None.
18) _____ directive is used to specify and assign the memory required for
the block of code.
a) Allocate
b) Assign
c) Set
d) Reserve
Answer: d
Clarification: This instruction is used to allocate a block of memory and to store
the object code of the program there.
19) _____ directive specifies the end of execution of a program.
a) End
b) Return
c) Stop
d) Terminate
Answer: b
Clarification: This instruction directive is used to terminate the program
execution.
20) The last statement of the source program should be _______
a) Stop
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
b) Return
c) OP
d) End
Answer: d
Clarification: This enables the processor to load some other process.
21) When dealing with the branching code the assembler ___________
a) Replaces the target with its address
b) Does not replace until the test condition is satisfied
c) Finds the Branch offset and replaces the Branch target with it
d) Replaces the target with the value specified by the DATAWORD directive
Answer: c
Clarification: When the assembler comes across the branch code, it immediately
finds the branch offset and replaces it with it.
22) The assembler stores all the names and their corresponding values in
______
a) Special purpose Register
b) Symbol Table
c) Value map Set
d) None of the mentioned
Answer: b
Clarification: The table where the assembler stores the variable names along with
their corresponding memory locations and values.
23) The assembler stores the object code in ______
a) Main memory
b) Cache
c) RAM
d) Magnetic disk
Answer: d
Clarification: After compiling the object code, the assembler stores it in the
magnetic disk and waits for further execution.
24) The utility program used to bring the object code into memory for
execution is ______
a) Loader
b) Fetcher
c) Extractor
d) Linker
Answer: a
Clarification: The program is used to load the program into memory.
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
Answer: d
Clarification: This creates entries into the symbol table first and then creates the
object code.
26) In 8085 microprocessor, the address for ‘TRAP’ interrupt is
a. 0024 H
b. 002C H
c. 0034 H
d. 003C H
Answer. a
27) A ‘DAD H” instruction is the same as shifting each bit by one position
to the
a. left
b. right
c. left with a zero inserted in LSB position
d. right with a zero inserted in LSB position
Answer. c
28) When a program is being executed in an 8085 microprocessor, its
program counter contains
a. the memory address as the instruction that is to be executed next.
b. the memory address of the instruction that is being currently matched.
c. the total number of instructions in the program being executed.
d. the number of instructions in the current program that have already been
executed.
Answer. a
29) Which of the following data transfer is not possible in
microprocessor?
a. Memory to accumulator
b. Accumulator to memory
c. Memory to memory
d. I/O device to accumulator
Answer. c
30) LOADER is a program that
a. loads the memories and generates a hex file
b. loads the hex file and converts to the executable file
c. loads the COM file and generates the binary code
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
a. 20 H
b. 02 H
c. 00 H
d. FF H
Answer. c
40) The difference between 8085 instructions RST n and PCHL is
a. RST n is equivalent to a sub-routine call while PCHL is equivalent to
unconditional branch.
b. RST n uses direct addressing while PCHL uses register indirect addressing.
c. RST n is a software interrupt while PCHL simulates a hardware interrupt
d. RST n resets the processor while PCHL restarts the processor.
Answer. a
41) The content of accumulator are 70 H. Initially all flags are zero. What
will be values of CY and S after executing instruction RLC?
a. CY = 0 and S = 0
b. CY = 1 and S = 1
c. CY = 1 and S = 0
d. CY = 0 and S = 1
Answer. d
42) A software delay subroutine is written as given below:
DELAY: MVI H, 255D H
MVI L, 255D H
LOOP: DCR L
JNZ LOOP
DCR H
JNZ LOOP
How many times DCR instruction will be executed?
a. 255
b. 510
c. 65025
d. 65279
Answer. d
43) What is content of accumulator of 8085 microprocessor after the
execution of XRI F0 H instruction?
a. Only the upper nibble of accumulator is complemented
b. Only the lower nibble is complemented
c. Only the upper nibble is reset to zero
d. Only the lower nibble is reset to zero
Answer. a
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
44) The 8085 programming manual says that it takes seven T states to
fetch and execute the MOV instruction. If the system clock has a frequency
of 2.5 MHz, how long is an instruction Cycle?
a. 2.8 s
b. 2.5ns
c. 2.8 ns
d. 2.8 μs
Answer. d
45) The instruction PCHL, in 8085 is used for
a. STA address
b. LDAX B
c. LHLD address
d. LDA address
Answer. a
47) The instruction that exchanges top of stack with HL pair is
a. XTHL
b. SPHL
c. PUSH H
d. POP H
Answer. a
48) In 8085 microprocessor, during PUSH PSW Operation, Stack pointer
is
a. Decremented by one
b. Decremented by two
c. Incremented by one
d. Incremented by two
Answer. b
49) While a program is being executed in an Intel 8085 microprocessor,
the program counter of the microprocessor contains:
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
UNIT-5
1. The block of 8237 that decodes the various commands given to the 8237 by the
CPU is
a) timing and control block
b) program command control block
c) priority block
d) none of the mentioned
Answer: b
Explanation: The program control block decodes various commands given to the
8237 by the CPU before servicing a DMA request.
2. The priority between the DMA channels requesting the services can be
resolved by
a) timing and control block
b) program command control block
c) priority block
d) none of the mentioned
Answer: c
Explanation: The priority encoder block resolves the priority between the DMA
channels requesting the services.
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
Answer: b
Explanation: The current address register holds the current memory address. The
current address register is accessed during the DMA transfer.
4. The register that holds the data byte transfers to be carried out is
a) current word register
b) current address register
c) base address register
d) command register
Answer: a
Explanation: The current word register is a 16-bit register that holds the data
transfers. The word count is decremented after each transfer, and the new value
is stored again in the register.
5. When the count becomes zero in the current word register then
a) Input signal is enabled
b) Output signal is enabled
c) EOP (end of process) is generated
d) Start of process is generated
Answer: c
Explanation: When the count becomes zero, the EOP signal is generated. This can
be written in successive bytes by the CPU, in program mode.
Answer: c
Explanation: The contents of base address register cannot be read by the CPU.
These contents are used internally for auto-initialization.
8. The register that maintains an original copy of the respective initial current
address register and current word register is
a) mode register
b) base address register
c) command register
d) mask register
Answer: b
Explanation: The base address register maintains an original copy of the current
address register and current word register, before incrementing or
decrementing.
Answer: d
Explanation: The address is automatically incremented or decremented after
each DMA transfer, and the resulting address value is again stored in the current
address register.
Answer: d
Explanation: Memory read, memory write and verify transfer are the three types
of DMA transfer.
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
a. 24
b. 20
c. 32
d. 40
Answer: d. 40
Question 2: In which mode do all the Ports of the 8255 PPI work as Input-Output
units for data transfer?
a. BSR mode
b. Mode 0 of I/O mode
c. Mode 1 of I/O mode
d. Mode 2 of I/O mode
Question 3: Which of the following pins are responsible for handling the on the
Read Write control logic unit of the 8255 PPI?
a. CS'
b. RD'
c. WR'
d. ALL of the above
a. BSR mode
b. Mode 0 of I/O mode
c. Mode 1 of I/O mode
d. Mode 2 of I/O mode
Question 5: How many bits of data can be transferred between the 8255 PPI and
the interfaced device at a time? or What is the size of internal bus of the 8255
PPI?
a. 16 bits
b. 12 bits
c. 8 bits
d. None of the above
Answer: c. 8 bits
Question 6: Which port of the 8255 PPI is capable of performing the handshaking
function with the interfaced devices?
a. Port A
b. Port B
c. Port C
d. All of the above
Answer: c. Port C
Question 7: In which of the following modes of the 8255 PPI, only port C is taken
into consideration?
a. BSR mode
b. Mode 0 of I/O mode
c. Mode 1 of I/O mode
d. Mode 2 of I/O mode
Question 8: In mode 2 of I/O mode, which of the following ports are capable of
transferring the data in both the directions?
a. Port A
b. Port B
c. Port C
d. All of the above
Answer: a. Port A
Question 9: In which of the following modes we do not consider the D6, D5 and
D4 bits of the control word?
a. BSR mode
b. Mode 0 of I/O mode
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
Question 10: How many data lines in total are there in the 8255 PPI IC?
a. 8 data lines
b. 32 data lines
c. 24 data lines
d. None of the above
1. The number of counters that are present in the programmable timer device
8254 is
a) 1
b) 2
c) 3
d) 4
Answer: c
Explanation: There are three counters that can be used as either counters or
delay generators.
Answer: b
Explanation: The control word register can only be written and cannot be read.
3. The mode that is used to interrupt the processor by setting a suitable terminal
count is
a) mode 0
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
b) mode 1
c) mode 2
d) mode 3
Answer: a
Explanation: Mode 0 is also called as an interrupt on the terminal count.
4. In mode 2, if N is loaded as the count value, then after (N-1) cycles, the output
becomes low for
a) 1 clock cycle
b) 2 clock cycles
c) 3 clock cycles
d) 4 clock cycles
Answer: a
Explanation: After (N-1) cycles, the output becomes low for only 1 clockcycle. If
the count N is reloaded and again the output becomes high and remains so for (N-
1) clock pulses.
Answer: c
Explanation: When the count N loaded is even, then for half of the count, the
output remains high and for the remaining half it remains low. If the count loaded
is odd, the first clock pulse decrements it by 1 resulting in an even count value.
6. In control word register, if SC1=0 and SC0=1, then the counter selected is
a) counter 0
b) counter 1
c) counter 2
d) none
Answer: b
Explanation: SC denotes select counter.
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
Answer: c
Explanation: To access 16 bit, first LSB is loaded first, and then MSB.
Answer: b
Explanation: If BCD=0 then hexadecimal count. If BCD=1, then the operation is
BCD count.
Answer: b
Explanation: If the GATE signal is enabled, then the counter starts counting.
Answer: d
Explanation: The control word register contents are used for
i) initializing the operating modes (mode 0-mode 4)
ii) selection of counters (counter0-counter2)
iii) choosing binary or BCD counters
iv) loading of the counter registers.
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
Answer: c
Explanation: The processor 8085 has five hardware interrupt pins. Out of these
five, four pins were alloted fixed vector addresses but the pin INTR was not
alloted by vector address, rather an external device was supposed to hand over
the type of the interrupt to the microprocessor.
2. The register that stores all the interrupt requests in it in order to serve them
one by one on a priority basis is
a) Interrupt Request Register
b) In-Service Register
c) Priority resolver
d) Interrupt Mask Register
Answer: a
Explanation: The interrupts at IRQ input lines are handled by Interrupt Request
Register internally.
3. The register that stores the bits required to mask the interrupt inputs is
a) In-service register
b) Priority resolver
c) Interrupt Mask register
d) None
Answer: c
Explanation: Also, Interrupt Mask Register operates on IRR(Interrupt Request
Register) at the direction of the Priority Resolver.
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
Answer: d
Explanation: The interrupt control logic performs all the operations that are
involved within the interrupts like accepting and managing interrupt
acknowledge signals, interrupts.
Answer: d
Explanation: A single 8259A provides 8 vectored interrupts. In cascade mode, 64
vectored interrupts can be provided.
6. When the PS(active low)/EN(active low) pin of 8259A used in buffered mode,
then it can be used as a
a) input to designate chip is master or slave
b) buffer enable
c) buffer disable
d) none
Answer: b
Explanation: When the pin is used in buffered mode, then it can be used as a
buffer enable to control buffer transreceivers. If it is not used in buffered mode,
then the pin is used as input to designate whether the chip is used as a master or
a slave.
Answer: d
Explanation: The initialization procedure involves
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
Answer: b
Explanation: When non-specific EOI command is issued to 8259A it will
automatically reset the highest ISR.
9. In the application where all the interrupting devices are of equal priority, the
mode used is
a) Automatic rotation
b) Automatic EOI mode
c) Specific rotation
d) EOI
Answer: a
Explanation: The automatic rotation is used in the applications where all the
interrupting devices are of equal priority.
Answer: c
Explanation: Basically, there are three modes of data transmission. simplex,
duplex and half duplex.
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
Answer: a
Explanation: In simplex mode, the data transmission is unidirectional. For
example, a CPU may transmit data for a CRT display unit in this mode.
3. If the data transmission takes place in either direction, but at a time data may
be transmitted only in one direction then, it is of
a) simplex mode
b) duplex mode
c) semi duplex mode
d) half duplex mode
Answer: d
Explanation: In half duplex mode, data transmission is bidirectional but not at a
time. For example, Walkie-Talkie.
4. In 8251A, the pin that controls the rate at which the character is to be
transmitted is
a) TXC(active low)
b) TXC(active high)
c) TXD(active low)
d) RXC(active low)
Answer: a
Explanation: Transmitter Clock Input (TXC(active low)) is a pin that controls the
rate at which the character is to be transmitted.
Answer: d
Explanation: Transmitted Data Output pin carries a serial stream of the
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
transmitted data bits along with other information like start bits, stop bits and
parity bits etc.
6. The signal that may be used either to interrupt the CPU or polled by the CPU is
a) TXRDY(Transmitter ready)
b) RXRDY(Receiver ready output)
c) DSR(active low)
d) DTR(active low)
Answer: b
Explanation: RXRDY(Receiver ready output) may be used either to interrupt the
CPU or polled by the CPU.
Answer: d
Explanation: RS232C has been used for long and has a few disadvantages like
limited speed of communication, high-voltage level signaling and big-size
communication adapters.
Answer: d
Explanation: The USB standards support the signaling rates. Also, USB signaling is
implemented in a differential in low- and full-speed options.
9. The bit packet that commands the device either to receive data or transmit
data in transmission of USB asynchronous communication is
a) Handshake packet
b) Token packet
c) PRE packet
d) Data packet
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
Answer: b
Explanation: The token packet is the second type of packet which commands the
device either to receive data or transmit data.
Answer: c
Explanation: PRE packets are only of importance to low-speed USB devices.
Microprocessor Interview
Questions And Answers Guide.
Global Guideline.
https://www.globalguideline.com/
Microprocessor Interview Questions And Answers
G
Microprocessor Job Interview Preparation Guide.
lo
ba
lG
Question # 1
What is a Microprocessor?
ui
Answer:-
Microprocessor is a program-controlled device, which fetches the instructions from memory, decodes and executes the instructions. Most Micro Processor are single-
chip devices.
de
Read More Answers.
Question # 2
What are the flags in 8086?
lin
Answer:-
In 8086 Carry flag, Parity flag, Auxiliary carry flag, Zero flag, Overflow flag, Trace flag, Interrupt flag, Direction flag, and Sign flag.
Read More Answers.
e
Question # 3
Why crystal is a preferred clock source?
.C
Answer:-
Because of high stability, large Q (Quality Factor) & the frequency that doesn't drift with aging. Crystal is used as a clock source most of the times.
Read More Answers.
O
Question # 4
In 8085 which is called as High order / Low order Register?
M
Answer:-
Flag is called as Low order register & Accumulator is called as High order Register.
Read More Answers.
Question # 5
What is Tri-state logic?
Answer:-
Three Logic Levels are used and they are High, Low, High impedance state. The high and low are normal logic levels & high impedance state is electrical open
circuit conditions. Tri-state logic has a third line called enable line.
Read More Answers.
Question # 6
What happens when HLT instruction is executed in processor?
Answer:-
The Micro Processor enters into Halt-State and the buses are tri-stated.
Read More Answers.
Question # 7
Which Stack is used in 8085?
Answer:-
LIFO (Last In First Out) stack is used in 8085.In this type of Stack the last stored information can be retrieved first
Read More Answers.
Question # 8
What is Program counter?
Answer:-
Program counter holds the address of either the first byte of the next instruction to be fetched for execution or the address of the next byte of a multi byte instruction,
which has not been completely fetched. In both the cases it gets incremented automatically one by one as the instruction bytes get fetched. Also Program register
keeps the address of the next instruction
G
Read More Answers.
Question # 9
lo
What are the various registers in 8085?
Answer:-
ba
Accumulator register, Temporary register, Instruction register, Stack Pointer, Program Counter are the various registers in 8085
Read More Answers.
Question # 10
lG
What is 1st / 2nd / 3rd / 4th generation processor?
Answer:-
The processor made of PMOS / NMOS / HMOS / HCMOS technology is called 1st / 2nd / 3rd / 4th generation processor, and it is made up of 4 / 8 / 16 / 32 bits.
Read More Answers.
ui
Question # 11
Name the processor lines of two major manufacturer?
de
Answer:-
High-end: Intel - Pentium (II, III, 4), AMD - Athlon. Low-end: Intel - Celeron, AMD - Duron. 64-bit: Intel - Itanium 2, AMD - Opteron.
Read More Answers.
lin
Question # 12
What's the speed and device maximum specs for Firewire?
e
Answer:-
IEEE 1394 (Firewire) supports the maximum of 63 connected devices with speeds up to 400 Mbps. Where's MBR located on the disk? Main Boot Record is located
in sector 0, track 0, head 0, cylinder 0 of the primary active partition.
.C
Read More Answers.
Question # 13
Where does the CPU Enhanced mode originate from?
O
Answer:-
Intel's 80386 was the first 32-bit processor, and since the company had to backward-support the 8086. All the modern Intel-based processors run in the Enhanced
mode, capable of switching between Real mode (just like the real 8086) and Protected mode, which is the current mode of operation.
M
Read More Answers.
Question # 14
How many bit combinations are there in a byte?
Answer:-
Byte contains 8 combinations of bits.
Read More Answers.
Question # 15
Have you studied buses? What types?
Answer:-
There are three types of buses.
Address bus: This is used to carry the Address to the memory to fetch either Instruction or Data.
Data bus : This is used to carry the Data from the memory.
Control bus : This is used to carry the Control signals like RD/WR, Select etc.
Read More Answers.
Question # 16
What is the Maximum clock frequency in 8086?
Answer:-
5 Mhz is the Maximum clock frequency in 8086.
Read More Answers.
Question # 17
Copyright © https://www.GlobalGuideline.COM Page 3/6
Microprocessor Interview Questions And Answers
Question # 18
G
What is Non-Maskable interrupts?
Answer:-
lo
An interrupt which can be never be turned off (ie. disabled) is known as Non-Maskable interrupt
Read More Answers.
ba
Question # 19
What are the different functional units in 8086?
Answer:-
lG
Bus Interface Unit and Execution unit, are the two different functional units in 8086.
Read More Answers.
Question # 20
ui
What are the various segment registers in 8086?
Answer:-
Code, Data, Stack, Extra Segment registers in 8086.
de
Read More Answers.
Question # 21
What does the EU do?
lin
Answer:-
Execution Unit receives program instruction codes and data from BIU, executes these instructions and store the result in general registers.
Read More Answers.
e
Question # 22
Which Stack is used in 8086? k is used in 8086?
.C
Answer:-
FIFO (First In First Out) stack is used in 8086.In this type of Stack the first stored information is retrieved first.
Read More Answers.
O
Question # 23
What are the major flags in 8086?
M
Answer:-
In 8086 Carry flag, Parity flag, Auxiliary carry flag, Zero flag, Overflow flag, Trace flag, Interrupt flag, Direction flag, and Sign flag.
Read More Answers.
Question # 24
What is SIM and RIM instructions?
Answer:-
SIM is Set Interrupt Mask. Used to mask the hardware interrupts.
RIM is Read Interrupt Mask. Used to check whether the interrupt is Masked or not.
Read More Answers.
8 : Basic Input Output System Frequently Asked Interview Questions and Answers Guide.
9 : Random Access Memory Frequently Asked Interview Questions and Answers Guide.
Global Guideline is a platform to develop your own skills with thousands of job interview questions
and web tutorials for fresher's and experienced candidates. These interview questions and web
tutorials will help you strengthen your technical skills, prepare for the interviews and quickly revise
the concepts. Global Guideline invite you to unlock your potentials with thousands of Interview
Questions with Answers or begin a tutorial right away, such as HTML, XML, XSLT, Cascading
Style Sheet (CSS), Search Engine Optimization (SEO), JavaScript, Structure Query Language (SQL),
Database Articles, Web Hosting Guide and much more. Learn the most common technologies
Interview Questions and Answers. We will help you to explore the resources of the World Wide Web
and develop your own skills from the basics to the advanced. Here you will learn anything quite
easily and you will really enjoy while learning. Global Guideline will help you to become a
professional and Expert, well prepared for the future.
* If any answer or question is incorrect or inappropriate or you have correct answer or you found any
problem in this document then don't hesitate feel free and e-mail us we will fix it.
You can follow us on FaceBook for latest Jobs, Updates and other interviews material.
www.facebook.com/InterviewQuestionsAnswers
Best Of Luck.
a) Code
b) Stack
c) Bootstrap program
d) Data
Answer: d
Explanation: Process Control Block (PC
b) contains information related to a process such as Process State, Program Counter, CPU Register, etc. Process Con
trol Block is also known as Task Control Block. Bootstrap program is a program which runs initially when the syste
m or computer is booted or rebooted.
a) Output
b) Throughput
c) Efficiency
d) Capacity
Answer: a
Explanation: The number of processes completed per unit time is known as Throughput. Suppose there are 4 process
es A, B, C & D they are taking 1, 3, 4 & 7 units of time respectively for their executions. For 10 units of time, throu
ghput is high if process A, B & C are running first as 3 processes can execute. If process C runs first then throughput
is low as maximum only 2 processes can execute. Throughput is low for processes which take a long time for execu
tion. Throughput is high for processes which take a short time for execution.
a) Job Queue
b) PCB queue
c) Device Queue
d) Ready Queue
Answer: c
Explanation: PCB queue does not belong to queues for processes. PCB is a process control block which contains inf
ormation related to process. Each process is represented by PCB.
5. If all processes I/O bound, the ready queue will almost always be ______ and the Short term Scheduler will have
a ______ to do.
a) full, little
b) full, lot
c) empty, little
d) empty, lot
Answer: c
Explanation: If all processes are I/O bound, the ready queue will almost empty and the short-term scheduler will hav
e a little to do. I/O bound processes spend more time doing I/O than computation.
8. The primary distinction between the short term scheduler and the long term scheduler is __________
9. The only state transition that is initiated by the user process itself is __________
a) block
b) wakeup
c) dispatch
d) none of the mentioned
Answer: c
Explanation: The only state transition that is initiated by the user process itself is block. Whenever a user process ini
tiates an I/O request it goes into block state unless and until the I/O request is not completed.
1. Restricting the child process to a subset of the parent’s resources prevents any process from __________
2. A parent process calling _____ system call will be suspended until children processes terminate.
a) wait
b) fork
c) exit
d) exec
Answer: a
Explanation: A parent process calling wait system call will be suspended until children processes terminate. A para
meter is passed to wait system call which will obtain exit status of child as well as wait system call returns PID of ter
minated process.
3. Cascading termination refers to termination of all child processes if the parent process terminates ______
a) Normally
b) Abnormally
c) Normally or abnormally
d) None of the mentioned
Answer: c
Explanation: Cascading termination refers to termination of all child processes if the parent process terminates Norm
ally or Abnormally. Some systems don’t allow child processes to exist if the parent process has terminated. Cascadin
g termination is normally initiated by the operating system.
4. With _____________ only one process can execute at a time; meanwhile all other process are waiting for the proc
essor. With ______________ more than one process can be running simultaneously each on a different processor.
a) Multiprocessing, Multiprogramming
b) Multiprogramming, Uniprocessing
c) Multiprogramming, Multiprocessing
d) Uniprogramming, Multiprocessing
Answer: d
Explanation: With Uniprogramming only one process can execute at a time; meanwhile all other processes are waiti
ng for the processor. With Multiprocessing more than one process can run simultaneously each on different processo
rs. The Uniprogramming system has only one program inside the core while the Multiprocessing system has multipl
e processes inside multiple cores. The core is one which executes instructions and stores data locally into registers.
6. In UNIX, the return value for the fork system call is _____ for the child process and _____ for the parent process.
8. The child process completes execution, but the parent keeps executing, then the child process is known as ______
____
a) Orphan
b) Zombie
c) Body
d) Dead
Answer: b
Explanation: The child process completes execution, but the parent keeps executing, then the child process is known
as Zombie. When a child process terminates, its resources get deallocated but its entry in the Process Control Block
(PC
b) remains there until its parent calls wait system call.
a) allows processes to communicate and synchronize their actions when using the same address space
b) allows processes to communicate and synchronize their actions
c) allows the processes to only synchronize their actions without communication
d) none of the mentioned
Answer: b
Explanation: Interprocess Communication allows processes to communicate and synchronize their actions. Interproc
ess Communication (IP
c) mechanism is used by cooperating processes to exchange data and information.
a) communicate with each other without sharing the same address space
b) communicate with one another by resorting to shared data
c) share data
d) name the recipient or sender of the message
Answer: a
Explanation: Message Passing system allows processes to communicate with each other without sharing the same ad
dress space.
3. Which of the following two operations are provided by the IPC facility?
5. The link between two processes P and Q to send and receive messages is called __________
a) communication link
b) message-passing link
c) synchronization link
d) all of the mentioned
Answer: a
Explanation: The link between two processes P and Q to send and receive messages is called communication link. T
wo processes P and Q want to communicate with each other; there should be a communication link that must exist b
etween these two processes so that both processes can able to send and receive messages using that link.
a) A communication link can be associated with N number of process(N = max. number of processes supported by s
ystem)
b) A communication link is associated with exactly two processes
c) Exactly N/2 links exist between each pair of processes(N = max. number of processes supported by system)
d) Exactly two link exists between each pair of processes
Answer: b
Explanation: For direct communication, a communication link is associated with exactly two processes. One commu
nication link must exist between a pair of processes.
a) there is another process R to handle and pass on the messages between P and Q
b) there is another machine between the two processes to help communication
c) there is a mailbox to help communication between P and Q
d) none of the mentioned
Answer: c
Explanation: In indirect communication between processes P and Q there is a mailbox to help communication betwe
en P and Q. A mailbox can be viewed abstractly as an object into which messages can be placed by processes and fr
om which messages can be removed.
11. Bounded capacity and Unbounded capacity queues are referred to as __________
a) Programmed buffering
b) Automatic buffering
c) User defined buffering
d) No buffering
Answer: b
Explanation: Bounded capacity and Unbounded capacity queues are referred to as Automatic buffering. Buffer capa
city of the Bounded capacity queue is finite length and buffer capacity of the Unbounded queue is infinite.
a) for communication between two processes remotely different from each other on the same system
b) for communication between two processes on the same system
c) for communication between two processes on separate systems
d) none of the mentioned
Answer: c
Explanation: None.
2. To differentiate the many network services a system supports ______ are used.
a) Variables
b) Sockets
c) Ports
d) Service names
Answer: c
Explanation: None.
3. RPC provides a(an) _____ on the client-side, a separate one for each remote procedure.
a) stub
b) identifier
c) name
d) process identifier
Answer: a
Explanation: None.
4. What is stub?
a) transmits the message to the server where the server side stub receives the message and invokes procedure on the
server side
b) packs the parameters into a form transmittable over the network
c) locates the port on the server
d) all of the mentioned
Answer: d
Explanation: None.
5. To resolve the problem of data representation on different systems RPCs define _____________
8. A process that is based on IPC mechanism which executes on different systems and can communicate with other
processes using message based communication, is called ________
1. The initial program that is run when the computer is powered up is called __________
a) boot program
b) bootloader
c) initializer
d) bootstrap program
Answer: d
Explanation: None.
3. What is a trap/exception?
4. What is an ISR?
a) the CPU uses polling to watch the control bit constantly, looping to see if a device is ready
b) the CPU writes one data byte to the data register and sets a bit in control register to show that a byte is available
c) the CPU receives an interrupt when the device is ready for the next byte
d) the CPU runs a user written code and does accordingly
Answer: b
Explanation: None.
a) the CPU uses polling to watch the control bit constantly, looping to see if a device is ready
b) the CPU writes one data byte to the data register and sets a bit in control register to show that a byte is available
c) the CPU receives an interrupt when the device is ready for the next byte
d) the CPU runs a user written code and does accordingly
Answer: a
Explanation: None.
a) the CPU uses polling to watch the control bit constantly, looping to see if a device is ready
b) the CPU writes one data byte to the data register and sets a bit in control register to show that a byte is available
c) the CPU receives an interrupt when the device is ready for the next byte
d) the CPU runs a user written code and does accordingly
Answer: c
Explanation: None.
a) multiprocessor systems
b) multiprogramming operating systems
c) larger memory sized systems
d) none of the mentioned
Answer: b
Explanation: None.
a) time
b) space
c) money
d) all of the mentioned
Answer: a
Explanation: None.
5. A process is selected from the ______ queue by the ________ scheduler, to be executed.
a) When a process switches from the running state to the ready state
b) When a process goes from the running state to the waiting state
c) When a process switches from the waiting state to the ready state
d) All of the mentioned
Answer: b
Explanation: There is no other choice.
7. The switching of the CPU from one process or thread to another is called ____________
a) process switch
b) task switch
c) context switch
d) all of the mentioned
Answer: d
Explanation: None.
a) the total time taken from the submission time till the completion time
b) the total time taken from the submission time till the first response is produced
c) the total time taken from submission time till the response is output
d) none of the mentioned
Answer: b
Explanation: None.
a) Non-preemptive scheduling
b) Preemptive scheduling
c) All of the mentioned
d) None of the mentioned
Answer: b
Explanation: None.
a) using very large time slices converts it into First come First served scheduling algorithm
b) using very small time slices converts it into First come First served scheduling algorithm
c) using extremely small time slices increases performance
d) using very small time slices converts it into Shortest Job First algorithm
Answer: a
Explanation: All the processes will be able to get completed.
3. The portion of the process scheduler in an operating system that dispatches processes is concerned with ________
____
6. The strategy of making processes that are logically runnable to be temporarily suspended is called ____________
7. What is Scheduling?
8. There are 10 different processes running on a workstation. Idle processes are waiting for an input event in the inp
ut queue. Busy processes are scheduled with the Round-Robin time sharing method. Which out of the following qua
ntum times is the best value for small response times, if the processes have a short runtime, e.g. less than 10ms?
a) tQ = 15ms
b) tQ = 40ms
c) tQ = 45ms
d) tQ = 50ms
Answer: a
Explanation: None.
9. Orders are processed in the sequence they arrive if _______ rule sequences the jobs.
10. Which of the following algorithms tends to minimize the process flow time?
11. Under multiprogramming, turnaround time for short jobs is usually ________ and that for long jobs is slightly _
__________
a) Lengthened; Shortened
b) Shortened; Lengthened
c) Shortened; Shortened
d) Shortened; Unchanged
Answer: b
Explanation: None.
a) I only
b) I and III only
c) II and III only
d) I, II and III
Answer: d
Explanation: I) Shortest remaining time first scheduling is a preemptive version of shortest job scheduling. It may ca
use starvation as shorter processes may keep coming and a long CPU burst process never gets CPU.
4. Consider the following set of processes, the length of the CPU burst time given in milliseconds.
8. What is ‘Aging’?
a) i only
b) i and iii only
c) ii and iii only
d) i, ii and iii
Answer: d
Explanation: None.
11. Which of the following scheduling algorithms gives minimum average waiting time?
a) FCFS
b) SJF
c) Round – robin
d) Priority
Answer: b
Explanation: None.
a) data consistency
b) data insecurity
c) data inconsistency
d) none of the mentioned
Answer: c
Explanation: None.
2. A situation where several processes access and manipulate the same data concurrently and the outcome of the exe
cution depends on the particular order in which access takes place is called ____________
a) data consistency
b) race condition
c) aging
d) starvation
Answer: b
Explanation: None.
3. The segment of code in which the process may change common variables, update tables, write into files is known
as ____________
a) program
b) critical section
c) non – critical section
d) synchronizing
Answer: b
Explanation: None.
4. Which of the following conditions must be satisfied to solve the critical section problem?
a) Mutual Exclusion
b) Progress
c) Bounded Waiting
d) All of the mentioned
Answer: d
Explanation: None.
a) if a process is executing in its critical section, then no other process must be executing in their critical sections
b) if a process is executing in its critical section, then other processes must be executing in their critical sections
c) if a process is executing in its critical section, then all the resources of the system must be blocked until it finishes
execution
d) none of the mentioned
Answer: a
Explanation: None.
6. Bounded waiting implies that there exists a bound on the number of times a process is allowed to enter its critical
section ____________
a) after a process has made a request to enter its critical section and before the request is granted
b) when another process is in its critical section
c) before a process has made a request to enter its critical section
d) none of the mentioned
Answer: a
Explanation: None.
7. A minimum of _____ variable(s) is/are required to be shared between processes to solve the critical section proble
m.
a) one
b) two
c) three
d) four
Answer: b
Explanation: None.
a) single
b) atomic
c) static
d) none of the mentioned
Answer: b
Explanation: None.
a) wait
b) stop
c) hold
d) none of the mentioned
Answer: a
Explanation: None.
a) stop()
b) block()
c) hold()
d) wait()
Answer: b
Explanation: None.
8. The signal operation of the semaphore basically works on the basic _______ system call.
a) continue()
b) wakeup()
c) getup()
d) start()
Answer: b
Explanation: None.
10. The code that changes the value of the semaphore is ____________
11. The following program consists of 3 concurrent processes and 3 binary semaphores. The semaphores are initializ
ed as S0 = 1, S1 = 0, S2 = 0.
a) At least twice
b) Exactly twice
c) Exactly thrice
d) Exactly once
Answer: a
Explanation: None.
a) 1
b) 2
c) 3
d) None of the mentioned
Answer: c
Explanation: Any one of the 9 processes can get into critical section after executing P(mutex) which decrements the
mutex value to 0. At this time P10 can enter critical section by incrementing the value to 1. Now any of the 9 proces
ses can enter the critical section by again decrementing the mutex value to 0. None of the remaining processes can g
et into their critical sections.
13. Two processes, P1 and P2, need to access a critical section of code. Consider the following synchronization cons
truct used by the processes.
a) Starvation
b) Deadlock
c) Aging
d) Signaling
Answer: b
Explanation: If a thread which had already locked a mutex, tries to lock the mutex again, it will enter into the waitin
g list of that mutex, which results in a deadlock. It is because no other thread can unlock the mutex.
2. What is a semaphore?
a) is a binary mutex
b) must be accessed from only one process
c) can be accessed from multiple processes
d) none of the mentioned
Answer: c
Explanation: None.
4. What is a mutex?
a) is a binary mutex
b) must be accessed from only one process
c) can be accessed from multiple processes
d) none of the mentioned
Answer: b
Explanation: None.
5. At a particular time of computation the value of a counting semaphore is 7.Then 20 P operations and 15 V operati
ons were completed on this semaphore. The resulting value of the semaphore is? (GATE 1987)
a) 42
b) 2
c) 7
d) 12
Answer: b
Explanation: P represents Wait and V represents Signal. P operation will decrease the value by 1 every time and V
operation will increase the value by 1 every time.
a) 1
b) -1
c) 0.8
d) 0.5
Answer: a
Explanation: None.
a) two
b) three
c) four
d) eight
Answer: c
Explanation: Here are the possible ways in which statements from A and B can be interleaved.
a) one
b) two
c) three
d) four
Answer: a
Explanation: The semaphore T ensures that all the statements from A finish execution before B begins. So now there
is only one way in which statements from A and B can be interleaved:
a) System calls
b) IPC mechanisms
c) System protection
d) None of the mentioned
Answer: b
Explanation: None.
a) Mutual Exclusion
b) Bounded Waiting
c) Aging
d) Progress
Answer: b
Explanation: None.
2. In the bounded buffer problem, there are the empty and full semaphores that ____________
4. To ensure difficulties do not arise in the readers – writers problem _______ are given exclusive access to the shar
ed object.
a) readers
b) writers
c) readers and writers
d) none of the mentioned
Answer: b
Explanation: None.
7. All processes share a semaphore variable mutex, initialized to 1. Each process must execute wait(mutex) before e
ntering the critical section and signal(mutex) afterward.
8. All processes share a semaphore variable mutex, initialized to 1. Each process must execute wait(mutex) before e
ntering the critical section and signal(mutex) afterward.
9. Consider the methods used by processes P1 and P2 for accessing their critical sections whenever needed, as given
below. The initial values of shared boolean variables S1 and S2 are randomly assigned. (GATE 2010)
a) semaphore
b) low level synchronization construct
c) high level synchronization construct
d) none of the mentioned
Answer: c
Explanation: None.
3. A procedure defined within a ________ can access only those variables declared locally within the _______ and i
ts formal parameters.
a) process, semaphore
b) process, monitor
c) semaphore, semaphore
d) monitor, monitor
Answer: d
Explanation: None.
a) transaction
b) operation
c) function
d) all of the mentioned
Answer: a
Explanation: None.
2. A terminated transaction that has completed its execution successfully is ____________ otherwise it is ________
__
a) committed, destroyed
b) aborted, destroyed
c) committed, aborted
d) none of the mentioned
Answer: c
Explanation: None.
3. The state of the data accessed by an aborted transaction must be restored to what it was just before the transaction
started executing. This restoration is known as ________ of transaction.
a) safety
b) protection
c) roll – back
d) revert – back
Answer: c
Explanation: None.
a) to ensure atomicity
b) to keep data consistent
c) that records data on stable storage
d) all of the mentioned
Answer: d
Explanation: None.
a) a memory
b) a system
c) a disk
d) a log record
Answer: d
Explanation: None.
7. The undo and redo operations must be _________ to guarantee correct behaviour, even if a failure occurs during r
ecovery process.
a) idempotent
b) easy
c) protected
d) all of the mentioned
Answer: a
Explanation: Idempotent – Multiple executions of an operation have the same result as does one execution.
8. The system periodically performs checkpoints that consists of the following operation(s) ____________
a) Putting all the log records currently in main memory onto stable storage
b) putting all modified data residing in main memory onto stable storage
c) putting a log record onto stable storage
d) all of the mentioned
Answer: d
Explanation: None.
9. Consider a transaction T1 that committed prior to checkpoint. The <T1 commits> record appears in the log before
the <checkpoint> record. Any modifications made by T1 must have been written to the stable storage either with th
e checkpoint or prior to it. Thus at recovery time ____________
15. Which of the following concurrency control protocols ensure both conflict serializability and freedom from dead
lock?
a) I only
b) II only
c) Both I and II
d) Neither I nor II
Answer: b
Explanation: None.
a) must always be less than the total number of resources available in the system
b) must always be equal to the total number of resources available in the system
c) must not exceed the total number of resources available in the system
d) must exceed the total number of resources available in the system
Answer: c
Explanation: None.
4. For a deadlock to arise, which of the following conditions must hold simultaneously?
a) Mutual exclusion
b) No preemption
c) Hold and wait
d) All of the mentioned
Answer: d
Explanation: None.
a) A process must be not be holding a resource, but waiting for one to be freed, and then request to acquire it
b) A process must be holding at least one resource and waiting to acquire additional resources that are being held by
other processes
c) A process must hold at least one resource and not be waiting to acquire additional resources
d) None of the mentioned
Answer: b
Explanation: None.
a) must exist
b) must not exist
c) may exist
d) none of the mentioned
Answer: a
Explanation: A printer cannot be simultaneously shared by several processes.
a) is required
b) is not required
c) may be or may not be required
d) none of the mentioned
Answer: b
Explanation: They do not require mutually exclusive access, and hence cannot be involved in a deadlock.
10. To ensure that the hold and wait condition never occurs in the system, it must be ensured that ____________
11. The disadvantage of a process being allocated all its resources before beginning its execution is ____________
12. To ensure no preemption, if a process is holding some resources and requests another resource that cannot be im
mediately allocated to it ____________
13. One way to ensure that the circular wait condition never holds is to ____________
a) impose a total ordering of all resource types and to determine whether one precedes another in the ordering
b) to never let a process acquire resources that are held by other processes
c) to let a process wait for only one resource at a time
d) all of the mentioned
Answer: a
Explanation: None.
1. Each request requires that the system consider the _____________ to decide whether the current request can be sa
tisfied or must wait to avoid a future possible deadlock.
2. Given a priori information about the ________ number of resources of each type that maybe requested for each pr
ocess, it is possible to construct an algorithm that ensures that the system will never enter a deadlock state.
a) minimum
b) average
c) maximum
d) approximate
Answer: c
Explanation: None.
3. A deadlock avoidance algorithm dynamically examines the __________ to ensure that a circular wait condition ca
n never exist.
a) safe allocation
b) safe resource
c) safe sequence
d) all of the mentioned
Answer: c
Explanation: None.
a) deadlocks
b) not deadlocks
c) fatal
d) none of the mentioned
Answer: b
Explanation: None.
7. A system has 12 magnetic tape drives and 3 processes : P0, P1, and P2. Process P0 requires 10 tape drives, P1 req
uires 4 and P2 requires 9 tape drives.
a) P0, P1, P2
b) P1, P2, P0
c) P2, P0, P1
d) P1, P0, P2
Answer: d
Explanation: None.
10
a) less efficient
b) more efficient
c) equal
d) none of the mentioned
Answer: a
Explanation: None.
9. The resource allocation graph is not applicable to a resource allocation system ____________
a) Available
b) Need
c) Allocation
d) All of the mentioned
Answer: d
Explanation: None.
10. The Banker’s algorithm is _____________ than the resource allocation graph algorithm.
a) Allocation – Available
b) Max – Available
c) Max – Allocation
d) Allocation – Max
Answer: c
Explanation: None.
11. The data structures available in the Banker’s algorithm are ____________
a) an unsafe state
b) a safe state
c) a protected state
d) a deadlock
Answer: b
Explanation: None.
1. The wait-for graph is a deadlock detection algorithm that is applicable when ____________
a) rarely
b) frequently
c) rarely & frequently
d) none of the mentioned
Answer: b
Explanation: None.
5. What is the disadvantage of invoking the detection algorithm for every request?
a) overhead of the detection algorithm due to consumption of memory
b) excessive time consumed in the request to be allocated memory
c) considerable overhead in computation time
d) all of the mentioned
Answer: c
Explanation: None.
6. A deadlock eventually cripples system throughput and will cause the CPU utilization to ______
a) increase
b) drop
c) stay still
d) none of the mentioned
Answer: b
Explanation: None.
7. Every time a request for allocation cannot be granted immediately, the detection algorithm is invoked. This will h
elp identify ____________
8. A computer system has 6 tape drives, with ‘n’ processes competing for them. Each process may need 3 tape drive
s. The maximum value of ‘n’ for which the system is guaranteed to be deadlock free is?
a) 2
b) 3
c) 4
d) 1
Answer: a
Explanation: None.
9. A system has 3 processes sharing 4 resources. If each process needs a maximum of 2 units then, deadlock ______
______
10. ‘m’ processes share ‘n’ resources of the same type. The maximum need of each process doesn’t exceed ‘n’ and t
he sum of all their maximum needs is always less than m+n. In this setup, deadlock ____________
2. The two ways of aborting processes and eliminating deadlocks are ____________
6. If we preempt a resource from a process, the process cannot continue with its normal execution and it must be ___
_________
a) aborted
b) rolled back
c) terminated
d) queued
Answer: b
Explanation: None.
7. To _______ to a safe state, the system needs to keep more information about the states of processes.
8. If the resources are always preempted from the same process __________ can occur.
a) deadlock
b) system crash
c) aging
d) starvation
Answer: d
Explanation: None.
a) Compile time
b) Load time
c) Execution time
d) All of the mentioned
Answer: d
Explanation: None.
3. If the process can be moved during its execution from one memory segment to another, then binding must be ___
_________
a) programmer
b) system architect
c) system designer
d) none of the mentioned
Answer: a
Explanation: None.
a) Memory manager
b) CPU
c) CPU manager
d) User
Answer: a
Explanation: None.
9. If a higher priority process arrives and wants service, the memory manager can swap out the lower priority proces
s to execute the higher priority process. When the higher priority process finishes, the lower priority process is swap
ped back in and continues execution. This variant of swapping is sometimes called?
a) priority swapping
b) pull out, push in
c) roll out, roll in
d) none of the mentioned
Answer: c
Explanation: None.
10. If binding is done at assembly or load time, then the process _____ be moved to different locations after being s
wapped out and in again.
a) can
b) must
c) can never
d) may
Answer: c
Explanation: None.
a) Physical address
b) Logical address
c) Neither physical nor logical
d) None of the mentioned
Answer: b
Explanation: None.
2. The address loaded into the memory address register of the memory is referred to as ____________
a) Physical address
b) Logical address
c) Neither physical nor logical
d) None of the mentioned
Answer: a
Explanation: None.
3. The run time mapping from virtual to physical addresses is done by a hardware device called the ____________
a) basic register
b) regular register
c) relocation register
d) delocation register
Answer: c
Explanation: None.
a) physical memory
b) external storage
c) secondary storage
d) none of the mentioned
Answer: a
Explanation: None.
6. If execution time binding is being used, then a process ______ be swapped to a different memory space.
a) has to be
b) can never
c) must
d) may
Answer: d
Explanation: None.
a) motherboard
b) keyboard
c) monitor
d) backing store
Answer: d
Explanation: None.
9. The ________ consists of all processes whose memory images are in the backing store or in memory and are read
y to run.
a) wait queue
b) ready queue
c) cpu
d) secondary storage
Answer: b
Explanation: None.
10. The _________ time in a swap out of a running process and swap in of a new process into the memory is very hi
gh.
a) context – switch
b) waiting
c) execution
d) all of the mentioned
Answer: a
Explanation: None.
a) waiting
b) transfer
c) execution
d) none of the mentioned
Answer: b
Explanation: None.
12. Swapping _______ be done when a process has pending I/O, or has to execute I/O operations only into operating
system buffers.
a) must
b) can
c) must never
d) maybe
Answer: c
Explanation: None.
a) as a chunk of disk
b) separate from a file system
c) into a file system
d) all of the mentioned
Answer: a
Explanation: None.
********** Join:- https://t.me/AKTU_Notes_Books_Quantum **********
a) operating system
b) cpu
c) user processes
d) all of the mentioned
Answer: a
Explanation: None.
5. With relocation and limit registers, each logical address must be _______ the limit register.
a) less than
b) equal to
c) greater than
d) none of the mentioned
Answer: a
Explanation: None.
6. The operating system and the other processes are protected from being modified by an already running process be
cause ____________
8. Using transient code, _______ the size of the operating system during program execution.
a) increases
b) decreases
c) changes
d) maintains
Answer: c
Explanation: None.
9. When memory is divided into several fixed sized partitions, each partition may contain ________
11. The first fit, best fit and worst fit are strategies to select a ______
a) is being used
b) is not being used
c) is always used
d) none of the mentioned
Answer: b
Explanation: None.
a) compaction
b) larger memory space
c) smaller memory space
d) none of the mentioned
Answer: a
Explanation: None.
a) cannot be done
b) must be done
c) must not be done
d) can be done
Answer: a
Explanation: None.
5. The disadvantage of moving all process to one end of memory and all holes to the other direction, producing one l
arge hole of available memory is ____________
10. When the memory allocated to a process is slightly larger than the process, then ____________
a) frames
b) pages
c) backing store
d) none of the mentioned
Answer: a
Explanation: None.
2. Logical memory is broken into blocks of the same size called _________
a) frames
b) pages
c) backing store
d) none of the mentioned
Answer: b
Explanation: None.
3. Every address generated by the CPU is divided into two parts. They are ____________
a) frame bit
b) page number
c) page offset
d) frame offset
Answer: b
Explanation: None.
5. The _____ table contains the base address of each page in physical memory.
a) process
b) memory
c) page
d) frame
Answer: c
Explanation: None.
a) varied
b) power of 2
c) power of 4
d) none of the mentioned
Answer: b
Explanation: None.
7. If the size of logical address space is 2 to the power of m, and a page size is 2 to the power of n addressing units, t
hen the high order _____ bits of a logical address designate the page number, and the ____ low order bits designate t
he page offset.
a) m, n
b) n, m
c) m – n, m
d) m – n, n
Answer: d
Explanation: None.
a) internal
b) external
c) either type of
d) none of the mentioned
Answer: b
Explanation: None.
9. The operating system maintains a ______ table that keeps track of how many frames have been allocated, how ma
ny are there, and how many are available.
a) page
b) mapping
c) frame
d) memory
Answer: c
Explanation: None.
a) waiting
b) execution
c) context – switch
d) all of the mentioned
Answer: c
Explanation: None.
a) queues
b) stacks
c) counters
d) registers
Answer: d
Explanation: None.
13. For larger page tables, they are kept in main memory and a __________ points to the page table.
a) extended by a factor of 3
b) extended by a factor of 2
c) slowed by a factor of 3
d) slowed by a factor of 2
Answer: d
Explanation: None.
a) key
b) value
c) bit value
d) constant
Answer: a
Explanation: None.
a) TLB miss
b) Buffer miss
c) TLB hit
d) All of the mentioned
Answer: a
Explanation: None.
3. An ______ uniquely identifies processes and is used to provide address space protection for that process.
4. The percentage of times a page number is found in the TLB is known as ____________
a) miss ratio
b) hit ratio
c) miss percent
d) none of the mentioned
Answer: b
Explanation: None.
6. When the valid – invalid bit is set to valid, it means that the associated page ____________
a) is in the TLB
b) has data in it
c) is in the process’s logical address space
d) is the system’s physical address space
Answer: c
Explanation: None.
a) error
b) protection
c) valid – invalid
d) access
Answer: c
Explanation: None.
8. When there is a large logical address space, the best way of paging would be ____________
a) not to page
b) a two level paging algorithm
c) the page table itself
d) all of the mentioned
Answer: b
Explanation: None.
9. In a paged memory, the page hit ratio is 0.35. The required to access a page in secondary memory is equal to 100
ns. The time required to access a page in primary memory is 10 ns. The average time required to access a page is?
a) 3.0 ns
b) 68.0 ns
c) 68.5 ns
d) 78.5 ns
Answer: c
Explanation: None.
10. To obtain better memory utilization, dynamic loading is used. With dynamic loading, a routine is not loaded unti
l it is called. For implementing dynamic loading ____________
11. In paged memory systems, if the page size is increased, then the internal fragmentation generally ____________
a) becomes less
b) becomes more
c) remains constant
d) none of the mentioned
Answer: b
Explanation: None.
2. In paging the user provides only ________ which is partitioned by the hardware into ________ and ______
a) segment base
b) segment peak
c) segment value
d) none of the mentioned
Answer: a
Explanation: None.
8. When the entries in the segment tables of two different processes point to the same physical location __________
__
a) write only
b) read only
c) read – write
d) none of the mentioned
Answer: c
Explanation: None.
10. If there are 32 segments, each of size 1Kb, then the logical address should have ____________
a) 13 bits
b) 14 bits
c) 15 bits
d) 16 bits
Answer: a
Explanation: To specify a particular segment, 5 bits are required. To select a particular byte after selecting a page, 1
0 more bits are required. Hence 15 bits are required.
11. Consider a computer with 8 Mbytes of main memory and a 128K cache. The cache block size is 4 K. It uses a di
rect mapping scheme for cache management. How many different main memory blocks can map onto a given physic
al cache block?
a) 2048
b) 256
c) 64
d) 8
Answer: c
Explanation: None.
12. A multilevel page table is preferred in comparison to a single level page table for translating virtual address to ph
ysical address because ____________
1. If one or more devices use a common set of wires to communicate with the computer system, the connection is cal
led ______
a) CPU
b) Monitor
c) Wirefull
d) Bus
Answer: d
Explanation: None.
2. A ____ a set of wires and a rigidly defined protocol that specifies a set of messages that can be sent on the wires.
a) port
b) node
c) bus
d) none of the mentioned
Answer: c
Explanation: None.
3. When device A has a cable that plugs into device B, and device B has a cable that plugs into device C and device
C plugs into a port on the computer, this arrangement is called a _________
a) port
b) daisy chain
c) bus
d) cable
Answer: b
Explanation: None.
4. The _________ present a uniform device-access interface to the I/O subsystem, much as system calls provide a st
andard interface between the application and the operating system.
a) Devices
b) Buses
c) Device drivers
d) I/O systems
Answer: c
Explanation: None.
a) controller
b) driver
c) host
d) bus
Answer: a
Explanation: None.
6. An I/O port typically consists of four registers status, control, ________ and ________ registers.
a) flow in
b) flow out
c) data in
d) data out
Answer: c
Explanation: None.
a) status
b) control
c) data in
d) data out
Answer: d
Explanation: None.
9. The hardware mechanism that allows a device to notify the CPU is called _______
a) polling
b) interrupt
c) driver
d) controlling
Answer: b
Explanation: None.
10. The CPU hardware has a wire called __________ that the CPU senses after executing every instruction.
11. The _________ determines the cause of the interrupt, performs the necessary processing and executes a return fr
om the interrupt instruction to return the CPU to the execution state prior to the interrupt.
13. The _________ are reserved for events such as unrecoverable memory errors.
1. The ________ can be turned off by the CPU before the execution of critical instruction sequences that must not b
e interrupted.
a) nonmaskable interrupt
b) blocked interrupt
c) maskable interrupt
d) none of the mentioned
Answer: c
Explanation: None.
a) nonmaskable interrupt
b) blocked interrupt
c) maskable interrupt
d) none of the mentioned
Answer: c
Explanation: None.
a) the interrupts
b) the memory addresses of specialized interrupt handlers
c) the identifiers of interrupts
d) the device addresses
Answer: b
Explanation: None.
4. Division by zero, accessing a protected or non existent memory address, or attempting to execute a privileged inst
ruction from user mode are all categorized as ________
a) errors
b) exceptions
c) interrupt handlers
d) all of the mentioned
Answer: b
Explanation: None.
a) dma
b) programmed I/O
c) controller register
d) none of the mentioned
Answer: a
Explanation: None.
a) block stream
b) set of blocks
c) character stream
d) none of the mentioned
Answer: c
Explanation: None.
a) same as
b) not the same as
c) all of the mentioned
d) none of the mentioned
Answer: b
Explanation: None.
3. Caching ____________
4. Spooling ____________
5. The ________ keeps state information about the use of I/O components.
a) CPU
b) OS
c) kernel
d) shell
Answer: c
Explanation: None.
a) process table
b) open file table
c) close file table
d) all of the mentioned
Answer: b
Explanation: None.
a) message – passing
b) draft – passing
c) secondary memory
d) cache
Answer: a
Explanation: None.
8. A ________ is a full duplex connection between a device driver and a user level process.
a) Bus
b) I/O operation
c) Stream
d) Flow
Answer: c
Explanation: None.
a) major factor
b) minor factor
c) does not matter
d) none of the mentioned
Answer: a
Explanation: None.
10. If the number of cycles spent busy – waiting is not excessive, then ____________
a) preemptive kernels
b) non preemptive kernels
c) preemptive kernels or non preemptive kernels
d) neither preemptive nor non preemptive kernels
Answer: a
Explanation: None.
a) the amount of time an event takes to occur from when the system started
b) the amount of time from the event occurrence till the system stops
c) the amount of time from event occurrence till the event crashes
d) the amount of time that elapses from when an event occurs to when it is serviced.
Answer: d
Explanation: None.
a) minimize
b) maximize
c) not bother about
d) none of the mentioned
Answer: a
Explanation: None.
7. The amount of time required for the scheduling dispatcher to stop one process and start another is known as ____
__________
a) event latency
b) interrupt latency
c) dispatch latency
d) context switch
Answer: c
Explanation: None.
3. Antilock brake systems, flight management systems, pacemakers are examples of ____________
4. In a ______ real time system, it is guaranteed that critical real time tasks will be completed within their deadlines.
a) soft
b) hard
c) critical
d) none of the mentioned
Answer: b
Explanation: None.
a) single purpose
b) inexpensively mass produced
c) small size
d) all of the mentioned
Answer: d
Explanation: None.
9. The technique in which the CPU generates physical addresses directly is known as ____________
a) periods
b) deadlines
c) burst times
d) none of the mentioned
Answer: b
Explanation: None.
2. A process P1 has a period of 50 and a CPU burst of t1 = 25, P2 has a period of 80 and a CPU burst of 35. The tota
l CPU utilization is ____________
a) 0.90
b) 0.74
c) 0.94
d) 0.80
Answer: c
Explanation: None.
3. A process P1 has a period of 50 and a CPU burst of t1 = 25, P2 has a period of 80 and a CPU burst of 35., the prio
rities of P1 and P2 are?
4. A process P1 has a period of 50 and a CPU burst of t1 = 25, P2 has a period of 80 and a CPU burst of 35., can the
two processes be scheduled using the EDF algorithm without missing their respective deadlines?
a) Yes
b) No
c) Maybe
d) None of the mentioned
Answer: a
Explanation: None.
5. Using EDF algorithm practically, it is impossible to achieve 100 percent utilization due to __________
6. T shares of time are allocated among all processes out of N shares in __________ scheduling algorithm.
a) rate monotonic
b) proportional share
c) earliest deadline first
d) none of the mentioned
Answer: b
Explanation: None.
7. If there are a total of T = 100 shares to be divided among three processes, A, B and C. A is assigned 50 shares, B i
s assigned 15 shares and C is assigned 20 shares.
a) 20
b) 15
c) 50
d) none of the mentioned
Answer: c
Explanation: None.
8. If there are a total of T = 100 shares to be divided among three processes, A, B and C. A is assigned 50 shares, B
is assigned 15 shares and C is assigned 20 shares.
a) 20
b) 15
c) 50
d) none of the mentioned
Answer: b
Explanation: None.
9. If there are a total of T = 100 shares to be divided among three processes, A, B and C. A is assigned 50 shares, B
is assigned 15 shares and C is assigned 20 shares.
a) 20
b) 15
c) 50
d) none of the mentioned
Answer: a
Explanation: None.
10. If there are a total of T = 100 shares to be divided among three processes, A, B and C. A is assigned 50 shares,
B is assigned 15 shares and C is assigned 20 shares.
a) allocate 30 shares to it
b) deny entry to D in the system
c) all of the mentioned
d) none of the mentioned
Answer: b
Explanation: None.
a) infinitely long
b) periodic
c) heavy weight
d) light weight
Answer: b
Explanation: None.
2. If the period of a process is ‘p’, then what is the rate of the task?
a) p2
b) 2*p
c) 1/p
d) p
Answer: c
Explanation: None.
4. The ____________ scheduling algorithm schedules periodic tasks using a static priority policy with preemption.
a) a higher priority
b) a lower priority
c) higher & lower priority
d) none of the mentioned
Answer: a
Explanation: None.
7. There are two processes P1 and P2, whose periods are 50 and 100 respectively. P1 is assigned higher priority than
P2. The processing times are t1 = 20 for P1 and t2 = 35 for P2. Is it possible to schedule these tasks so that each me
ets its deadline using Rate monotonic scheduling?
a) yes
b) no
c) maybe
d) none of the mentioned
Answer: a
Explanation: None.
8. If a set of processes cannot be scheduled by rate monotonic scheduling algorithm, then __________
9. A process P1 has a period of 50 and a CPU burst of t1 = 25, P2 has a period of 80 and a CPU burst of 35. The tota
l CPU utilization is?
a) 0.90
b) 0.74
c) 0.94
d) 0.80
Answer: c
Explanation: None.
10. A process P1 has a period of 50 and a CPU burst of t1 = 25, P2 has a period of 80 and a CPU burst of 35. Can th
e processes be scheduled without missing the deadlines?
a) Yes
b) No
c) Maybe
d) None of the mentioned
Answer: b
Explanation: None.
1. The major difference between a multimedia file and a regular file is ___________
a) the size
b) the attributes
c) the ownership
d) the rate at which the file must be accessed
Answer: d
Explanation: Multimedia files must be accessed at a specific rate whereas accessing regular files requires no special
timings.
a) pics
b) shots
c) frames
d) snaps
Answer: c
Explanation: None.
4. The characteristic of the eye to retain the image for a short time after it has been presented is known as ________
___
a) persistence of vision
b) learning power
c) memory mapped input
d) none of the mentioned
Answer: a
Explanation: None.
6. Multimedia files stored on a remote server are delivered to a client across the network using a technique known as
___________
a) download
b) streaming
c) flowing
d) leaking
Answer: b
Explanation: None.
8. A media file containing audio or video is downloaded and stored on the client’s local file system in ___________
a) progressive download
b) regular download
c) real time streaming
d) virtual time streaming
Answer: a
Explanation: As the file is being downloaded, the client is able to play back the media file without having to wait for
the file to be downloaded in its entirety.
10. The media file is streamed to the client but is only played and not stored by the client in ___________
a) progressive download
b) regular download
c) real time streaming
d) virtual time streaming
Answer: c
Explanation: None.
a) buffering
b) random access
c) access
d) sequential access
Answer: b
Explanation: None.
a) live streaming
b) dead streaming
c) static streaming
d) on demand streaming
Answer: a
Explanation: None.
a) live streaming
b) dead streaming
c) static streaming
d) on demand streaming
Answer: d
Explanation: None.
5. For a computer to deliver continuous media it must guarantee the specific rate and timing requirements, also kno
wn as ___________
a) deadline
b) quality of service
c) period
d) burst time
Answer: b
Explanation: None.
a) file systems must be efficient to meet the rate requirements of continuous media
b) network protocols must support bandwidth requirements while minimizing delay and jitter
c) all of the mentioned
d) none of the mentioned
Answer: c
Explanation: None.
4. The level that treats different types of traffics in different ways, giving certain traffic streams higher priority than
other streams and with best efforts, but no guarantees are made ___________
a) Throughput
b) Jitter
c) Delay
d) All of the mentioned
Answer: d
Explanation: None.
a) the time from when a request is first submitted to when the desired result is produced
b) the delay that occurs during playback of the stream
c) how the errors are handled during the transmission and processing of continuous media
d) none of the mentioned
Answer: a
Explanation: None.
a) processor
b) memory location
c) resource manager
d) all of the mentioned
Answer: c
Explanation: None.
a) static, still
b) static, dynamic
c) live, dead
d) none of the mentioned
Answer: b
Explanation: None.
2. The priority of a process will ______________ if the scheduler assigns it a static priority.
a) change
b) remain unchanged
c) depends on the operating system
d) none of the mentioned
Answer: b
Explanation: None.
3. As disks have relatively low transfer rates and relatively high latency rates, disk schedulers must reduce latency ti
mes to ___________
4. Servicing requests strictly according to deadline using EDF may result in ___________
5. The hybrid algorithm that combines EDF with SCAN algorithm is known as ___________
a) EDS
b) SDF
c) SCAN-EDF
d) None of the mentioned
Answer: c
Explanation: None.
6. If several requests have different deadlines that are relatively close together, then using the SCAN – EDF algorith
m ___________
7. Multimedia systems require _________ scheduling to ensure critical tasks will be serviced within timing deadline
s.
8. The EDF scheduler uses ________ to order requests according to their deadlines.
a) stack
b) disks
c) queue
d) none of the mentioned
Answer: c
Explanation: None.
9. In SCAN – EDF, requests with the same deadlines are ordered according to ___________
a) SCAN policy
b) EDF policy
c) FCFS policy
d) FIFO policy
Answer: a
Explanation: None.
1. The three general methods for delivering content from a server to a client across a network are ___________
a) unicasting
b) multicasting
c) broadcasting
d) all of the mentioned
Answer: d
Explanation: None.
a) a single client
b) all clients, regardless whether they want the content or not
c) a group of receivers who indicate they wish to receive the content
d) none of the mentioned
Answer: a
Explanation: None.
a) a single client
b) all clients, regardless whether they want the content or not
c) a group of receivers who indicate they wish to receive the content
d) none of the mentioned
Answer: b
Explanation: None.
a) a single client
b) all clients, regardless whether they want the content or not
c) a group of receivers who indicate they wish to receive the content
d) none of the mentioned
Answer: c
Explanation: None.
6. HTTP is __________
a) a stateful protocol
b) a stateless protocol
c) a protocol that maintains the status of its connection with the client
d) a stateless protocol that does not maintain the status of its connection with the client
Answer: d
Explanation: None.
a) SETUP
b) PLAY
c) PAUSE
d) All of the mentioned
Answer: d
Explanation: None.
a) the server breaks down the connection and releases the resources allocated for the session
b) the client breaks down the connection and releases the resources allocated for the session
c) the system crashes
d) none of the mentioned
Answer: a
Explanation: None.
12. The difficulty with multicasting from a practical point of view is ___________
13. To let a client have random access to a media stream with ___________
a) Theft of information
b) Modification of data
c) Wiping of information
d) All of the mentioned
Answer: d
Explanation: None.
a) File Shredding
b) File sharing and permission
c) File corrupting
d) File integrity
Answer: b
Explanation: Sharing and associated permissions are usual exploits which can compromise the system.
a) Key card
b) fingerprint
c) retina pattern
d) Password
Answer: d
Explanation: Passwords can be compromised more easily than to replicate a physical thing like key card, fingerprint
or retina.
a) 19thAugust88
b) Delhi88
c) P@assw0rd
d) !augustdelhi
Answer: c
Explanation: It has a combination of Alphabet both capital and small along with number and special character. Thus
always use complex password with a combination of all these.
a) It is easy to generated
b) It cannot be shared
c) It is different for every access
d) It is a complex encrypted password
Answer: c
Explanation: One time password is safe since it is generated per access and thus cannot be brute forced or deduced.
9. What does Light Directory Access Protocol (LDAP) doesn’t store?
a) Users
b) Address
c) Passwords
d) Security Keys
Answer: b
Explanation: None.
a) Authorization
b) Authentication
c) Authorization & Authentication are same
d) None of the mentioned
Answer: a
Explanation: None.
a) Default behavior of OS
b) Part of AES encryption practice
c) Devices being accessed forces the user
d) Account administrator
Answer: d
Explanation: Its administrator’s job to ensure that password of the user remains private and is known only to user. B
ut while making a new user account he assigns a random general password to give it to user. Thus even administrato
r cannot access a particular users account.
a) Trap door
b) Fake process
c) Spawn Process
d) VAX process
Answer: c
Explanation: None.
10. Who unleashed famous worm attack in 1988 which effected UNIX systems and caused losses in millions?
a) Robert Morris
b) Bob Milano
c) Mark zuckerberg
d) Bill Gates
Answer: a
Explanation: None.
a) ACK scanning
b) Window scanning
c) IGMP scan
d) FIN scanning
Answer: c
Explanation: None.
16. With regard to DOS attack what is not true from below options?
a) A trusted antivirus
b) 24 hours scanning for virus
c) Firewall to separate trusted and untrusted network
d) Deny users access to websites which can potentially cause security leak
Answer: c
Explanation: Firewall create a protective barrier to secure internal network. An antivirus can only detect harmful vir
uses but cannot stop illegal access by remote attacker.
a) Buffer overflows
b) Unexpected combinations and unhandled input
c) Race conditions
d) All of the mentioned
Answer: d
Explanation: None.
a) Analysis Engine
b) Event provider
c) Alert Database
d) All of the mentioned
Answer: d
Explanation: None.
a) anomaly detection
b) signature based misuse
c) stack based
d) all of the mentioned
Answer: d
Explanation: None.
4. What are the different ways to classify an IDS?
a) Zone based
b) Host & Network based
c) Network & Zone based
d) Level based
Answer: b
Explanation: None.
a) Attack verification
b) System specific activity
c) No additional hardware required
d) All of the mentioned
Answer: d
Explanation: None.
a) They are integrated closely with the TCP/IP stack and watch packets
b) The host operating system logs in the audit information
c) It is programmed to interpret a certain series of packets
d) It models the normal usage of network as a noise characterization
Answer: a
Explanation: None.
a) AES
b) TES
c) Triple DES
d) DES
Answer: b
Explanation: None.
a) Two fish
b) RC5
c) RC4
d) TBONE
Answer: d
Explanation: None.
a) 128
b) 150
c) 160
d) 112
Answer: a
Explanation: None.
a) 128
b) 160
c) 150
d) 112
Answer: b
Explanation: None.
a) MAC
b) AES
c) DAS
d) Digital-signature
Answer: a
Explanation: None.
2. A thread shares its resources(like data section, code section, open files, signals) with ___________
a) share the memory and resources of the process to which the threads belong
b) an application have several different threads of activity all within the same address space
c) reduce the address space that a process could potentially use
d) all of the mentioned
Answer: d
Explanation: None.
a) decreases concurrency
b) increases concurrency
c) doesn’t affect the concurrency
d) can increase or decrease the concurrency
Answer: b
Explanation: None.
a) a part of
b) the creator of
c) unaware of
d) aware of
Answer: c
Explanation: None.
9. If the kernel is single threaded, then any user level thread performing a blocking system call will ___________
a) cause the entire process to run along with the other threads
b) cause the thread to block with the other threads running
c) cause the entire process to block even if the other threads are available to run
d) none of the mentioned
Answer: c
Explanation: None.
10. Because the kernel thread management is done by the Operating System itself ___________
a) the kernel can schedule another thread in the application for execution
b) the kernel cannot schedule another thread in the same application for execution
c) the kernel must schedule another thread of a different application for execution
d) the kernel must schedule another thread of the same application on a different processor
Answer: a
Explanation: None.
a) Context switch time is longer for kernel level threads than for user level threads
b) User level threads do not need any hardware support
c) Related kernel level threads can be scheduled on different processors in a multiprocessor system
d) Blocking one kernel level thread blocks all other related threads
Answer: d
Explanation: None.
1. The model in which one kernel thread is mapped to many user-level threads is called ___________
2. The model in which one user-level thread is mapped to many kernel level threads is called ___________
3. In the Many to One model, if a thread makes a blocking system call ___________
4. In the Many to One model, multiple threads are unable to run in parallel on multiprocessors because of ________
___
a) increased concurrency
b) decreased concurrency
c) increased or decreased concurrency
d) concurrency equivalent to other models
Answer: a
Explanation: None.
6. In the One to One model when a thread makes a blocking system call ___________
9. In the Many to Many model true concurrency cannot be gained because ___________
10. In the Many to Many models when a thread performs a blocking system call ___________
1. Signals that occur at the same time, are presented to the process ____________
a) physical memory
b) logical memory
c) physical & logical memory
d) none of the mentioned
Answer: a
Explanation: None.
4. The ability to execute a program that is only partially in memory has benefits like ____________
a) demand paging
b) buses
c) virtualization
d) all of the mentioned
Answer: a
Explanation: None.
7. Segment replacement algorithms are more complex than page replacement algorithms because ____________
10. The valid – invalid bit, in this case, when valid indicates?
12. When a page fault occurs, the state of the interrupted process is ____________
a) disrupted
b) invalid
c) saved
d) none of the mentioned
Answer: c
Explanation: None.
16. Locality of reference implies that the page reference being made by a process ____________
1. Which of the following page replacement algorithms suffers from Belady’s Anomaly?
a) Optimal replacement
b) LRU
c) FIFO
d) Both optimal replacement and FIFO
Answer: c
Explanation: None.
a) 8
b) 10
c) 9
d) 7
Answer: c
Explanation: None.
3. In question 2, if the number of page frames is increased to 4, then the number of page transfers ____________
a) decreases
b) increases
c) remains the same
d) none of the mentioned
Answer: b
Explanation: None.
4. A memory page containing a heavily used variable that was initialized very early and is in constant use is remove
d, then the page replacement algorithm used is ____________
a) LRU
b) LFU
c) FIFO
d) None of the mentioned
Answer: c
Explanation: None.
5. A virtual memory system uses First In First Out (FIFO) page replacement policy and allocates a fixed number of f
rames to a process. Consider the following statements.
a) are aware
b) are unaware
c) may unaware
d) none of the mentioned
Answer: b
Explanation: None.
a) one
b) two
c) three
d) four
Answer: b
Explanation: None.
8. When a page is selected for replacement, and its modify bit is set ____________
10. A FIFO replacement algorithm associates with each page the _______
a) Replace the page that has not been used for a long time
b) Replace the page that has been used for a long time
c) Replace the page that will not be used for a long time
d) None of the mentioned
Answer: c
Explanation: None.
13. LRU page – replacement algorithm associates with each page the ______
a) 10
b) 15
c) 11
d) 12
Answer: d
Explanation: None.
15. What are the two methods of the LRU page replacement policy that can be implemented in hardware?
a) Counters
b) RAM & Registers
c) Stack & Counters
d) Registers
Answer: c
Explanation: None.
1. When using counters to implement LRU, we replace the page with the ____________
2. In the stack implementation of the LRU algorithm, a stack can be maintained in a manner ____________
a) whenever a page is used, it is removed from the stack and put on bottom
b) the bottom of the stack is the LRU page
c) the top of the stack contains the LRU page and all new pages are added to the top
d) none of the mentioned
Answer: b
Explanation: None.
3. There is a set of page replacement algorithms that can never exhibit Belady’s Anomaly, called ____________
a) queue algorithms
b) stack algorithms
c) string algorithms
d) none of the mentioned
Answer: b
Explanation: None.
a) 2
b) 3
c) 4
d) 5
Answer: c
Explanation: None.
7. The minimum number of page frames that must be allocated to a running process in a virtual memory environmen
t is determined by ____________
8. What is the reason for using the LFU page replacement algorithm?
9. What is the reason for using the MFU page replacement algorithm?
10. The implementation of the LFU and the MFU algorithm is very uncommon because ____________
3. Consider a machine in which all memory reference instructions have only one memory address, for them we need
at least _____ frame(s).
a) one
b) two
c) three
d) none of the mentioned
Answer: b
Explanation: At least one frame for the instruction and one for the memory reference.
5. The algorithm in which we split m frames among n processes, to give everyone an equal share, m/n frames is kno
wn as ____________
6. The algorithm in which we allocate memory to each process according to its size is known as ____________
a) greater than
b) same as
c) lesser than
d) none of the mentioned
Answer: b
Explanation: None.
8. _________ replacement allows a process to select a replacement frame from the set of all frames, even if the fram
e is currently allocated to some other process.
a) Local
b) Universal
c) Global
d) Public
Answer: c
Explanation: None.
9. _________ replacement allows each process to only select from its own set of allocated frames.
a) Local
b) Universal
c) Global
d) Public
Answer: a
Explanation: None.
10. One problem with the global replacement algorithm is that ____________
a) it is very expensive
b) many frames can be allocated to a process
c) only a few frames can be allocated to a process
d) a process cannot control its own page – fault rate
Answer: d
Explanation: None.
a) Local
b) Global
c) Universal
d) Public
Answer: b
Explanation: None.
a) increases
b) keeps constant
c) decreases
d) none of the mentioned
Answer: c
Explanation: None.
3. What is a locality?
a) may
b) must
c) do not
d) must not
Answer: a
Explanation: None.
a) {1, 2, 4, 5, 6}
b) {2, 1, 6, 7, 3}
c) {1, 6, 5, 7, 2}
d) {1, 2, 3, 4, 5}
Answer: c
Explanation: None.
10. If the sum of the working – set sizes increases, exceeding the total number of available frames ____________
a) 10
b) 14
c) 8
d) 11
Answer: a
Explanation: None.
a) 10
b) 14
c) 8
d) 11
Answer: c
Explanation: None.
a) 16
b) 15
c) 14
d) 11
Answer: a
Explanation: None.
a) 16
b) 15
c) 14
d) 11
Answer: c
Explanation: None.
a) 16
b) 15
c) 14
d) 11
Answer: d
Explanation: None.
a) file
b) swap space
c) directory
d) text format
Answer: a
Explanation: None.
a) name
b) type
c) identifier
d) all of the mentioned
Answer: d
Explanation: None.
a) swap space
b) operating system
c) seperate directory structure
d) none of the mentioned
Answer: c
Explanation: None.
5. The operating system keeps a small table containing information about all open files called ____________
a) system table
b) open-file table
c) file table
d) directory table
Answer: b
Explanation: None.
7. System wide table in UNIX contains process independent information such as ____________
8. The open file table has a/an _______ associated with each file.
a) file content
b) file permission
c) open count
d) close count
Answer: c
Explanation: open count indicates the number of processes that have the file open.
9. Which of the following are the two parts of the file name?
1. The UNIX sytem uses a/an ________ stored at the beginning of a some files to indicate roughly the type of file.
a) identifier
b) extension
c) virtual number
d) magic number
Answer: d
Explanation: None.
2. The larger the block size, the ______ the internal fragmentation.
a) greater
b) lesser
c) same
d) none of the mentioned
Answer: a
Explanation: None.
a) works well
b) doesnt work well
c) maybe works well and doesnt work well
d) none of the mentioned
Answer: a
Explanation: None.
5. The direct access method is based on a ______ model of a file, as _____ allow random access to any file block.
9. For large files, when the index itself becomes too large to be kept in memory?
a) index is called
b) an index is created for the index file
c) secondary index files are created
d) all of the mentioned
Answer: b
Explanation: None.
2. The directory can be viewed as a _________ that translates file names into their directory entries.
a) symbol table
b) partition
c) swap space
d) cache
Answer: a
Explanation: None.
a) All files are contained in different directories all at the same level
b) All files are contained in the same directory
c) Depends on the operating system
d) None of the mentioned
Answer: b
Explanation: None.
6. When a user job starts in a two level directory system, or a user logs in _____________
10. The current directory contains, most of the files that are _____________
a) leaf
b) stem
c) current directory
d) root
Answer: d
Explanation: None.
a) leaf
b) stem
c) current directory
d) root
Answer: c
Explanation: None.
a) tree structure
b) cyclic graph directory structure
c) two level directory structure
d) acyclic graph directory
Answer: d
Explanation: None.
a) allows
b) may restrict
c) restricts
d) none of the mentioned
Answer: c
Explanation: None.
a) a directory entry
b) a pointer to another file or subdirectory
c) implemented as an absolute or relative path name
d) all of the mentioned
Answer: d
Explanation: None.
8. The operating system _______ the links when traversing directory trees, to preserve the acyclic structure of the sy
stem.
a) considers
b) ignores
c) deletes
d) none of the mentioned
Answer: b
Explanation: None.
a) deletes
b) affects
c) does not affect
d) none of the mentioned
Answer: c
Explanation: None.
10. When keeping a list of all the links/references to a file, and the list is empty, implies that _____________
11. When a cycle exists, the reference count maybe non zero, even when it is no longer possible to refer to a director
y or file, due to _______
2. When a file system is mounted over a directory that is not empty then _____________
3. In UNIX, exactly which operations can be executed by group members and other users is definable by _________
____
4. A process _____ lower the priority of another process if both are owned by the same owner.
a) must
b) can
c) cannot
d) none of the mentioned
Answer: b
Explanation: None.
5. In distributed file system ________________ directories are visible from the local machine.
a) protected
b) local
c) private
d) remote
Answer: d
Explanation: None.
6. In the world wide web, a ____ is needed to gain access to the remote files, and separate operations are used to tran
sfer files.
a) laptop
b) plugin
c) browser
d) player
Answer: c
Explanation: None.
8. The machine containing the files is the _______ and the machine wanting to access the files is the ______
a) master, slave
b) memory, user
c) server, client
d) none of the mentioned
Answer: c
Explanation: None.
11. To recover from failures in the network operations _____________ information may be maintained.
a) ip address
b) state
c) stateless
d) operating system
Answer: b
Explanation: None.
12. The series of accesses between the open and close operations is a _____________
a) transaction
b) procedure
c) program
d) file session
Answer: d
Explanation: None.
a) lower
b) central
c) higher
d) none of the mentioned
Answer: a
Explanation: None.
a) their maintenance
b) their length
c) their permissions
d) all of the mentioned
Answer: b
Explanation: None.
4. Many systems recognize three classifications of users in connection with each file (to condense the access control
list).
a) Owner
b) Group
c) Universe
d) All of the mentioned
Answer: d
Explanation: None.
a) different
b) similar
c) same
d) none of the mentioned
Answer: b
Explanation: None.
a) superuser
b) any user
c) a programmer only
d) the people in the group only
Answer: a
Explanation: None.
8. To control access the three bits used in UNIX are represented by _____________
a) r
b) w
c) x
d) all of the mentioned
Answer: d
Explanation: None.
11. In UNIX, the directory protection is handled _________ to the file protection.
a) different
b) similar
c) it is not handled at all
d) none of the mentioned
Answer: b
Explanation: None.
12. Disks are segmented into one or more partitions, each containing a file system or ______
a) left ‘raw’
b) made into swap space
c) made into backup space
d) left ‘ripe’
Answer: a
Explanation: None.
1. The three major methods of allocating disk space that are in wide use are _____________
a) contiguous
b) linked
c) indexed
d) all of the mentioned
Answer: d
Explanation: None.
5. On systems where there are multiple operating system, the decision to load a particular one is done by _________
____
a) boot loader
b) bootstrap
c) process control block
d) file control block
Answer: a
Explanation: None.
6. The VFS (virtual file system) activates file system specific operations to handle local requests according to their _
______
a) size
b) commands
c) timings
d) file system types
Answer: d
Explanation: None.
10. _______ and ________ are the most common strategies used to select a free hole from the set of available holes.
11. The first fit and best fit algorithms suffer from _____________
a) internal fragmentation
b) external fragmentation
c) starvation
d) all of the mentioned
Answer: b
Explanation: None.
12. To solve the problem of external fragmentation ________ needs to be done periodically.
a) compaction
b) check
c) formatting
d) replacing memory
Answer: a
Explanation: None.
1. A device driver can be thought of like a translator. Its input consists of _____ commands and output consists of _
______ instructions.
a) files
b) logical blocks of files
c) physical blocks of files
d) all of the mentioned
Answer: d
Explanation: None.
4. For each file there exists a ___________ that contains information about the file, including ownership, permission
s and location of the file contents.
a) metadata
b) file control block
c) process control block
d) all of the mentioned
Answer: b
Explanation: None.
a) can
b) cannot
c) is
d) none of the mentioned
Answer: b
Explanation: None.
a) the contents of the file have to be copied to a new space, a larger hole
b) the file gets destroyed
c) the file will get formatted and lost all its data
d) none of the mentioned
Answer: a
Explanation: None.
a) I only
b) II only
c) Both I and II
d) Neither I nor II
Answer: c
Explanation: None.
a) internal fragmentation
b) external fragmentation
c) starvation
d) all of the mentioned
Answer: b
Explanation: None.
a) internal fragmentation
b) external fragmentation
c) there is no sequential access
d) there is only sequential access
Answer: d
Explanation: None.
a) the same
b) increased
c) decreased
d) not affected
Answer: c
Explanation: None.
2. If the extents are too large, then what is the problem that comes in?
a) internal fragmentation
b) external fragmentation
c) starvation
d) all of the mentioned
Answer: a
Explanation: None.
a) stack
b) linked list
c) data
d) pointer
Answer: b
Explanation: None.
4. A section of disk at the beginning of each partition is set aside to contain the table in _____________
a) fat
b) linked allocation
c) hashed allocation
d) indexed allocation
Answer: a
Explanation: None.
5. Contiguous allocation has two problems _________ and _________ that linked allocation solves.
a) partition
b) address
c) file
d) all of the mentioned
Answer: c
Explanation: None.
a) supports
b) does not support
c) is not related to
d) none of the mentioned
Answer: a
Explanation: None.
8. The pointer overhead of indexed allocation is generally _________ the pointer overhead of linked allocation.
a) less than
b) equal to
c) greater than
d) keeps varying with
Answer: c
Explanation: None.
9. For any type of access, contiguous allocation requires ______ access to get a disk block.
a) only one
b) at least two
c) exactly two
d) none of the mentioned
Answer: a
Explanation: We can easily keep the initial address of the file in memory and calculate immediately the disk address
of the ith block and read it directly.
10. Consider a disk where blocks 2, 3, 4, 5, 8, 9, 10, 11, 12, 13, 17, 18, 25, 26 and 27 are free and the rest of the bloc
ks are allocated. Then the free space bitmap would be _____________
a) 10000110000001110011111100011111…
b) 110000110000001110011111100011111…
c) 01111001111110001100000011100000…
d) 001111001111110001100000011100000…
Answer: d
Explanation: None.
a) CPUs
b) Disks
c) Programs
d) I/O
Answer: b
Explanation: None.
2. In UNIX, even an ’empty’ disk has a percentage of its space lost to ______
a) programs
b) inodes
c) virtual memory
d) stacks
Answer: b
Explanation: None.
3. By preallocating the inodes and spreading them across the volume, we ___________ the system performance.
a) improve
b) decrease
c) maintain
d) do not affect
Answer: a
Explanation: None.
4. ____________ writes occur in the order in which the disk subsystem receives them, and the writes are not buffere
d.
a) Asynchronous
b) Regular
c) Synchronous
d) Irregular
Answer: c
Explanation: None.
a) Asynchronous
b) Regular
c) Synchronous
d) Irregular
Answer: a
Explanation: None.
6. A file being read or written sequentially should not have its pages replaced in LRU order, because ____________
_
a) it is very costly
b) the most recently used page will be used last
c) it is not efficient
d) all of the mentioned
Answer: b
Explanation: None.
7. In the optimized technique for sequential access ___________ removes a page from the buffer as soon as the next
page is requested.
a) write ahead
b) read ahead
c) free-behind
d) add-front
Answer: c
Explanation: None.
8. With _______ a requested page and several subsequent pages are read and cached.
a) write ahead
b) read ahead
c) free-behind
d) add-front
Answer: b
Explanation: None.
a) UNIX
b) Windows
c) Macintosh
d) Solaris
Answer: a
Explanation: None.
a) compares the data in the secondary storage with the data in the cache
b) compares the data in the directory structure with the data blocks on disk
c) compares the system generated output and user required output
d) all of the mentioned
Answer: b
Explanation: None.
a) program
b) code
c) transaction
d) all of the mentioned
Answer: c
Explanation: None.
5. Once the changes are written to the log, they are considered to be ________
a) committed
b) aborted
c) completed
d) none of the mentioned
Answer: a
Explanation: None.
a) writes to the end of its space and then continues at the beginning
b) overwrites older values as it goes
c) all of the mentioned
d) none of the mentioned
Answer: a
Explanation: None.
8. All the changes that were done from a transaction that did not commit before the system crashed, have to be ____
_____
a) saved
b) saved and the transaction redone
c) undone
d) none of the mentioned
Answer: c
Explanation: None.
a) client
b) server
c) both client and server
d) neither client nor server
Answer: c
Explanation: None.
a) local, remote
b) remote, local
c) local, local
d) none of the mentioned
Answer: d
Explanation: None.
3. The _________ becomes the name of the root of the newly mounted directory.
4. ___________ mounts, is when a file system can be mounted over another file system, that is remotely mounted, n
ot local.
a) recursive
b) cascading
c) trivial
d) none of the mentioned
Answer: b
Explanation: None.
a) exhibits
b) does not exhibit
c) may exhibit
d) none of the mentioned
Answer: b
Explanation: Mounting a remote file system does not give the client access to other file systems that were, by chance
, mounted over the former file system.
7. The mount request is mapped to the corresponding __________ and is forwarded to the mount server running on t
he specific server machine.
a) IPC
b) System
c) CPU
d) RPC
Answer: b
Explanation: None.
8. The server maintains a/an ________ that specifies local file systems that it exports for mounting, along with name
s of machines that are permitted to mount them.
a) export list
b) import list
c) sending list
d) receiving list
Answer: a
Explanation: None.
a) are stateless
b) save the current state of the request
c) maybe stateless
d) none of the mentioned
Answer: a
Explanation: None.
2. Every NFS request has a _________ allowing the server to determine if a request is duplicated or if any are missi
ng.
a) name
b) transaction
c) sequence number
d) all of the mentioned
Answer: c
Explanation: None.
a) be visible
b) affect
c) be invisible
d) harm
Answer: c
Explanation: All blocks that the server is managing for the client will be intact.
a) synchronously
b) asynchronously
c) index-wise
d) none of the mentioned
Answer: a
Explanation: None.
a) can be atomic
b) is atomic
c) is non atomic
d) none of the mentioned
Answer: b
Explanation: None.
a) provides
b) does not provide
c) may provide
d) none of the mentioned
Answer: b
Explanation: None.
7. _______________ in NFS involves the parsing of a path name into separate directory entries – or components.
a) Path parse
b) Path name parse
c) Path name translation
d) Path name parsing
Answer: c
Explanation: None.
8. For every pair of component and directory vnode after path name translation ____________
9. When a client has a cascading mount _______ server(s) is/are involved in a path name traversal.
a) at least one
b) more than one
c) more than two
d) more than three
Answer: b
Explanation: None.
a) magnetic disks
b) electrical disks
c) assemblies
d) cylinders
Answer: a
Explanation: None.
2. The heads of the magnetic disk are attached to a _____ that moves all the heads as a unit.
a) spindle
b) disk arm
c) track
d) none of the mentioned
Answer: b
Explanation: None.
3. The set of tracks that are at one arm position make up a ___________
a) magnetic disks
b) electrical disks
c) assemblies
d) cylinders
Answer: d
Explanation: None.
4. The time taken to move the disk arm to the desired cylinder is called the ____________
a) positioning time
b) random access time
c) seek time
d) rotational latency
Answer: c
Explanation: None.
5. The time taken for the desired sector to rotate to the disk head is called ____________
a) positioning time
b) random access time
c) seek time
d) rotational latency
Answer: d
Explanation: None.
a) disk crash
b) head crash
c) magnetic damage
d) all of the mentioned
Answer: b
Explanation: None.
a) faster
b) slower
c) at the same speed
d) none of the mentioned
Answer: b
Explanation: None.
9. ______ controller sends the command placed into it, via messages to the _____ controller.
a) host, host
b) disk, disk
c) host, disk
d) disk, host
Answer: c
Explanation: None.
2. If a process needs I/O to or from a disk, and if the drive or controller is busy then ____________
a) the request will be placed in the queue of pending requests for that drive
b) the request will not be processed and will be ignored completely
c) the request will be not be placed
d) none of the mentioned
Answer: a
Explanation: None.
3. Consider a disk queue with requests for I/O to blocks on cylinders.
a) 600
b) 620
c) 630
d) 640
Answer: d
Explanation: None.
a) 224
b) 236
c) 245
d) 240
Answer: b
Explanation: None.
a) fast
b) very fast
c) slow
d) very slow
Answer: d
Explanation: None.
6. Magnetic tape drives can write data at a speed ________ disk drives.
7. On media that use constant linear velocity (CLV), the _____________ is uniform.
a) LOOK
b) SCAN
c) C-SCAN
d) C-LOOK
Answer: b
Explanation: None.
10. In the _______ algorithm, the disk head moves from one end to the other, servicing requests along the way. Whe
n the head reaches the other end, it immediately returns to the beginning of the disk without servicing any requests o
n the return trip.
a) LOOK
b) SCAN
c) C-SCAN
d) C-LOOK
Answer: c
Explanation: None.
11. In the ______ algorithm, the disk arm goes as far as the final request in each direction, then reverses direction im
mediately without going to the end of the disk.
a) LOOK
b) SCAN
c) C-SCAN
d) C-LOOK
Answer: a
Explanation: None.
1. The process of dividing a disk into sectors that the disk controller can read and write, before a disk can store data i
s known as ____________
a) partitioning
b) swap space creation
c) low-level formatting
d) none of the mentioned
Answer: c
Explanation: None.
a) header
b) data area
c) trailer
d) all of the mentioned
Answer: d
Explanation: None.
3. The header and trailer of a sector contain information used by the disk controller such as _________ and _______
__
4. The two steps the operating system takes to use a disk to hold its files are _______ and ________
5. The _______ program initializes all aspects of the system, from CPU registers to device controllers and the conte
nts of main memory, and then starts the operating system.
a) main
b) bootloader
c) bootstrap
d) rom
Answer: c
Explanation: None.
a) RAM
b) ROM
c) Cache
d) Tertiary storage
Answer: b
Explanation: None.
a) start disk
b) end disk
c) boot disk
d) all of the mentioned
Answer: c
Explanation: None.
a) good blocks
b) destroyed blocks
c) bad blocks
d) none of the mentioned
Answer: c
Explanation: None.
9. In SCSI disks used in high end PCs, the controller maintains a list of _________ on the disk. The disk is initialize
d during ________ formatting which sets aside spare sectors not visible to the operating system.
10. The scheme used in the above question is known as _______ or ________
a) hard error
b) tough error
c) soft error
d) none of the mentioned
Answer: a
Explanation: None.
a) secondary storage
b) main memory
c) tertiary storage
d) none of the mentioned
Answer: b
Explanation: None.
a) increases
b) decreases
c) maintains
d) does not affect
Answer: b
Explanation: Disk access is much slower than memory access.
a) can
b) cannot
c) must not
d) none of the mentioned
Answer: a
Explanation: None.
5. If the swap space is simply a large file, within the file system, ____________ used to create it, name it and allocat
e its space.
6. For swap space created in a separate disk partition where no file system or directory structure is placed, ________
_____ used to allocate and deallocate the blocks.
7. When a fixed amount of swap space is created during disk partitioning, more swap space can be added only by?
a) only I
b) only II
c) both I and II
d) neither I nor II
Answer: c
Explanation: None.
8. In UNIX, two per process ________ are used by the kernel to track swap space use.
a) process tables
b) swap maps
c) memory maps
d) partition maps
Answer: b
Explanation: None.
9. It is __________ to reread a page from the file system than to write it to swap space and then to reread it from the
re.
a) useless
b) less efficient
c) more efficient
d) none of the mentioned
Answer: c
Explanation: None.
3. What is the order decided by a processor or the CPU of a controller to execute an instruction?
a) decode,fetch,execute
b) execute,fetch,decode
c) fetch,execute,decode
d) fetch,decode,execute
Answer: d
Explanation: First instruction is fetched from Program Memory. After fetching, instruction is decoded to generate co
ntrol signals to perform the intended task. After decoding, instruction is executed and the complete intended task of t
hat particular instruction.
a) Data Bus
b) ALU
c) Control Bus
d) Address Bus
Answer: b
Explanation: If we say a microcontroller is 8-bit it means that it is capable of processing 8-bit data at a time. Data pr
ocessing is the task of ALU and if ALU is able to process 8-bit data then the data bus should be 8-bit wide. In most
books it tells that size of data bus but to be precise it is the size of ALU because in Harvard Architecture there are tw
o sets of data bus which can be of same size but it is not mandatory.
5. How are the performance and the computer capability affected by increasing its internal bus width?
7. Give the names of the buses present in a controller for transferring data from one place to another?
8. What is the file extension that is loaded in a microcontroller for executing any instruction?
a) .doc
b) .c
c) .txt
d) .hex
Answer: d
Explanation: Microcontrollers are loaded with .hex extension as they understand the language of 0’s and 1’s only.
9. What is the most appropriate criterion for choosing the right microcontroller of our choice?
a) speed
b) availability
c) ease with the product
d) all of the mentioned
Answer: d
Explanation: For choosing the right microcontroller for our product we must consider its speed so that the instructio
ns may be executed in the least possible time. It also depends on the availability so that the particular product may b
e available in our neighboring regions or market in our need. It also depends on the compatibility with the product s
o that the best results may be obtained.
1. How many types of architectures are available, for designing a device that is able to work on its own?
a) 3
b) 2
c) 1
d) 4
Answer: b
Explanation: There are basically two main types of architectures present, they are Von Neumann and Harvard archit
ectures.
a) Harvard architecture
b) Von Neumann architecture
c) None of the mentioned
d) All of the mentioned
Answer: b
Explanation: General purpose microprocessors make use of Von Neumann architecture as here a simpler design is of
fered.
3. Which architecture involves both the volatile and the non volatile memory?
a) Harvard architecture
b) Von Neumann architecture
c) None of the mentioned
d) All of the mentioned
Answer: a
Explanation: In Harvard architecture, both the volatile and the non volatile memories are involved. This is done to in
crease its efficiency as both the memories are being used over here.
4. Which architecture provides separate buses for program and data memory?
a) Harvard architecture
b) Von Neumann architecture
c) None of the mentioned
d) All of the mentioned
Answer: a
Explanation: Harvard Architecture provides separated buses for data and program memory to fetch program and dat
a simultaneously. By doing this access time is reduced and hence performance is increased.
a) ARM7
b) Pentium
c) SHARC
d) All of the mentioned
Answer: c
Explanation: SHARC supports harvard architecture for signal processing in DSP.
a) ARM7
b) ARM9
c) SHARC
d) None of the mentioned
Answer: c
Explanation: SHARC supports both the CISC and the Harvard architecture.
a) Harvard
b) Von Neumann
c) Harvard & Von Neumann
d) None of the mentioned
Answer: b
Explanation: As only one memory is present in the Von Neumann architecture so it saves a lot of memory.
a) Atmel
b) Philips
c) Intel
d) All of the mentioned
Answer: d
Explanation: 8051 microcontrollers are manufactured by Intel, Atmel, Philips/Signetics, Infineon, Dallas Semi/Maxi
m.
a) 128 bytes
b) 256 bytes
c) 64 bytes
d) 512 bytes
Answer: a
Explanation: It has 128 bytes of RAM in it.
a) 2
b) 3
c) 1
d) 0
Answer: a
Explanation: It has two 16 bit registers DPTR and PC.
a) PSW
b) SP
c) PC
d) None of the mentioned
Answer: c
Explanation: When 8051 wakes up, Program Counter (P
c) loaded with 0000H. Because of this in 8051 first opcode is stored in ROM address at 0000H.
5. When the microcontroller executes some arithmetic operations, then the flag bits of which register are affected?
a) PSW
b) SP
c) DPTR
d) PC
Answer: a
Explanation: It stands for program status word. It consists of carry, auxiliary carry, overflow, parity, register bank se
lect bits etc which are affected during such operations.
6. How are the status of the carry, auxiliary carry and parity flag affected if the write instruction
a) CY=0,AC=0,P=0
b) CY=1,AC=1,P=0
c) CY=0,AC=1,P=0
d) CY=1,AC=1,P=1
Answer: b
Explanation: On adding 9C and 64, a carry is generated from D3 and from the D7 bit so CY and AC are set to 1. In t
he result, the number of 1’s present are even so parity flag is set to zero.
7. How are the bits of the register PSW affected if we select Bank2 of 8051?
9. On power up, the 8051 uses which RAM locations for register R0- R7
a) 00-2F
b) 00-07
c) 00-7F
d) 00-0F
Answer: b
Explanation: On power up register bank 0 is selected which has memory address from 00H-07H.
10. How many bytes of bit addressable memory is present in 8051 based microcontrollers?
a) 8 bytes
b) 32 bytes
c) 16 bytes
d) 128 bytes
Answer: c
Explanation: 8051 microcontrollers have 16 bytes of bit addressable memory.
a) 2
b) 3
c) 1
d) Can’t be determined
Answer: a
Explanation: DJNZ is 2-byte instruction. This means jump can be of -128 to +127 locations with respect to PC. Here
-128 means upward or backward jump and +127 means downward or forward jump.
a) DPTR
b) B
c) A
d) PSW
Answer: c
Explanation: JZ and JNZ instructions checked the content of A register and if condition was satisfied or true then ju
mp to target address.
3. Calculate the jump code for again and here if code starts at 0000H
a) F3,02
b) F9,01
c) E9,01
d) E3,02
Answer: c
Explanation: Loop address is calculated by subtracting destination address and the address next to the source address
.
4. When the call instruction is executed the topmost element of stack comes out to be
a) 2 bytes
b) 4 bytes
c) 3 bytes
d) 1 byte
Answer: c
Explanation: LCALL instruction moves the pointer to a 16 bit address so it is a 3 byte instruction.
a) yes
b) no
c) none of the mentioned
d) cant be determined
Answer: b
Explanation: PUSH and POP instructions are not CALL instructions because in POP and PUSH instructions the poi
nter does not move to any location specified by its address which is the fundamental of CALL instruction, so it is no
t a type of CALL instruction.
7. What is the time taken by one machine cycle if crystal frequency is 20MHz?
a) yes
b) no
c) cant be determined
d) yes and the second one is preferred
Answer: b
Explanation: In the first statement, when the decrements approach zero then the jump moves back and in the second
statement, when the result after decrements is not zero, then it jumps back.
a) 0xFF
b) 0x00
c) 0x01
d) A port is by default an output port
Answer: d
Explanation: In 8051, a port is initialized by default in its output mode no need to pass any value to it.
2. Which out of the four ports of 8051 needs a pull-up resistor for using it is as an input or an output port?
a) PORT 0
b) PORT 1
c) PORT 2
d) PORT 3
Answer: a
Explanation: These pins are the open drain pins of the controller which means it needs a pull-up resistor for using it
as an input or an output ports.
3. Which of the ports act as the 16 bit address lines for transferring data through it?
a) SCON
b) PCON
c) A
d) PSW
Answer: b
Explanation: PCON register is not a bit addressable register.
a) MOV A,P0
b) ADD A,#05H
c) JNB PO.0, label
d) CLR P0.05H
Answer: b
Explanation: JNB which stands for Jump if no bit checks the status of the bit P0.0 and jumps if the bit is 0.
6. Which addressing mode is used in pushing or popping any element on or from the stack?
a) immediate
b) direct
c) indirect
d) register
Answer: c
Explanation: If we want to push or pop any element on or from the stack then direct addressing mode has to be used
in it, as the other way is not accepted.
7. Which operator is the most important while assigning any instruction as register indirect instruction?
a) $
b) #
c) @
d) &
Answer: b
Explanation: In register, indirect mode data is copied at that location where R0 or R1 are present, so @ operator is u
sed ex. MOV @R0,A
a) MOVX A, @DPTR
b) MOVC @A+DPTR,A
c) MOV A,R0
d) MOV @R0,A
Answer: b
Explanation: Indexed addressing mode stands for that instruction where the bits of the accumulator is also indexed w
ith the 16 bit registers.
1. When we add two numbers the destination address must always be.
a) R4+A
b) R4-A
c) A-R4
d) R4+A
Answer: c
Explanation: SUBB command subtracts with borrow the contents of an accumulator with that of the register or some
immediate value. So A-R4 is being executed.
a) CY=0,AC=1
b) CY=1,AC=1
c) CY=0,AC=0
d) no relation with AC and CY
Answer: c
Explanation: When we divide two numbers then AC and CY become zero.
a) OV
b) CY
c) AC
d) PSW
Answer: b
Explanation: If unsigned numbers operations are involved, then the status of CY flag is important and in signed num
ber operation the status of OV flag is important.
a) ANL
b) ORL
c) XRL
d) All of the mentioned
Answer: d
Explanation: These instructions are the arithmetic operations and the flags are affected by the data copy instructions,
so all these instructions don’t affect the bits of the flag.
a) the pointer to jump if the values of the destination and the source address are equal
b) sets CY=1, if the contents of the destination register are greater then that of the source register
c) sets CY=0, if the contents of the destination register are smaller then that of the source register
d) none of the mentioned
Answer: d
Explanation: In CJNE command, the pointer jumps if the values of the two registers are not equal and it resets CY if
the destination address is larger then the source address and sets CY if the destination address is smaller then the so
urce address.
a) accumulator as the destination address and any register, memory or any immediate data as the source address
b) accumulator as the destination address and any immediate data as the source address
c) any register as the destination address and accumulator, memory or any immediate data as the source address
d) any register as the destination address and any immediate data as the source address
Answer: a
Explanation: These commands have accumulator as the destination address and any register, memory or any immedi
ate data as the source address.
a) some external crystal applied to the micro-controller for executing the timer
b) from the crystal applied to the micro-controller
c) through the software
d) through programming
Answer: b
Explanation: Timer’s clock source is the crystal that is applied to the controller.
2. What is the frequency of the clock that is being used as the clock source for the timer?
4. What is the maximum delay that can be generated with the crystal frequency of 22MHz?
a) 2978.9 sec
b) 0.011 msec
c) 11.63 sec
d) 2.97 msec
Answer: d
Explanation: For generating the maximum delay we have to multiply the maximum number of counts with the time
period required to execute one machine cycle( 65536*1/22MHz).
a) Mode 0
b) Mode 1
c) Mode 2
d) Mode 3
Answer: c
Explanation: Auto reload is allowed in the Mode 2 of the timer because here in this mode, we don’t need to load the
count again and again in the register.
6. Find out the roll over value for the timer in Mode 0, Mode 1 and Mode 2?
a) 00FFH,0FFFH,FFFFH
b) 1FFFH,0FFFH,FFFFH
c) 1FFFH,FFFFH,00FFH
d) 1FFFH,00FFH,FFFFH
Answer: c
Explanation: For Mode 0 13 bit value is used so 1FFFH is chosen to be the roll over value. Similarly for Mode 1 FF
FFH and for Mode 2 FFH is the roll over value for the timers and counter.
a) load the count, start the timer, keep monitoring it, stop the timer
b) load the TMOD register, load the count, start the timer, keep monitoring it, stop the timer
c) load the TMOD register, start the timer, load the count, keep monitoring it, stop the timer
d) none of the mentioned
Answer: b
Explanation: When any timer is to turn on, then firstly we have to load the TMOD register and the count. Then the ti
mer is to get started. After then, we need to monitor the timer properly and then when the roll over condition arises t
hen the timer is to be stopped.
8. If Timer 0 is to be used as a counter, then at what particular pin clock pulse need to be applied?
a) P3.3
b) P3.4
c) P3.5
d) P3.6
Answer: b
Explanation: If Timer 0 is to be used as a counter, then a pulse has to be applied at P3.4 and if it is for Timer 1 then t
he clock pulse has to be applied at the pin P3.5.
9. In the instruction “MOV TH1,#-3”, what is the value that is being loaded in the TH1 register?
a) 0xFCH
b) 0xFBH
c) 0xFDH
d) 0xFEH
Answer: c
Explanation: Negative value is loaded in 2’s complement form. -3 represented in 2’s complement form as FDH.
a) TMOD
b) SCON
c) TCON
d) SMOD
Answer: c
Explanation: All of these bits are part of TCON (Timer Control) register. TF0 and TF1 are used to check overflow o
f timer 0 and timer 1 respectively. TR0 and TR1 are timer control bits used to start and stop of timer 0 and timer 1 re
spectively.
1. Which devices are specifically being used for converting serial to parallel and from parallel to serial respectively?
a) timers
b) counters
c) registers
d) serial communication
Answer: c
Explanation: Some registers like the parallel in serial out and serial in parallel out are used to convert serial data into
parallel and vice versa respectively.
a) they are the names of the same particular thing, just the difference of A and S is there in it
b) one uses asynchronous means of communication and the other uses synchronous means of communication
c) one uses asynchronous means of communication and the other uses asynchronous and synchronous means of com
munication
d) one uses angular means of the communication and the other uses linear means of communication
Answer: c
Explanation: UART stands for Universal Asynchronous receiver-transmitter and USART stands for Universal Sync
hronous and Asynchronous receiver-transmitter.
3. Which of the following best describes the use of framing in asynchronous means of communication?
a) RTS
b) DTR
c) RTS & DTR
d) None of the mentioned
Answer: a
Explanation: RTS is a request to send control signal which is a control for the flow of data. On the other hand DTR i
s a Data Terminal Ready control signal which tells about the current status of the DTE.
a) no data transmission
b) no MAX232
c) the RxD of one is the TxD for the other
d) no serial communication
Answer: c
Explanation: In null modem connection the RxD of one is the TxD for the other.
7. Which of the following best states the reason that why baud rate is mentioned in serial communication?
8. With what frequency UART operates( where f denoted the crystal frequency )?
a) f/12
b) f/32
c) f/144
d) f/384
Answer: d
Explanation: UART frequency is the crystal frequency f/12 divided by 32, that comes out to be f/384.
1. When an interrupt is enabled, then where does the pointer moves immediately after this interrupt has occurred?
2. What are the contents of the IE register, when the interrupt of the memory location 0x00 is caused?
a) 0xFFH
b) 0x00H
c) 0x10H
d) 0xF0H
Answer: b
Explanation: When interrupt of 0x00 is caused (the reset interrupt) then all the other interrupts will be disabled or th
e contents of the IE register becomes null.
3. After RETI instruction is executed then the pointer will move to which location in the program?
a) pin no 10
b) pin no 11
c) pin no 12
d) pin no 13
Answer: c
Explanation: INT0 interrupt is caused when pin no 12 in the hardware of the 8051 controller is enabled with a low le
veled pulse.
a) IE.D5
b) IE.D2
c) IE.D3
d) IE.D4
Answer: d
Explanation: IE.D4 is used to enable RS interrupt or the serial communication interrupt.
6. Which of the following combination is the best to enable the external hardware interrupt 0 of the IE register (assu
ming initially all bits of the IE register are zero)?
a) EX0=1
b) EA=1
c) any of the mentioned
d) EX0=1 & EA=1
Answer: d
Explanation: For executing the EX0 interrupt, the EX0 and EA bits of the IE register should be set. EA is set to enab
le all the interrupts and EX0 is set to enable the external hardware interrupt 0 interrupt and mask the other enabled in
terrupts.
7. Why normally LJMP instructions are the topmost lines of the ISR?
a) so as to jump to some other location where there is a wider space of memory available to write the codes
b) so as to avoid overwriting of other interrupt instructions
c) all of the mentioned
d) none of the mentioned
Answer: c
Explanation: There is a small space of memory present in the vector table between two different interrupts so in orde
r to avoid overwriting of other interrupts we normally jump to other locations where a wide range of space is availab
le.
8. Which register is used to make the interrupt level or an edge triggered pulse?
a) TCON
b) IE
c) IPR
d) SCON
Answer: a
Explanation: TCON register is used to make any interrupt level or edge triggered.
10. What is the correct order of priority that is set after a controller gets reset?
1. How many rows and columns are present in a 16*2 alphanumeric LCD?
a) rows=2, columns=32
b) rows=16, columns=2
c) rows=16, columns=16
d) rows=2, columns=16
Answer: d
Explanation: 16*2 alphanumeric LCD has 2 rows and 16 columns.
a) pin no 1
b) pin no 2
c) pin no 3
d) pin no 4
Answer: c
Explanation: Pin no 3 is used for controlling the contrast of the LCD.
a) set
b) reset
c) set & reset
d) none of the mentioned
Answer: b
Explanation: For writing commands on an LCD, RS pin is reset.
5. Which command of an LCD is used to shift the entire display to the right?
a) 0x1C
b) 0x18
c) 0x05
d) 0x07
Answer: a
Explanation: 0x1C is used to shift the entire display to the right.
6. Which command is used to select the 2 lines and 5*7 matrix of an LCD?
a) 0x01
b) 0x06
c) 0x0e
d) 0x38
Answer: d
Explanation: 0x38 is used to select the 2 lines and 5*7 matrix of an LCD.
7. Which of the following step/s is/are correct for sending data to an LCD?
9. Which instruction is used to select the first row first column of an LCD?
a) 0x08
b) 0x0c
c) 0x80
d) 0xc0
Answer: c
Explanation: 0x80 is used to select the first row first column of an LCD.
a) input
b) output
c) input & output
d) none of the mentioned
Answer: a
Explanation: The RS pin is an input pin for an LCD.
1. Which of the following steps detects the key in a 4*4 keyboard matrix about the key that is being pressed?
a) masking of bits
b) ensuring that initially, all keys are open
c) checking that whether the key is actually pressed or not
d) all of the mentioned
Answer: d
Explanation: For detecting that whether the key is actually pressed or not, firstly this must be ensured that initially al
l the keys are closed. Then we need to mask the bits individually to detect that which key is pressed. Then we need t
o check that is the key actually pressed or not, by checking that whether the key pressed for a time more than 20 mic
ro seconds.
a) it masks the bit and then jumps to the label where ROW1 is written
b) it makes the value of the accumulator 0FH and then jumps at the address where ROW1 label is written
c) it compares the value of the accumulator with 0FH and jumps to the location where ROW1 label is there if the val
ue becomes equal
d) it compares the value of the accumulator with 0FH and jumps to the location where ROW1 label is there if the val
ue is not equal
Answer: d
Explanation: This particular command CJNE A,#00001111b, ROW1 compares the value of the accumulator with O
FH and jumps to ROW1 address if the value is not equal.
4. In reading the columns of a matrix, if no key is pressed we should get all in binary notation
a) 0
b) 1
c) F
d) 7
Answer: b
Explanation: If no key is pressed, then all the keys show 1 as they are all connected to power supply.
5. If we need to operate a key of a keyboard in an interrupt mode, then it will generate what kind of interrupt?
a) ES
b) EX0/EX1
c) T0/T1
d) RESET
Answer: b
Explanation: If a key is to operate in an interrupt mode then it will generate an external hardware interrupt.
a) its active high input used to inform ADC0804 to the end of conversion
b) its active low input used to inform ADC0804 to the end of conversion
c) its active low input used to inform ADC0804 to the start of conversion
d) its active high input used to inform ADC0804 to the start of conversion
Answer: c
Explanation: WR is active low input used to inform the ADC0804 to start the conversion process.
a) CLK IN pin used for External Clock Input or Internal Clock with external RC element
b) INTR pin tells about the end of the conversion
c) ADC0804 IC is an 8 bit parallel ADC in the family of the ADC0800 series
d) None of the mentioned
Answer: d
Explanation: CLK IN pin is used to tell about the conversion time, INTR pin tells about the end of the conversion an
d ADC0804 has a resolution of 8 bits only so all three statements are true.
a) select the analog channel, start the conversion, monitor the conversion, display the digital results
b) select the analog channel, activate the ALE signal (L to H pulse), start the conversion, monitor the conversion, rea
d the digital results
c) select the analog channel, activate the ALE signal (H to L pulse), start the conversion, monitor the conversion, rea
d the digital results
d) select the channel, start the conversion, end the conversion
Answer: b
Explanation: While programming the ADC0808/0809 IC firstly we need to select the channel from the A, B, C pins.
Then we need to activate the ALE signal, this is needed to latch the address. Then we start the conversion from the
WR pin. After monitoring the INTR pin we get to know about the end of the conversion. Then we activate the OE e
nable to read out data out of the ADC chip.
a) Vref
b) Vin
c) Vref/2 & Vin
d) None of the mentioned
Answer: a
Explanation: Step Size is calculated by formula Vref/(2n). As ADC0808/0809 8-bit ADC value of n=8. Therefore fo
rmula becomes Vref/(28) = Vref/256. If Vref = 5V then Step Size will be 5/256 i.e. 19.53mV.
a) ADC0804 has 8 bits and MAX1112 has 1 bit for data output
b) ADC0804 is used for adc and dac conversions whereas MAX1112 is used for serial data transmissions
c) ADC0804 has 32 bits and MAX1112 has 3 bit for data output
d) None of the mentioned
Answer: a
Explanation: ADC0804 is used for parallel ADC and MAX1112 is used for serial ADC.
1. A thermistor is a __________
a) sensor
b) adc
c) transducer
d) micro controller
Answer: c
Explanation: A thermistor is a device which is used to convert the temperature into electrical signals, so it acts as a tr
ansducer.
3. An electronic device which converts physical quantity or energy from one form to another is called ______
a) Sensor
b) Transistor
c) Transducer
d) Thyristor
Answer: c
Explanation: An electronic device that converts physical quantity or energy from one form to another is called Trans
ducer. Examples: Sensor, Speaker, Microphone, etc.
a) make the appropriate connections with the controller, ADC conversion, analyse the results
b) interface sensor with ADC and ADC with 8051
c) interface sensor with the MAX232, send now to microcontroller, analyse the results
d) none of the mentioned
Answer: b
Explanation: For interfacing a sensor with an 8051 microcontroller, we need ADC in between because output of sen
sor is analog and microcontroller works on digital signals only. So whatever signal generated by the sensor is conver
ted into its digital equivalent using ADC and equivalent digital signal is given to the microcontroller for processing.
a) 2
b) 1
c) 3
d) 4
Answer: c
Explanation: LM35 has 3 pins.
7. Why Vref is set of ADC0848 to 2.56 V if analog input is connected to the LM35?
a) to set the step size of the sampled input
b) to set the ground for the chip
c) to provide supply to the chip
d) all of the mentioned
Answer: a
Explanation: Vref is used to set the step size of the ADC conversion, if it is selected to 2.56 then the step size will be
selected to 10mV, so for every step increase of the analog voltage an increase of 10 mV will be there.
a) Input/Output
b) Analog to Digital
c) Digital to analog
d) None of the mentioned
Answer: a
Explanation: The 8255 is Input/Output (I/O) chip. It has three separate accessible ports. The 8255 chip is used to exp
and the I/O ports of microcontrollers.
a) RD
b) WR
c) D0-D7
d) All of the mentioned
Answer: d
Explanation: RD, WR, D0-D7 all are directly connected to the 8051 for telling the chip about the control signals and
also for transferring the data.
3. Find the control word for PA = out, PB = in, PCL = out, PCH = out (Mode0)?
a) 0x02H
b) 0x82H
c) 0x83H
d) 0x03H
Answer: b
Explanation: The value that is being loaded in the control word is 10000010b for PB as an input port and all others a
s the output ports being operated in mode0. The hex equivalent of 10000010b → 0x82H.
4. Which pins are used to select the ports and the control register?
a) CS
b) A1
c) A0
d) All of the mentioned
Answer: d
Explanation: CS pin is an active low input pin for 8255 and it is used for selecting a chip. A0 and A1 pins are used f
or select ports and the control register.
5. What is the value of the control register when RESET button is set to zero?
a) 0x00H
b) 0xFFH
c) 0x11H
d) value remains the same
Answer: d
Explanation: RESET is active-high signal input into the 8255 used to clear the control register. When RESET is acti
vated (i.e. set to high), all ports are initialized as input mode. Hence the value of the control register remains the sam
e as it is even when the RESET button is set to zero.
6. Why MOVX instruction is being used to access the ports of the 8255?
8. How many pins of the 8255 can be used as the I/O ports?
a) 8
b) 16
c) 24
d) 32
Answer: c
Explanation: There are 3 ports available in the 8255 so 24 pins are available for the I/O ports pins.
1. DS12887 is a ____________
a) Timer IC
b) Serial communication IC
c) RTC IC
d) Motor
Answer: c
Explanation: DS12887 is a real time clock that is widely used to provide accurate time and date for many application
s.
a) 14 bytes
b) 114 bytes
c) 128 bytes
d) 64 bytes
Answer: c
Explanation: DS12887 has 128 bytes of non-volatile RAM.
a) 9 bytes
b) 114 bytes
c) 128 bytes
d) 14 bytes
Answer: b
Explanation: DS12887 has 128 bytes of non-volatile RAM. Out of 128 bytes, 14 bytes of RAM for clock/calendar a
nd control registers, and another 114 bytes of RAM for general purpose data storage.
4. In DS12887, which bits of the Register A are used to turn on the oscillator?
a) D4
b) D5
c) D6
d) All of the mentioned
Answer: d
Explanation: In DS12887, D4-D6 bits of register A are used to turn on the oscillator. A specific value of 010 of D4-
D6 is desirable for turning on the oscillator.
5. In DS12887, which out of the following is correct about the SQW pin?
a) it is an output pin
b) it can provide up to 15 different square waves
c) the frequency of the square wave is set by the register A
d) all of the mentioned are correct
Answer: d
Explanation: In DS12887, SQW pin stands for SQuare Wave. It is an output pin that can provide us with 15 differen
t square waves. The frequency of the square wave is selected by programming register A.
7. In DS12887, what is the range of RAM addresses which are used to store the values of time, calendar and alarm d
ata?
a) 00-7FH
b) 00-09H
c) 0EH-7FH
d) 0A-0DH
Answer: b
Explanation: In DS12887, the first ten locations i.e. 00-09H are used to store the values of time, calendar and alarm
data.
a) Yes
b) No
c) Can’t be determined
d) None of the mentioned
Answer: a
Explanation: Yes, DS12887 has non-volatile RAM.
a) register A, register B
b) register B, register C
c) register C, register D
d) register D, register A
Answer: c
Explanation: Register C and D are the read only registers in the DS12887 found at memory locations 0C-0DH.
10. In DS12887, when the external source is turned-off, how does DS12887 get power to retain its data?
a) electromagnetic induction
b) motor control
c) switching
d) none of the mentioned
Answer: a
Explanation: Electromagnetic relays work on the principle of electromagnetic induction. It is used as a switch in ind
ustrial controls, automobile and appliances. It allows the isolation of the sections of a system with two different volt
age sources.
a) it is a driver
b) it is a thing isolated from the entire world
c) it is a device that can be used as an electromagnetic relay without a driver
d) none of the mentioned
Answer: c
Explanation: Optoisolators are devices that can be used as an electromagnetic relay without a driver. It usually consi
sts of a led (transmitter) and a photoresistive receiver.
a) kg/m2
b) ounce-inch
c) kg-m3
d) g/m
Answer: b
Explanation: Torque is equal to the force applied at a particular distance. So its unit can be ounce-inch.
a) Yes
b) No
c) Cant be said
d) None of the mentioned
Answer: b
Explanation: If LDI Rd,k is written then the range of Rd varies from R16-R31, as R3 is less than R16 so this instruct
ion will generate an error.
4. The total space for the data memory available in the AVR based microcontroller is?
a) FFH
b) FFFH
c) FFFFH
d) FFFFFH
Answer: c
Explanation: The maximum value that can be loaded in the code memory of an AVR based microcontroller is FFFF
H.
5. Which of the following instructions affect the flags of the status register?
a) AND
b) INC
c) OR
d) All of the mentioned
Answer: d
Explanation: AND, INC, OR could affect status register flags. All arithmetic and logical instructions affect status re
gister flags except SER Rd instruction. SER Rd is used to SEt Register i.e. after the execution of this instruction Rd l
oaded with FFH value and no flag is affected.
a) One copies the hexadecimal value to R16 and the other copies the decimal value to the R16 register
b) One is for command, other is for data
c) One is for assignment, other is for operations
d) Both the commands are the same
Answer: d
Explanation: Both the above commands are the same. They both are used for assigning the hexadecimal values to th
e registers.
a) .EQU
b) .DEVICE
c) .ORG
d) .LDI
Answer: d
Explanation: .EQU, .DEVICE, .ORG all are the directives to the assembler whereas LDI is a command.
a) Yes
b) No
c) Can’t be said
d) None of the mentioned
Answer: b
Explanation: Assembly language is not high level language rather it is low level language because it deals directly w
ith the internal structure of CPU. To program in assembly, the internal structure of the CPU must be known. Wherea
s in high level programming languages programmers don’t bother about the internal structure of the CPU because th
is is done by the compiler.
a) 4K
b) 8K
c) 16K
d) 64K
Answer: c
Explanation: A 14-bit program counter can access 214 bytes of memory locations i.e. 16k bytes.
214 = 24 x 210
a) 00H
b) 000H
c) 0000H
d) 00000H
Answer: d
Explanation: When an AVR wakes up, then the PC starts at the memory location 00000H.
a) 10
b) 70
c) 700
d) none of the mentioned
Answer: b
Explanation: As the R21 register is loaded with 70, so to make it zero it needs to be decremented 70 times then only
the OUT instruction will be executed so this loop repeats 70 times.
a) BRLO
b) BRMI
c) BRVC
d) None of the mentioned
Answer: d
Explanation: BRLO is used to branch if C=1, BRMI is used when N=1 and BRVC are used when V=0, so all are the
conditional jumps.
4. What is the relation between the target and the relative address?
5. In the JMP instruction, how many bits are there for determining the target address?
a) 16
b) 32
c) 22
d) 10
Answer: c
Explanation: In the JMP instruction of 4 bytes space, 22 bits are there for determining the target address and the othe
r 10 are for the op code verification.
a) MEM
b) LASTRAM
c) RAMEND
d) None of the mentioned
Answer: c
Explanation: RAMEND is a micro used to represent the last RAM address. In AVR, Stack Pointer is initialized on t
op of the stack i.e. last address of RAM.
8. Which of the following statements are correct about the RCALL instruction?
a) it is a 2 byte instruction
b) it is a 4 byte instruction
c) it is a 16 byte instruction
d) none of the mentioned
Answer: a
Explanation: RCALL instruction is used to go to the target address in the memory from -2048 to 2047.
1. In AVR, which registers are there for the I/O programming of ports?
a) PORT
b) PIN
c) DDR
d) All of the mentioned
Answer: d
Explanation: For I/O programming of the ports in AVR microcontrollers, there are basically three main registers. Th
ey are PORT, PIN, DDR, so all of the mentioned is the right option.
2. The data will not go from the port registers to the pin unless:
a) 0
b) 1
c) None of the mentioned
d) 0 & 1
Answer: a
Explanation: On reset, the DDR registers of all the ports are set to 0 which means that the by default all ports are set
as input ports.
a) PIN register of a port is used to bring data into CPU from pins
b) PORT register is used to send data out to pins
c) DDR register is used to control the direction of a port
d) All of the mentioned
Answer: d
Explanation: There are three registers that are related to a port. They are PIN, PORT, DDR. PIN register is used to b
ring data into CPU from pins, PORT register is used to send data to pins and DDR register is used to control the dire
ction of the data transfer. So all are the right options.
a) true
b) false
c) none of the mentioned
d) can’t be determined
Answer: b
Explanation: In the AVR family, all I/O ports don’t have 8 pins. Number of I/O pins depends on the total number of
pins of the controller. Eg. ATtinyxx is an 8 pin controller and it has 6 I/O pins.
a) SBI
b) PORT
c) CBI
d) All of the mentioned
Answer: b
Explanation: PORT is not an instruction. It is the name of a register in AVR.
9. Which of the following instruction can be used to toggle a bit of the PORT?
a) SBI
b) CBI
c) SBI & CBI
d) None of the mentioned
Answer: c
Explanation: If SBI and CBI are used together, then they can be used to toggle a bit of a port successfully.
10. What is the main function of the SBIC instruction?
1. In AVR microcontrollers, ADD instruction affects the status of which of the following bits of a status register?
a) Z
b) C
c) N
d) All of the mentioned
Answer: d
Explanation: ADD instruction affects the status of Z, C, N, V, H and S bits of a status register.
a) SUB
b) SBC
c) SUBI
d) All of the mentioned
Answer: d
Explanation: AVR supports five types of subtraction instructions. They are SUB, SBC, SUBI, SBCI, SBIW.
4. What steps are involved when we subtract two numbers present at two different locations?
8. To set the bits of a register R1 to 1, we must OR the contents of the register with?
a) 00H
b) 11H
c) FFH
d) 0FH
Answer: c
Explanation: To make the contents of the register R1 to 1 we must OR the contents of that register with FFH becaus
e according to Or algorithm 0+1=1 and 1+0=1.
a) true
b) false
c) none of the mentioned
d) can’t be said
Answer: b
Explanation: CP command is used to compare the contents of the two registers. It doesn’t actually alter the value of t
he register.
1. In AVR, which of the following registers are not used for programming timers?
a) TCNT
b) TCON
c) TIFR
d) None of the mentioned
Answer: b
Explanation: In the timer programming of an AVR microcontroller, mainly used registers are TCNTn that stores the
values of the count. TCCRn that is used to assign the mode of operation of a timer and TIFR that stores the status of
various flags of the timers. Two more registers are used they are OCRn and OCFn. They are used for comparison wi
th the count register.
a) Normal mode
b) CTC mode
c) PWM mode
d) All of the mentioned
Answer: d
Explanation: Modes of a timer are decided by the WGM00 and WGM01 bit of the TCCR0 register and for timer0 th
ese modes are normal mode, CTC mode, pwm mode and the fast pwm mode.
a) timer0
b) timer1
c) timer2
d) all of the mentioned
Answer: b
Explanation: Timer0 and Timer2 can operate in the 8 bit condition while only Timer 1 operates in the 16 bit conditio
n.
a) f/2
b) f/4
c) f/16
d) f/32
Answer: d
Explanation: f/32 has the lowest frequency as it is divided by the maximum value of the constant, so as time and fre
quency are inversely related to each other so this will generate the maximum amount of machine cycle which will as
a result generate the greatest delay.
7. What is the difference in the operation of a normal and a CTC mode of a timer?
8. We can count the pulses on the positive or the negative edge triggered pulse of the clock?
a) true
b) false
c) can’t be determined
d) depends on the circumstances
Answer: a
Explanation: A counter can count pulses on the positive or the negative edge of the clock.
a) PORTB.0
b) PORTB.1
c) PORTB.2
d) PORTB.3
Answer: a
Explanation: In ATmega32/16, T0 is the alternative function of PORTB.0. T0 is Timer/Counter 0 External Clock In
put.
10. Which resource provides the clock pulse to AVR timers if CS02-00=6?
a) 00h
b) ffh
c) 1fh
d) 11h
Answer: a
Explanation: On reset, all the interrupts are masked and so the contents of the SREG register is also set to zero as it s
hows the status of the flags.
a) 0002h
b) 0004h
c) 0006h
d) all of the mentioned
Answer: d
Explanation: The ISR addresses for the external hardware interrupts are 0002h, 0004h, 0006h.
5. What is the address in the interrupt service routine assigned for the timer0 overflow flag?
a) 0012h
b) 000Ah
c) 0016h
d) all of the mentioned
Answer: c
Explanation: 0016h is the address in the interrupt service routine assigned for the timer0 overflow flag.
6. Is the same address is assigned for the timer0 and timer1 overflow flag in the interrupt vector table of the interrupt
s?
a) true
b) false
c) can’t be determined
d) depends on the situation
Answer: b
Explanation: Different addresses are assigned for Timer0 and Timer1 overflow flags in the interrupt vector table. Th
ey are 0016h and 0012h for timer0 and timer1 respectively.
a) PORTD.2
b) PORTD.3
c) PORTB.2
d) All of the mentioned
Answer: d
Explanation: There are three external hardware interrupts in the atmega32 microcontrollers. They are assigned to bit
s PORTD.2, PORTD.3 and PORTB.2.
8. Which register is responsible for handling all the external hardware interrupts?
a) TIMSK
b) GICR
c) MCUCR
d) IVCE
Answer: b
Explanation: GICR register is responsible for all the external hardware interrupts in the AVR.
a) edge triggered
b) level triggered
c) all of the mentioned
d) none of the mentioned
Answer: b
Explanation: By default, INT0-INT2 are the level triggered pulses. The low level of the pulse generates the interrupt
.
10. What will happen in that condition, if an interrupt occurs while the microcontroller is serving any other interrupt
?
1. What actually are the DB9, DB25 ports available in our computers?
a) they are connectors used to transfer data either serially or parallelly
b) they are the RS232 connectors used to connect two incompatible devices
c) they are the TTL logic connector pins used for communication
d) they are just data transfer pins used to transfer the data
Answer: b
Explanation: DB9 and the DB25 ports are the ports that are based on the RS232 logic that is basically used for com
municating two incompatible devices.
4. Which of the following is correct about the baud rate during serial transmission?
5. With fosc=8 MHz, what will the count that has to filled in the UBRR register to account for the 9600 baud rate?
a) 67H
b) CEH
c) 33H
d) 34H
Answer: c
Explanation: The count that had to be filled in the UBRR register is calculated as (fosc/16(desired baud rate))-1.
6. The USART in AVR based microcontrollers operate at which of the following modes?
7. Which bit of the UCSRA is used for doubling the baud rate of the transmission?
a) DOR
b) PE
c) U2X
d) MPCM
Answer: c
Explanation: U2X bit of the UCSRA is used for doubling the baud rate of the transmission.
8. What is the use of the PE and the FE bits of the UCSRA register?
a) they are used for keeping a check at the speed of transmission and reception
b) they are used for keeping a check at the data bits to be transferred
c) they are used to keep the transmission error free
d) they are used as extra redundant bits with no use
Answer: c
Explanation: PE and the FE bits of the UCSRA register are used for error checking in the transmission.
9. Which of the following bits are used for setting the data frame size?
a) UCSZ0
b) U2X
c) DOR
d) MPCM
Answer: a
Explanation: UCSZ0 and UCSZ1 bits of the UCSRB register and the UCSZ2 bit of the UCSRC register are used for
setting the data frame size in AVR based microcontrollers.
10. Which of the following parameters should the transmitter and the receiver agree upon before starting a serial tran
smission?
a) baud rate
b) frame size
c) stop bit
d) all of the mentioned
Answer: d
Explanation: Before starting the serial transmission, the following parameters should be taken care of. They are the b
aud rate, frame size, stop bit and the parity bit.
1. In AVR, the LCD operates in two main modes, it can be in 8 bit or 4 bit data.
a) true
b) false
c) depends on the situation
d) can’t be said
Answer: a
Explanation: In AVR, the LCD operates in two main modes, they are in the 8 bit data transfer mode and the 4 bit dat
a transfer mode.
2. What can be the sequence of commands that may be used for initializing an LCD?
3. When the LCD operates in the 4 bit mode, then what more commands are added to it?
a) 33
b) 32
c) 28
d) all of the mentioned
Answer: d
Explanation: When an LCD operates in the 4 bit mode than 33, 32, 28 in hex are sent to it. They represent 3, 3, 3, 2
nibbles which tell the LCD to do into the 4 bit mode for saving the i/o pins of the port.
a) input pin
b) output pin
c) any of the mentioned depending on the conditions
d) none of the mentioned
Answer: a
Explanation: The RS pin of the LCD is used for selecting a particular register used for sending a command or the dat
a to the LCD.
8. What is the address of the second column and the second row of the 2*20 LCD?
a) 0x80
b) 0x81
c) 0xc0
d) 0xc1
Answer: d
Explanation: 0xc0 acts as the address for selecting the second row and the first column of the LCD, so according to i
t if we need to select the second row and the second column of the LCD, then the address should be 0xc1.
9. Which of the following commands takes more than 100 microseconds to run?
a) 1
b) 0
c) F
d) 10
Answer: a
Explanation: For selecting the data pins of the LCD, the RS pin of the LCD should be set to 1.
1. In reading the columns of a keyboard matrix, when no key is pressed then all the pins show?
a) 0
b) 1
c) F
d) 7
Answer: b
Explanation: When no key is pressed, in a keyboard then all the pins will read 1 as they all are connected to the main
power supply.
a) true
b) false
c) can’t be said
d) depends on the conditions
Answer: a
Explanation: To see that whether any key is pressed or not then all the rows are grounded so that columns can be rea
d to deliver the better results.
3. Identify the row and the column for the following case when for the row D3-D0= 1110 and for the column D3-D0
= 1101
4. What are the actual steps that are followed in identifying any key that is being pressed?
5. To identify that the key is present in which row and the column
6. The key detection and the key identification are two different procedures?
a) true
b) false
c) depends on the circumstances
d) difficult to tell
Answer: a
Explanation: The key detection and the key identification are the two different procedures, one is used to detect that
whether any key is pressed or not and the other technique is used to find that the pressed key is located in which row
and column.
9. What will happen if the two keys of the keyboard are pressed at a time?
10. Why initially all keys are considered open before detecting the key pressed?
1. Which of the following is correct about the word resolution in ADC DAC converters in AVR’s?
4. Which of the following factors can affect the step size calculation?
a) number of bits
b) input current
c) output current
d) all of the mentioned
Answer: a
Explanation: There are mainly two factors that can affect the step size calculation of an ADC converter, they are the
number of bits and the Vref voltage.
a) parallel
b) 12 bit
c) serial
d) all of the mentioned
Answer: c
Explanation: MAX1112 is a serial ADC converter, as it has only one pin for the data output.
6. Why do we connect a capacitor between the Vref and the Gnd pin?
7. Which of the following are the registers that are used for controlling the ADC conversion in the AVR?
a) ADCSRA
b) ADMUX
c) SPIOR
d) All of the mentioned
Answer: d
Explanation: For programming the ADC conversion in an AVR, we require the following registers. They are ADCS
RA, ADMUX, SPIOR. There are two more registers used for handling the output data, they are ADCH and ADCL r
egisters.
a) 5V
b) 3.3V
c) 2.56V
d) all of the mentioned
Answer: c
Explanation: 2.56V is the internal Vref selected for an Atmega32 series based microcontrollers.
a) electrical pulse
b) current
c) voltage
d) all of the mentioned
Answer: b
Explanation: The output of a DAC0808 is in the form of a current.
a) analog, digital
b) current, voltage
c) digital, analog
d) analog, current
Answer: c
Explanation: In a DAC, the input is digital and the output is analog in nature.
a) true
b) false
c) can’t say
d) depends on the conditions
Answer: a
Explanation: For analyzing purposes, every transducer must be connected to a signal conditioning circuit in order to
measure its value as a practical platform.
a) 1
b) 0.1
c) 0.001
d) 10
Answer: c
Explanation: LM35 provides 10mV for every degree change of the Celsius scale.
7. Why for the 8 bit analog input we select Vref as the 2.56V?
8. What is the temperature for LM35 sensor if the analog output is 0011 1001?
a) 3
b) 9
c) 57
d) 41
Answer: c
Explanation: The binary for the above output is 57, so in case of LM35 sensors we obtain the output as 57 C.
9. In an external hardware, there are how many pins available for the LM35 and the LM34 based sensors?
a) 2
b) 3
c) 10
d) 1
Answer: b
Explanation: LM35 consists of mainly 3 pins, they are Vcc, Gnd, analog output.
a) yes
b) no
c) depends on the conditions
d) can’t say
Answer: a
Explanation: LM34 and the LM35 based sensors are linearly proportional to their corresponding Fahrenheit and the
Celsius scale, so they are linear by nature.
a) Input/Output
b) Analog to Digital
c) Digital to analog
d) None of the mentioned
Answer: a
Explanation: The 8255 is Input/Output (I/O) chip. It has three separate accessible ports. The 8255 chip is used to exp
and the I/O ports of microcontrollers.
a) RD
b) WR
c) D0-D7
d) All of the mentioned
Answer: d
Explanation: RD, WR, D0-D7 all are directly connected to the 8051 for telling the chip about the control signals and
also for transferring the data.
3. Find the control word for PA= out, PB= in, PCL=out, PCH=out (Mode0)?
a) 0x02H
b) 0x82H
c) 0x83H
d) 0x03H
Answer: b
Explanation: The value that is being loaded in the control word is 10000010b for PB as an input port and all others a
s the output ports being operated in mode0. The hex equivalent of 10000010b → 0x82H.
4. Which pins are used to select the ports and the control register?
a) CS
b) A1
c) A0
d) All of the mentioned
Answer: d
Explanation: CS pin is an active low input pin for 8255 and it is used for selecting a chip. A0 and A1 pins are used f
or select ports and the control register.
5. What is the value of the control register when RESET button is set to zero?
a) 0x00H
b) 0xFFH
c) 0x11H
d) value remains the same
Answer: d
Explanation: RESET is active-high signal input into the 8255 used to clear the control register. When RESET is acti
vated (i.e. set to high), all ports are initialized as input mode. Hence the value of the control register remains the sam
e as it is even when the RESET button is set to zero.
6. Why MOVX instruction is being used to access the ports of the 8255?
8. How many pins of the 8255 can be used as the I/O ports?
a) 8
b) 16
c) 24
d) 32
Answer: c
Explanation: They are 3 ports available in the 8255 so 24 pins are available for the I/O ports pins.
a) 16
b) 8
c) 40
d) 60
Answer: c
Explanation: 8255 is a 40 pin IC.
a) yes
b) no
c) cant be said
d) depends on the conditions
Answer: a
Explanation: 8255 is a device that with the help of its handshaking property gets interfaced with any microcontroller
.
a) 2 modes
b) 3 modes
c) 4 modes
d) 5 modes
Answer: c
Explanation: 8255 can be programmed in any of the 4 modes.
a) conversion
b) communication
c) real time and clock measurement
d) memory management
Answer: c
Explanation: RTC is a device that is basically used for all the real time clock related issues.
2. RTC chips use ______ to compute time, date when the power is off.
a) ac supply
b) generators
c) rectifiers
d) battery
Answer: d
Explanation: RTC chips require batteries in order to calculate the time and date when the power of the device is off.
a) Communication device
b) Good battery device
c) RTC chip
d) All of the mentioned
Answer: c
Explanation: DS12887 is known as an RTC chip.
a) true
b) false
c) cant be said
d) depends on the conditions
Answer: b
Explanation: DS1307 is a serial RTC with I2C bus.
5. DS1307 is a _______ pin IC and operates on _______ clock frequency.
a) 16, 8Mhz
b) 8, 16Mhz
c) 16, 32Mhz
d) 8, 32Khz
Answer: d
Explanation: DS1307 is a 8 pin IC and operates on a 32KHz clock frequency.
a) 3V
b) 5V
c) 9V
d) 12V
Answer: a
Explanation: Vbat requires a positive signal of 3V which can be obtained through a battery.
7. In DS1307, which out of the following is correct about the SQW pin?
a) input pin
b) output pin
c) i/o pin
d) none of the mentioned
Answer: b
Explanation: In DS1307, SQW pin is an output pin. It provides a clock of frequency 1khz, 4khz, 8khz, 32khz if the p
in is enabled.
a) 32
b) 64
c) 128
d) 256
Answer: c
Explanation: DS1307 has a total of 64 bytes(00-3F) of RAM space.
a) 00H
b) 03H
c) 07H
d) 10H
Answer: b
Explanation: DS1307 control register has an address of 07H.
2. Why are ULN2803 normally used between the microcontrollers and the relays?
3. Why are opto isolators normally used between the microcontrollers and the ULN2803?
a) SPST
b) SPDT
c) DPDT
d) All of the mentioned
Answer: d
Explanation: There are normally three kinds of electromagnetic relays. They are SPST(single pole single throw), SP
DT(single pole double throw) and the DPDT(double pole double throw) relays.
5. Reed switches show connectivity whenever they are in the presence of an electrical field?
a) true
b) false
c) can’t say
d) depends on the conditions
Answer: b
Explanation: Reed switches are the devices that show connectivity whenever they are in the presence of some magne
tic field.
a) in printers
b) in robots
c) in vehicles
d) all of the mentioned
Answer: d
Explanation: Stepper motors are used wherever there is a need of a movement at an angle, maybe it in printers, in m
otors or in vehicles stepper motors are used everywhere.
7. What are normal 4 step sequence of a stepper motor if we start to move in clockwise direction with 0110 value?
a) 1100,1001,0011,0110
b) 0011,1001,1100,0110
c) 1001,1100,0110,0011
d) 0101,1010,0101,1010
Answer: b
Explanation: For a normal 4 step sequence of a stepper motor, if we start to move in a clockwise direction then we r
otate towards right direction with every rotation.
9. For a normal 4 step sequence, what are the number of teeth required to accomplish a 2 degree step angle?
a) 180
b) 90
c) 360
d) 45
Answer: d
Explanation: For a 2 degree step angle there will be 180 step per rotation, so the total number of rotor teeth are (180/
4=45).
a) true
b) false
c) can’t say
d) depends on the situation
Answer: a
Explanation: Torque is a quantity which is obtained by multiplying the amount of force that is applied at a particular
angle. It is measured in terms of ounch-inch.
1. Why do we make the connection of the SCLK for communicating serially between two devices?
a) true
b) false
c) can’t be said
d) depends on the cases
Answer: d
Explanation: In SPI write, MSB goes first.
a) SPSR
b) SPCR
c) SPDR
d) All of the mentioned
Answer: b
Explanation: In AVR, SPSR(SPI Status Register), SPCR(SPI Control Register) and SPDR(SPI Data Register) are us
ed for programming the SPI module.
a) We set the MSTR bit, and make the CPOL= 1 and CPHA=0
b) We set the MSTR bit, and make the CPOL= 0 and CPHA=1
c) We reset the MSTR bit, and make the CPOL= 1 and CPHA=0
d) We reset the MSTR bit, and make the CPOL= 0 and CPHA=1
Answer: b
Explanation: In SPI, to make it work in the master mode, we make the MSTR bit is equal to 1 and for operating it in
the mode 1 we make the CPOL=0 and CPHA=1.
a) true
b) false
c) depends on the conditions
d) can’t be said
Answer: d
Explanation: No, SPI can’t work in the half duplex transmission mode.
a) fosc/4
b) fosc/64
c) fosc/16
d) fosc/2
Answer: a
Explanation: fosc/2 is not recommended frequency for SPI transfer in AVR.
a) I2C is a technique by which data is transmitted with the help of only eight pins
b) SDA is used to synchronize data transfer between two chips
c) TWI is another name for I2C
d) All of the mentioned
Answer: c
Explanation: I2C is a technique by which data is transmitted between two devices by the help of only 2 pins so it is a
lso called Two wire Serial Interface.
a) the data line cannot change when the clock line is high
b) the data line can change when the clock line is high
c) the clock line cannot change when the data line is high
d) the clock line can change when the data line is high
Answer: a
Explanation: According to I2C protocols, the data line(SD
a) changes only if the clock line(SCL) is at its active low level.
a) true
b) false
c) cant be said
d) depends on the conditions
Answer: a
Explanation: I2C is a connection oriented protocol i.e each transmission is initiated by a START condition and is ter
minated by a STOP condition.
a) high to low change in the SDA line when the SCL is low
b) high to low change in the SDA line when the SCL is high
c) low to high change in the SDA line when the SCL is low
d) low to high change in the SDA line when the SCL is high
Answer: c
Explanation: The STOP condition is generated when there is a low to high change in the SDA line when the SCL is l
ow.
a) true
b) false
c) cant be said
d) depends on the conditions
Answer: a
Explanation: I2C is that module of the AVR, which is used for short distances.
8. Which of the following is a register used for programming AVR’s I2C module?
a) TWBR
b) TWCR
c) TWSR
d) All of the mentioned
Answer: d
Explanation: TWBR( TWI Bit rate register), TWCR( TWI Control Register), TWSR(TWI Status Register), TWAR(
TWI Address Register), TWDR( TWI Data Register) are used for programming an AVR’s I2C module.
9. Which bit is polled to know that whether the TWI is ready or not?
a) TWWC
b) TWINT
c) TWEA
d) All of the mentioned
Answer: b
Explanation: TWINT is the bit that is polled to know that whether the TWI is ready or not.
a) 1 byte
b) 2 bytes
c) 1 bit
d) 2 bit
Answer: b
Explanation: In MSP430, the size of the status register is 2 bytes. The bits of the status register consists of the C flag
, Z flag, N flag, GIE flag, CPU off, OSC off, SCG0, SCG1, V flag and 7 reserved bits.
2. Which of the following bit/s of the status register that allows the microcontroller to operate in its low power mode
?
a) Z
b) Reserved
c) CPU off
d) N
Answer: d
Explanation: The CPU off bit, OSC off bit, SCG0 bit, SCG1 bit of the status register are used to allow the microcont
roller to operate in its low power mode.
a) true
b) false
c) cant be said
d) depends on the conditions
Answer: a
Explanation: MSP430 supports only post increment addressing. For performing pre increment addressing, we requir
e some special functions that accomplish that work.
a) ADC(.
b) dst
b) ADD(.
b) src,dst
c) ADDC(.
b) src,dst
d) AND(.
b) src,dst
Answer: a
Explanation: “ADC(.
b) dst” this is emulated to “ADDC.B #0,dst” hence this is an emulated instruction. The emulated instructions use cor
e instructions combined with the architecture and implementation of the CPU for higher code efficiency and faster e
xecution.
1. There are _____ number of addressing modes found for the source and _____ number of modes for the destinatio
n part.
a) 4,4
b) 2,4
c) 7,4
d) 2,2
Answer: c
Explanation: In MSP430, Seven addressing modes for the source operand and four addressing modes for the destinat
ion operand can address the complete address space with no exceptions.
a) Format1 addressing
b) Format2 addressing
c) Jump addressing
d) None of the mentioned
Answer: b
Explanation: MSP430 describes reti instruction as that type of addressing which consists of only single operand, so i
t comes under Format2 addressing.
a) one cycle
b) two cycles
c) four cycles
d) eight cycles
Answer: a
Explanation: mov.w R3, R4 takes only one cycle to transfer the data from register R3 to R4. This type of mode of ad
dressing is called the register mode of addressing.
a) source
b) destination
c) source & destination
d) none of the mentioned
Answer: c
Explanation: Indexed addressing is used for both the source and the destination addresses.
a) R6 = X+PC
b) R6 = PC-X
c) R6 = -X-PC
d) R6 = -X+PC
Answer: a
Explanation: This instruction mov.w X(PC), R6 means that the contents of X+PC address are copied to the R6 regist
er.
a) source register
b) destination register
c) source & destination register
d) none of the mentioned
Answer: a
Explanation: Indirect addressing mode is used only by the source register.
8. Indirect mode and the indirect auto increment mode have which common operator in them
a) +
b) –
c) @
d) &
Answer: c
Explanation: Both the indirect and the indirect auto increment mode use the @ operator for the source register to tra
nsfer the data from one memory location to a register.
a) yes
b) no
c) cant be said
d) depends on the conditions
Answer: b
Explanation: MOV @R10,0(R11) → Move the contents of the source address (contents of R10) to the destination ad
dress (contents of R11).
a) Register Mode
b) Indirect Register Mode
c) Immediate Mode
d) Indirect Autoincrement Mode
Answer: b
Explanation: The type of given instruction is Indirect Register Mode.
a) MOV
b) GO
c) CALL
d) All of the mentioned
Answer: c
Explanation: CALL instruction is used for going to a particular address in MSP430. It actually causes the pointer to j
ump at a particular address and push the current address of the PC to the stack.
3. According to conventions being followed, R12 to R15 are used for _________
a) parameter passing
b) preserved for call
c) all of the mentioned
d) none of the mentioned
Answer: a
Explanation: According to the conventions, R12 to R15 are used for parameter passing and hence are not preserved f
or the call.
4. We can store the temporary results across a call instruction with the help of which of the following registers
a) R1-R4
b) R4-R11
c) R12-R15
d) All of the mentioned
Answer: b
Explanation: Temporary results are stored by the registers R4-R11.
a) yes
b) no
c) cant be said
d) depends on the conditions
Answer: a
Explanation: Yes, we can allocate the variables on the stack, it is a very effective way of storing the variables.
6. Which registers are reserved for passing the parameters to a subroutine and then returning the final result?
a) R1-R4
b) R4-R11
c) R12-R15
d) All of the mentioned
Answer: c
Explanation: Originally, R12-R15 registers are reserved for passing the parameters to a subroutine and then returnin
g the final result.
7. What actually is the order of stack frame for a parameter to pass to a subroutine?
8. When any subroutine is called, then the first value of stack will be
a) value of PC
b) the return address
c) none of the mentioned
d) both are one and the same things
Answer: d
Explanation: When any subroutine is called then the first place of the stack will be filled with the return address, or t
he address of the PC so that the pointer may return back to its appropriate place after the return instruction of the sub
routine.
9. Which of the following instruction/s is/are used to return back to the main program after the subroutine is complet
ed?
a) ret
b) reti
c) ret and reti
d) none of the mentioned
Answer: c
Explanation: For returning back from the subroutine, both ret and reti can be used, the main difference between the t
wo is that reti just resets the interrupt flag before the return, so that the interrupt can occur again.
a) yes
b) no
c) cant be said
d) depends on the conditions
Answer: a
Explanation: The approach of making subroutine is indeed very effective, as with its help we don’t need to retrace/w
rite a particular set of codes again and again. It makes our approach modular.
a) true
b) false
c) cant be said
d) depends on the conditions
Answer: a
Explanation: MSP430 has vectored interrupts i.e. the address of each ISR is stored in a vector table, that’s why it has
vectored interrupts.
2. Which of the following is true?
3. After the interrupt has occurred, the stack is filled with ______________
a) return address
b) status register
c) return address & status register
d) none of the mentioned
Answer: c
Explanation: When an interrupt had occurred, the top place of the stack is filled with the return address, so that imm
ediately after the reti instruction the pointer moves to the main program, the stack is also filled with the bits of the st
atus register so that all the temporary values get stored in it.
a) GIE=0
b) GIE=1
c) None of the mentioned
d) GIE=0 & 1
Answer: b
Explanation: If GIE is set to 1, then only other hardware interrupts are enabled.
a) true
b) false
c) cant be said
d) depends on the conditions
Answer: b
Explanation: Nonmaskable interrupts are stored in the same vector location, it may be of higher or the lower priority
.
a) true
b) false
c) cant be said
d) depends on the conditions
Answer: a
Explanation: Yes, external RST/NMI pin is a nonmaskable interrupt( The function of the RST/NMI pin is configure
d in the control register for the watchdog timer module, WDTCTL).
10. How many cycles are used by MSP430, when reti instruction is executed?
a) 3
b) 4
c) 5
d) depends on the conditions
Answer: c
Explanation: When reti instruction is executed, five cycles are used because it firstly pops the stack register complet
ely and then takes the top of the stack into the PC to return to the next address of the main program.
1. There are how many MSP430’s low power modes available in the chip?
a) two
b) three
c) four
d) five
Answer: d
Explanation: There are five low power modes available in the MSP430, out of which two are rarely employed in the
current devices.
a) LPM0
b) LPM3
c) LPM4
d) All of the mentioned
Answer: d
Explanation: LPM0, LPM3, LPM4 all are the low power modes that are available in the MSP430.
3. Which of the following modes is also known as the RAM retention mode?
a) LPM0
b) LPM3
c) LPM4
d) All of the mentioned
Answer: c
Explanation: LPM4 is known as the RAM retention mode. Here, the CPU and all clocks are disabled, I ≈ 0.1A. The
device can be woken only by an external signal.
4. Waking a device simply means that switching that device’s operation from a low power mode to an active mode.
a) true
b) false
c) cant be said
d) depends on the conditions
Answer: a
Explanation: When a device is operating in a low power mode, it can also be assumed that the device is sleeping, so
waking a device simply means to turn that device’s operation from a low power mode to an active mode.
5. When an interrupt is accepted, the contents of the status register are ___________
a) set
b) reset
c) remains the same
d) cant be said
Answer: d
Explanation: When an interrupt is accepted, the contents of the status register are cleared, it actually puts the process
or in the active mode.
6. Which of the following basic clock modules supplies clock signals to the MSP430?
a) ACLK
b) MCLK
c) SMCLK
d) All of the mentioned
Answer: a
Explanation: All of the mentioned options are correct. The basic clock module supplies the MSP430 with three cloc
k signals as follows:
8. More power can be saved by using low_power mode 0 than low_power mode 3.
a) true
b) false
c) cant be said
d) depends on the conditions
Answer: b
Explanation: More power is saved in low_ power mode 3.
a) P1SEL
b) P1DIR
c) P1IES
d) All of the mentioned
Answer: d
Explanation: All of the mentioned registers are related to Port1.
a) it is an interrupt
b) it is a timer
c) it is an analog to Digital Converter
d) it is a serial communication module
Answer: c
Explanation: SD16_A is an analog to the digital module.
5. P1IE and P1IES are registers that are used to ___________
6. Unused pins must never be left unconnected in their default state as inputs.
a) true
b) false
c) cant be said
d) depends on the conditions
Answer: a
Explanation: Unused pins must never be left unconnected in their default state as inputs. This follows a general rule
that inputs to CMOS must never be left unconnected or “floating”.
a) it turns slowly varying inputs, which might cause problems while they pass slowly through the undefined range of
input voltages, into abrupt, clean logical transitions
b) It eliminates the effect of noise on the input, provided that it is not large enough to span the gap between the upwa
rd and downward thresholds
c) none of the mentioned
d) all of the mentioned
Answer: d
Explanation: Schmidt trigger has two of the above mentioned effects in it.
8. To ensure that a negative fluctuation does not trigger an unwanted downward transition by pulling the input down
through VIT−, we must choose
a) minimum hysteresis
b) maximum hysteresis
c) all of the mentioned
d) none of the mentioned
Answer: a
Explanation: To ensure that a negative fluctuation does not trigger an unwanted downward transition by pulling the i
nput down through VIT−, we must choose a minimum hysteresis of 0.3V.
a) detecting circuit
b) debouncing circuit
c) devaluing circuit
d) degenerating circuit
Answer: b
Explanation: The SPDT(single pole, double pole) switch can be used as a debouncing circuit of a switch.
10. Debouncing can be carried out at a hardware as well as the software end?
a) yes
b) no
c) cant be said
d) depends on the conditions
Answer: a
Explanation: Debouncing can be carried out at both the fronts both at the software as well as the hardware front, to c
arry out the process appropriately.
a) three
b) four
c) five
d) seven
Answer: c
Explanation: MSP430 has mainly five types of timers in it. They are Watchdog Timer, Basic Timer1, Real clock Ti
me, Timer_A, Timer_B.
a) true
b) false
c) cant be said
d) depends on the conditions
Answer: a
Explanation: A Watchdog Timer can act as an interval timer if the protection is not needed for it.
6. LCD_A controllers make use of the Basic Timer1 timer for providing a clock to the LCD?
a) true
b) false
c) cant be said
d) depends on the conditions
Answer: b
Explanation: Basic Timer1 is not used in LCD_A controllers, because these provide an internal clock of its own to al
l of its devices.
a) true
b) false
c) cant be said
d) depends on the conditions
Answer: a
Explanation: Real time clock is an extension of Basic Timer1 and is present in almost all devices for controlling its r
eal time clock.
a) generate interrupts
b) handle external inputs
c) drive outputs
d) all of the mentioned
Answer: d
Explanation: Timer_A can be used to generate the interrupts, handle the external inputs or for driving the outputs.
a) yes
b) no
c) cant be said
d) depends on the conditions
Answer: a
Explanation: Yes, time stamp inputs can be measured by a Timer_A.
a) sampling inputs
b) driving outputs
c) sampling inputs & driving outputs
d) none of the mentioned
Answer: b
Explanation: Timer_B is used for driving the outputs as with Timer_A but it lacks the property of Timer_A of sampl
ing inputs.
a) true
b) false
c) cant be said
d) depends on the conditions
Answer: a
Explanation: The watchdog timer is used for the protection of the device. It keeps a track at the counter so that the c
ode doesn’t reach an infinite unending loop. So it actually resets the counter before this particular condition.
a) it is a 16 bit register
b) it is guided against accidental writes that require a password
c) a reset will occur if a value with an incorrect password is written to WDTCTL
d) all of the mentioned
Answer: d
Explanation: WDTCTL is a 16 bit register that is used for protecting the microcontroller. It actually resets the value
when an incorrect password is written to WDTCTL.
4. Which of the following bits reads 0 under normal conditions but goes 1 when it wants to initiate some action?
a) WDTNMI
b) WDTHOLD
c) WDTTMSEL
d) WDTCNTCL
Answer: d
Explanation: WDTCNTCL is the bit that reads 0 under normal conditions but goes 1 when it wants to initiate some a
ction like resetting the counter.
a) petting
b) feeding
c) kicking
d) all of the mentioned
Answer: d
Explanation: the process of setting the WDTCNTCL bit in the WDTCTL register is by the processes like petting, fee
ding and kicking.
7. What is the function of this instruction “WDTCTL = WDTPW | WDTCONFIG”, where **#define WDTCONFIG
(WDTCNTCL|WDTSSEL)**
a) yes
b) no
c) cant be said
d) depends on the conditions
Answer: b
Explanation: No WDTCTL_bit.WDTCNTCL = 1; is an incorrect way of setting the bits of the WDTCTL register be
cause it violates the password protection.
9. Setting the WDTTMSEL bit of the WDTCTL register makes the watchdog timer act as
a) interrupt
b) communication device
c) converter
d) interval timer
Answer: d
Explanation: The WDTTMSEL bit of the WDTCTL register makes the watchdog timer act as the interval timer.
1. Which of the following is true about the FRFQx bits of the BTCTL register?
a) 2hz-256hz
b) 12hz-512hz
c) 128hz-1khz
d) 1khz-10khz
Answer: c
Explanation: For fACLK = 32khz, the desirable range of the fLCD is the fACLK/256 to fACLK/32. This value com
es out to be in the range of 128hz-1khz.
a) true
b) false
c) cant be said
d) depends on the conditions
Answer: a
Explanation: LCD’s controllers nowadays don’t require a clock pulse, so the only main function of the BTCNT1 is t
o provide a prescalar for the BNTCNT2.
a) true
b) false
c) cant be said
d) depends on the conditions
Answer: b
Explanation: BNTCNT2 has no outputs. Instead, it raises the BTIFG flag at a frequency determined by the BTIPx bi
ts.
6. RTCSEC, RTCMIN, RTCDOW etc. are the bytes of a set of registers that are used to store
a) seconds
b) minutes
c) days of a week
d) all of the mentioned
Answer: d
Explanation: The current time and date are held in a set of registers that contain the following bytes like RTCSEC, R
TCMIN, RTCHOUR, RTCDOW etc.
8. The RTC module makes use of the Basic Timer1 because of _________
a) yes
b) no
c) cant be said
d) depends on the conditions
Answer: a
Explanation: There is only one TAR in Timer_A so all of its channels share the same timer block.
a) RTC module in it
b) Compare/ capture channel
c) Communication channel
d) Converter channel
Answer: b
Explanation: Timer_A has compared/ capture channel inbuilt inside it.
6. TAxCCTLn is a _________
a) set of 2 bits used for selecting the mode of operation of the timer
b) a register of 8 bits used for giving the count to the timer
c) a register of 16 bits used to select the compare/capture channel of the Timer_Ax
d) a register of 16 bits used to cause the timer interrupt
Answer: c
Explanation: TAxCCTLn is a register of 16 bits used to select the compare/capture channel of the Timer_Ax.
a) ACLK
b) CAOUT
c) SCLK
d) TACLK
Answer: b
Explanation: CCI1B comes from CAOUT.
a) Capture/compare input. The selected input signal can be read by this bit
b) Synchronized capture/compare input. The selected CCI input signal is latched with the EQUx signal and can be re
ad from this bit
c) Holds the data for the comparison to the timer value in the Timer_A Register, TAR
d) None of the mentioned
Answer: c
Explanation: Compare mode: TAxCCRn holds the data for the comparison to the timer value in the Timer_A Regist
er, TAR.
a) true
b) false
c) cant be said
d) depends on the conditions
Answer: b
Explanation: Immediate mode offers no double buffering condition. As here, values are copied to TBCLn as soon as
they are written to TBCCRn.
5. The capture/compare registers TBCCRn are double-buffered when used for compare events?
a) true
b) false
c) cant be said
d) depends on the conditions
Answer: a
Explanation: The capture/compare registers TBCCRn are double-buffered when used for compare events.
a) 8 bits
b) 12 bits
c) 16 bits
d) all of the mentioned
Answer: d
Explanation: The length of TBR can be programmed to be 8, 12, 16 or 10 bits long.
a) a comparator
b) compare latch
c) controller
d) control logic
Answer: b
Explanation: TBCLn is actually a compare latch that is provided in its every channel.
1. Which of the following is the analog to digital converter that is present in the MSP430 based processors?
a) comparator
b) successive approximation ADC
c) sigma delta ADC
d) all of the mentioned
Answer: d
Explanation: A comparator module, a successive approximation ADC module and a sigma delta ADC converters are
found in the MSP based processors.
2. Higher resolution along with the slow speed is given by which ADC module?
a) comparator
b) successive approximation ADC
c) sigma delta ADC
d) all of the mentioned
Answer: c
Explanation: Higher resolution along with the slow speed is given by the sigma delta ADC module.
a) resolution
b) accuracy
c) precision
d) all of the mentioned
Answer: c
Explanation: The degree of closeness of the measured value to the actual true value is its accuracy, while on the othe
r hand the measure of the repeated accuracy is termed as the precision.
5. Resolution is _________
a) levelling
b) signalling
c) quantization
d) converting
Answer: c
Explanation: The process of reduction of a continuous input to a discrete output is called as quantization.
7. Which of the following functions can be used for converting the nearest integer to its argument?
a) int
b) mint
c) uint
d) nint
Answer: d
Explanation: nint is the function that is priorly used for converting the nearest integer to its argument.
a) remains constant
b) goes up
c) goes down
d) goes asymmetrically
Answer: b
Explanation: The SNR goes up with the number of bits.
10. The intervals between the samples are obtained from _________
a) Fs
b) Ts
c) Us
d) Ks
Answer: b
Explanation: The intervals between the samples is obtained by Ts that is equal to 1/fs.
a) CACTL1
b) CACTL2
c) CACTL1 & CACTL2
d) None of the mentioned
Answer: c
Explanation: Comparator_A+ is controlled by the CACTL1 and the CACTL2 registers.
a) start a timer
b) start an A/D conversion
c) switch on the comparator module
d) switch on the bit transmission
Answer: c
Explanation: CAON bit is used to switch on the comparator module namely, Comparator_A+.
5. Which of the following bits are not actually associated with the comparator module?
a) CAREFx
b) CLLDx
c) CAON
d) CAIFG
Answer: b
Explanation: CLLDx bit is related to the Timer_2 module. All others are related to the comparator module.
7. Setting a bit in the Port Disable register CAPD causes the circuits for the usual digital input and output buffers to
be disconnected from the appropriate pin.
a) true
b) false
c) cant be said
d) depends on the conditions
Answer: a
Explanation: Setting a bit in the Port Disable register CAPD causes the circuits for the usual digital input and output
buffers to be disconnected from the appropriate pin.
8. Which bit is used for exchanging the two inputs of the comparator and invert its output to compensate?
a) CAIFG
b) CASHORT
c) CAPD
d) CAEX
Answer: d
Explanation: CAEX is used for exchanging the two inputs of the comparator and invert its output to compensate.
a) true
b) false
c) cant be said
d) depends on the conditions
Answer: a
Explanation: When some variation is made in the value of Vcc, in the same manner, itself the value of the V+ chang
es because, the voltage from the potential divider is proportional to Vcc. This changing effect can be reduced if the s
imilar change takes place in the value of V- itself.
10. The relaxation oscillator circuit helps in _______
a) 8-10 bits
b) 10-12 bits
c) 12-16 bits
d) 16-32 bits
Answer: b
Explanation: The successive approximation converters have a resolution of about 10-12 bits in it.
2. In SAR based conversions, each bit typically requires one clock cycle (sometimes two) to make a comparison and
set up the new voltage.
a) true
b) false
c) cant be said
d) depends on the conditions
Answer: a
Explanation: In SAR based conversions, each bit typically requires one clock cycle (sometimes two) to make a com
parison and set up the new voltage.
3. The main operations that are basically performed in a SAR ADC are?
4. Usually, a capacitor is inserted between an analog input and the ground because
a) true
b) false
c) cant be said
d) depends on the conditions
Answer: b
Explanation: ADC12 needs external capacitors on its voltage reference as compared to the ADC10 module.
a) ADC10ON
b) ADC10MEM
c) ADC10BUSY
d) ADC10DF
Answer: c
Explanation: While conversion is in progress, then ADC10BUSY flag is set.
a) 4
b) 8
c) 16
d) all of the mentioned
Answer: d
Explanation: ADC10SHTx bits allow 4,8,16 and 64 cycles of the ADC10CLK.
10. The input to the ADC10 is selected from_______bits of the ADC10CTL1 register?
a) INCHx
b) ADC10SC
c) ADC10ON
d) ENC
Answer: a
Explanation: The input to the ADC10 is selected from the INCHx bits of the ADC10CTL1 register.
********** Join:- https://t.me/AKTU_Notes_Books_Quantum **********
a) 1 bit converter
b) 2 bit converter
c) 3 bit converter
d) 4 bit converter
Answer: a
Explanation: Sigma delta converter is a 1 bit converter.
a) yes
b) no
c) cant be said
d) depends on the conditions
Answer: b
Explanation: Sigma delta converter is having poor resolution quality.
a) final frequency
b) oversampling frequency
c) oversampling frequency/final frequency
d) final frequency/oversampling frequency
Answer: c
Explanation: Oversampling ratio is defined as the ration of the oversampling frequency fm to the final frequency fs.
a) subtraction
b) differentiation
c) integration
d) none of the mentioned
Answer: c
Explanation: In a sigma delta converter, sigma word represents that the output obtained from the delta function is get
ting integrated.
a) true
b) false
c) cant be said
d) depends on the conditions
Answer: a
Explanation: The second part of the ADC handles purely digital signals.
a) multipled by 10
b) multiplied by 100
c) divided by 10
d) divided by 100
Answer: c
Explanation: Decimated means to divide the result by 10.
a) sinc filter
b) sinc2 filter
c) sinc3 fiter
d) rect filter
Answer: c
Explanation: The SD16 has a second-order modulator with a sinc3 filter.
2. SPI, I2C, Asynchronous serial communication are the means of communicating a processor with its associate part
ners?
a) true
b) false
c) cant be said
d) depends on the conditions
Answer: a
Explanation: SPI, I2C, Asynchronous serial communication are the means for the processor by which communicatio
n is made possible.
a) true
b) false
c) cant be said
d) depends on the conditions
Answer: b
Explanation: Clock is the prior need for any communication to occur. This is because synchronization is maintained
with the help of a clock.
a) less
b) same
c) more
d) depends on the conditions
Answer: c
Explanation: In SPI, there is no control of transmission in software—no addresses or acknowledgment, that’s why it
requires more amount of wires.
a) SPI
b) I2C
c) SPI & I2C
d) None of the mentioned
Answer: c
Explanation: USI(Universal Serial Interface) supports both the types of synchronous communication i.e. SPI and I2
C.
a) one channel
b) two channels
c) three channels
d) four channels
Answer: b
Explanation: USCI consists of mainly two channels, A and B. These are largely independent but share a few register
s and interrupt vectors.
a) A
b) B
c) C
d) D
Answer: a
Explanation: Channel A is the asynchronous receiver/ transmitter channel. It can detect the baud rate of an incoming
signal, which enables its use on a local interconnect network (LIN).
a) yes
b) no
c) depends on the conditions
d) cant be said
Answer: a
Explanation: Yes, one device can have more than one USC interfaces. There is a small difference because the interru
pt flags and enable bits for the “0” modules are in a special function registers IFG2 and IE2, while those for the “1”
modules are in their own registers, UC1IFG and UC1IE.
a) synchronous masters
b) synchronous slaves
c) asynchronous masters
d) asynchronous slaves
Answer: d
Explanation: Synchronous slaves are the most difficult to attain because the problem is that the slave must react quic
kly when a clock transition arrives from the master.
a) SPI
b) I2C
c) Asynchronous Serial Communication
d) All of the mentioned
Answer: c
Explanation: Timer_A is used in the Asynchronous Serial Communication.
a) yes
b) no
c) cant be said
d) depends on the conditions
Answer: a
Explanation: Yes, SPI is a technique where a data can be transmitted/ received in both the directions.
a) two counters
b) four flip flops
c) two shift registers
d) four steady state machines
Answer: c
Explanation: The concept of the SPI is based on the two shift registers, one for the transmitter and the other is there f
or the receiver terminal.
3. Writing on the trailing edge of the clock pulse and reading on the leading edge of the clock pulse is done when
a) CPHA is set
b) CPHA is reset
c) CPOL is set
d) CPOL is reset
Answer: b
Explanation: When CPHA is reset to zero, then writing on the trailing edge of the clock pulse and reading on the lea
ding edge of the clock pulse.
a) yes
b) no
c) cant be said
d) depends on the conditions
Answer: b
Explanation: CPKL=CPOL and CPKH=(not CPHA).
a) P1.0-2
b) P1.2-4
c) P1.4-6
d) P1.5-7
Answer: d
Explanation: SCLK, SDO, and SDI are found at P1.5-7 on F20x3.
a) true
b) false
c) cant be said
d) depends on the conditions
Answer: a
Explanation: Transmission and reception occur at a time in SPI. This means that a value is received only if the trans
mitter is active.
a) empty, reset
b) having one byte, reset
c) full, reset
d) empty, two
Answer: c
Explanation: When the buffer is full, the low power mode is cleared.
a) CLK
b) MISO
c) SDA
d) All of the mentioned
Answer: c
Explanation: The I2C bus uses only two lines. They are SDA and SCL.
a) yes
b) no
c) depends on the conditions
d) cant be said
Answer: b
Explanation: I2C is a slower means of transfer than SPI because here only one line is there for the two way commun
ication to occur.
a) true
b) false
c) cant be said
d) depends on the conditions
Answer: a
Explanation: Yes, in I2C protocol each slave has its own unique address, in order to differentiate it from others.
6. Which of the following is an issue while programming I2C using the software?
a) open-collector output
b) open-drain output
c) totem pole output
d) all of the mentioned
Answer: b
Explanation: There are two main issues while programming I2C using software, they are the open-drain output and t
he detection of start and stop conditions.
7. Which of the following is the slave to be addressed when a device acts as a master?
a) UCB0I2COA
b) UCB0I2CSA
c) UCB0I2CIE
d) All of the mentioned
Answer: b
Explanation: UCB0I2CSA is the slave to be addressed when a device acts as a master.
a) yes
b) no
c) cant be said
d) depends on the conditions
Answer: a
Explanation: Yes, baud rate is also selected in the I2C module, as is the case with the SPI module.
1. Asynchronous serial communication usually requires two wires for each direction plus a common ground.
a) true
b) false
c) cant be said
d) depends on the conditions
Answer: b
Explanation: Asynchronous serial communication usually requires only a single wire for each direction plus a comm
on ground.
2. In an asynchronous mode of transmission, usually the data is sent along with the
3. The _____ rate gives the frequency at which the bits are transmitted on the line.
a) bit rate
b) packet rate
c) baud rate
d) data rate
Answer: c
Explanation: Baud rate is the rate which determines us the frequency at which the bits are transmitted on the line.
4. Baud rate is the reverse of the ________
a) baud time
b) baud period
c) bit time
d) bit period
Answer: b
Explanation: Baud rate is the reverse of the baud period.
a) yes
b) no
c) cant be said
d) depends on the conditions
Answer: b
Explanation: No clock is transmitted in the asynchronous communication, so the transmitter and the receiver are allo
wed to work independently at their own terminals.
a) high
b) low
c) same
d) changed
Answer: b
Explanation: Framing error occurs if the bit is low.
a) the bits are either high or low and have no gaps between them
b) the bits are either high or low and have gaps between them
c) the bits are high and have gaps between them
d) the bits are low and have no gaps between them
Answer: a
Explanation: Non-return to zero format represents a format in which the bits are either high or low and have no gaps
between them.
a) true
b) false
c) cant be said
d) depends on the conditions
Answer: a
Explanation: In non-return to zero format, normally LSB is sent first.
a) 1
b) 2
c) 3
d) 4
Answer: c
Explanation: they are 3 clocks in the USCI_A. They are BRCLK, BITCLK and BITCLK16.
Estd. 2000
Estd. 2000
Estd. 2000
2. Microcontroller is a
i. Special Purpose Processor
j. General Purpose Processor
k. a and b both
l. None of the above
Estd. 2000
2. Microprocessor is a
m. Special Purpose Processor
n. General Purpose Processor
o. a and b both
p. None of the above
Estd. 2000
A. Clock Rate.
2 CO1 B. Clock Length. 1
C. Clock Set.
D. Clock Type.
a) 65536
8 b) 65534
CO1 1
c) 25652
d) 34564
a) INTR
15 CO1 b) TRAP 1
c) RST 7.5
d) RST 6.5
a) 16 bit wide
16 CO1 b) 8 bit wide 1
c) 12 bit wide
d) 4 bit wide
Which is Non- Maskable interrupt of 8085 Mp
a) TRAP
17 CO1 b) RST 7.5 1
c) INTR
d) None of the Above
SECTION B
a) (I) only
b) (II) only
c) (II) & (III)
d) (I), (II) & (III)
a) Program counter
31 CO2 b) Stack Pointer 1
c) a & b
d) None of the above
a) JNZ
32 CO2 b) JP 1
c) JPE
d) JMP
Address Bus and Data bus of 8085 MP is
a) 1 MB
34 CO2 b) 512 KB 1
c) 64 KB
d) 128 KB
LXI instruction is of
a) 2 bytes
37 CO2 b) 3 bytes 1
c) 1 byte
d) None of the above
a) Immediate AM
38 CO2 b) Register AM 1
c) Register Indirect AM
d) Implied AM
a) Immediate AM
39 CO2 b) Register AM 1
c) Register Indirect AM
d) Implied AM
a) CY Flag
40 CO2 b) Sign Flag 1
c) Overflow Flag
d) Auxiliary Flag
SECTION C
8086 Microprocessor supports _______ modes of
operation.
41 CO3
A. 2 1
B. 3
C. 4
D. 5
A. 512KB
43 CO3 B. 1Mb 1
C. 2Mb
D. 256KB
A. 16-bit
44 CO3 B. 18-bit 1
C. 20-bit
D. 24-bit
45 CO3
A. Binary bit 1
B. Zero flag
C. Sign flag
D. Overflow flag
A. NMA
47 CO3 B. INTR 1
C. INTA
D. ALE
48 CO3
A. IR 1
B. HLDA
C. HR
D. WR
49 CO3 A. LEA 1
B. LDS
C. LES
D. LAHF
The JS is called as
A. jump the signed bit
56 CO3
B. jump single bit 1
C. jump simple bit
D. jump signal it
SECTION D
An 8085 executes the following instructions
For the 8085 ALP given below, the content of accumulator after the
execution of the program is
MVI A, 45H
MOV B, A
STC
CMC
62 CO4 RAR 1
XRA B
a) 00H
b) 45H
c) 67 H
d) E7H
An 8085 ALP is given below. Assume that carry flag is initially unset.
63 CO4 The content of the A after the execution of the program is 1
MVI A, 07H
RLC
MOV B, A
RLC
RLC
ADD B
RRC
a) 8CH
b) 64H
c) 23H
d) 15H
MVI B, 87H
MOV A, B
JP START
OUT PORT 2
HLT
a) An O/P of 87H at port 1
b) An O/P of 87H at port 2
c) Infinite looping of the program execution with A data
remaining at 00H
d) Infinite looping of program execution with A data alternating
between 00H & 87H
MVI A, C3H
NOP
ADD B
DCR A
JNZ GO
JMP BACK
69 CO4 1
GO: OUT 47H
BACK: HLT
a) 17 MC
b) 14 MC
c) 10MC
d) 15 MC
LXI H, 9258
MOV A, M
CMA
MOV M, A
a) Contents of locations 9258H are moved to the A
71 CO4 b) Contents of locations 9258H are compared with the 1
contents of A
c) Contents of locations 8529H are complemented and stored
in location 8529H
d) Contents of locations 5892H are complemented and stored
in location 5892H
It is desired to multiply the numbers 0AH by 0BH and store the result
in the accumulator. The numbers are available in registers B & C
respectively. A part of the 8085 program for this purpose
MVI A, 00H
LOOP:
72 CO4 1
HLT
73 CO4 The content of A when the program counter reaches 0109H is. 1
Content of memory location 0701H is 00H.
a) 20H
b) 02H
c) 00H
d) FFH
What will be the result in the A after the last instruction is executed.
a) 20H
b) 02H
c) 60H
d) 06H
An 8085 ALP is
MVI A, B5H
MVI B, 0EH
XRI 69H
ADD B
ANI 9BH
CPI 9FH
STA 3010H
75 CO4 HLT 1
In the question 75, After the execution of line 7 of the program, the
status of CY and Z flag
a) CY=0, Z=0
76 CO4 b) CY=0, Z=1 1
c) CY=1, Z=0
d) CY=1, Z=1
CALL 3000H
77 CO4 1
3000H: LXI H, 3CF4H
PUSH PSW
SPHL
POP PSW
RET
a) 3CF0H
b) 3CF8H
c) 3FFDH
d) EFFFH
a) B&C
78 CO4 b) H&L 1
c) D&E
d) W&Z
SECTION E
81 CO5 A. 8285A 1
B. 8241A
C. 8255A
D. 8251A
A. PORT A
83 CO5 B. PORT B 1
C. PORT C
D. PORT D
84 CO5
A. Read/Write Logic 1
B. Data Bus Buffer
C. system data bus
D. System Buffer
86 CO5 a) MARK 1
b) CLEAR
c) RESET
d) READY
a) HLDA
87 CO5 b) HRQ 1
c) ADSTB
d) None of the mentioned
a) 4
b) 8
c) 16
d) 64
90 CO5
a) Automatic rotation 1
b) Automatic EOI mode
c) Specific rotation
d) EOI
91 CO5
a) Interrupt Request Register 1
b) In-Service Register
c) Priority resolver
d) Interrupt Mask Register
94 CO5
a) TXC(active low) 1
b) TXC(active high)
c) TXD(active low)
d) RXC(active low)
95 CO5
a) TXRDY(Transmitter ready) 1
b) RXRDY(Receiver ready output)
c) DSR(active low)
d) DTR(active low)
U U U U OF DF IF TF SF ZF U AF U PF U CF
U - Unused
11
• Conditional Status Flags
• Parity Flag
– If even parity then PF=1 otherwise zero
• Zero Flag
– The flag is set if the result of the operation is zero, else it is reset
• Sign Flag
– If the MSB of the result is 1 then sign flag is set otherwise reset
• Auxiliary Flag
– If the carry from 3rd bit to 4th bit then AF is set otherwise reset
• Carry Flag
• Overflow Flag
– Overflow occurs when signed numbers are added or subtracted. An
overflow indicates the result has exceeded the capacity of the Machine
– (75H + 37H)
– Control Flag
• Trap Flag
• Interrupt Flag
– If user sets IF flag, processor will recognize
external interrupt requests
– Clearing IF disables these interrupts
• Direction Flag
Flag Register
• Six of the flags are status indicators reflecting properties
of the last arithmetic or logical instruction.
• For example, if register AL = 7Fh and the instruction ADD
AL,1 is executed then the following happen
AL = 80h
CF = 0; there is no carry out of bit 7
PF = 0; 80h has an odd number of ones
AF = 1; there is a carry out of bit 3 into bit 4
ZF = 0; the result is not zero
SF = 1; bit seven is one
OF = 1; the sign bit has changed
14
General Purpose Registers
16 bits
8 bits 8 bits
AH AL Accumulator
AX
BX
BH BL Base
CX CH CL Count
DX DH DL
Data
SP Stack Pointer
Pointer
BP Base Pointer
SI Source Index
Index
DI Destination Index
15
EXECUTION UNIT – General Purpose Registers
Register Purpose
AX Word multiply, word divide, word I /O
AL Byte multiply, byte divide, byte I/O, decimal arithmetic
17
• SI: Source Index register
– is required for some string operations
– When string operations are performed, the SI
register points to memory locations in the data
segment which is addressed by the DS register.
Thus, SI is associated with the DS in string
operations.
• DI: Destination Index register
– is also required for some string operations.
– When string operations are performed, the DI
register points to memory locations in the data
segment which is addressed by the ES register.
Thus, DI is associated with the ES in string
operations.
18
BIU (Bus Interface Unit)
Contains
• 6-byte Instruction Queue (Q)
• The Segment Registers (CS, DS, ES, SS).
• The Instruction Pointer (IP).
• The Address Summing block (Σ)
• Performs all activities related to bus.
– Instruction fetching from primary memory
– Read/write of data operand from/to primary
memory
– I/O of data from/to peripherals ports
– Address generation for memory reference
– Instruction queuing in an instruction queue
Instruction queue
• When the EU unit is busy in decoding and
executing an instruction, the BIU fetches upto
six instruction bytes for next instruction
• These bytes are called as pre fetched bytes
and they are stored in FIFO register set called
queue
Segment Registers
Segmented Memory Physical Memory
00000
▪The memory in an 8086/88 based
system is organized as segmented
memory.
Code segment (64KB)
1 MB
1Mbyte of memory.
Extra segment (64KB)
▪The Complete physically available
memory may be divided into a Stack segment (64KB)
number of logical segments.
FFFFF
23
• The size of each segment is 64 KB
• A segment may be located any where in the
memory
• Each of these segments can be used for a specific
function.
26
27
MEMORY
FFFFFH
BIU
Segment Registers 7FFFFH
CODE (64k)
70000H
CSR 34BA
5FFFFH
DATA (64K)
1 MB
DSR 44EB 50000H
3FFFFH
ESR 54EB EXTRA (64K)
30000H
SSR 695E 2FFFFH
STACK (64K)
20000H
29
30
• The following examples shows the CS:IP scheme
of address formation:
CS 34BA IP 8AB4 Code segment
34BA0
Inserting a hexadecimal 0H (0000B)
with the CSR or shifting the CSR 8AB4 (offset)
four binary digits left
3D645
34BA0(CS)+
8AB4(IP)
3 D 6 5 4 (next address)
44B9F
31
• Example For Address Calculation (segment:
offset)
• If the data segment starts at location 1000h and
a data reference contains the address 29h where
is the actual data?
Offset 0000 0000 0010 1001
Segment Address
0001 0000 0000 0000 0000
32
Segment and Address register
combination
• CS:IP
• SS:SP SS:BP
• DS:BX DS:SI
33
Summary of Registers & Pipeline of 8086 µP
EU BIU
AX AH AL
IP
BX BH BL
Fetch &
CX CH CL D
store code CS DS ES SS
E
DX DH DL C
bytes in
C
O PIPELINE C
O PIPELINE O IP BX DI SP
D
SP D E (or) D DI BP
E O QUEUE E
BP I SI
R U
SI T N
DI
Default Assignment
Timing
FLAGS ALU control
34
Comparison of 8085 & 8086
8085 8086
• Size: 8 bit microprocessor • 16 bit microprocessor
• Address bus of 16 bits • Address bus of 20 bits
• It can access upto 64Kbytes • It can access upto 1MB of
of memory memory
• It does not have instruction • 6 byte instruction queue
queue • Supports 2 stage pipelined
structure
INTEL 8086 - Pin Diagram
INTEL 8086 - Pin Details
Power Supply
5V 10%
Ground
Reset
Registers, seg
regs, flags
Clock
INTEL 8086 - Pin Details
Address/Data Bus:
Contains address Address Latch Enable:
bits A15-A0 when ALE
is 1 & data bits D15 – When high,
D0 when ALE is 0. multiplexed
address/data bus
contains address
information.
INTEL 8086 - Pin Details
INTERRUPT
Non - maskable
interrupt
Interrupt
acknowledge
Interrupt request
INTEL 8086 - Pin Details
Direct
Memory
Access
Hold
Hold
acknowledge
INTEL 8086 - Pin Details
Address/Status Bus
Address bits A19 –
A16 & Status bits S6
– S3
INTEL 8086 - Pin Details
Min/Max mode
Minimum Mode: +5V
Maximum Mode: 0V
Maximum Mode
Pins
Minimum Mode- Pin Details
Read Signal
Write Signal
Memory or I/0
Data
Transmit/Receive
S2 S1 S0
000: INTA
001: read I/O port
010: write I/O port
011: halt
100: code access Status Signal
101: read memory
110: write memory Inputs to 8288 to
111: none -passive generate eliminated
signals due to max
mode.
Maximum Mode - Pin Details
Lock Output
Used to lock peripherals
off the system
DMA
Activated by using the Request/Grant
LOCK: prefix on any
instruction
Lock Output
Maximum Mode - Pin Details
QS1 QS0
00: Queue is idle
01: First byte of opcode
10: Queue is empty
11: Subsequent byte of
opcode
Queue Status
Used by numeric
coprocessor (8087)
Demultiplexing Technique for the 8086 Microprocessor
PROGRAMMABLE PERIPHERAL
INTERFACE-8255
Features:
It is a programmable , parallel I/O device .
A1 A0 Select
0 0 PA
0 1 PB
1 0 PC
Control
1 1
reg.
RESET: This is used to reset the device. That
means clear control registers.
PB0-PB7:Similar to PA
The internal data bus and Outer pins D0-D7 pins are
connected in internally.
Read/Write Control Logic:
This is getting the input signals from control bus and
Address bus
• PORT A:
• This is a 8-bit I/O port.
• It can be programmed by mode 0 , mode 1, mode 2 .
PORT B:
This is a 8-bit I/O port
It can be programmed by mode 0 and mode 1.
PORT C:
This is a 8-bit I/O port
It is splitted into two parts.
It can be programmed by bit set/reset operation.
Operation modes:
BIT SET/RESET MODE (BSR):
The PORT C can be Set or Reset by sending OUT
instruction to the CONTROL registers.
I/O MODES:
MODE 0(Simple input / Output):
In this mode , port A, port B and port C is used as
individually (Simply).
Ports do not have Handshake or interrupt capability.
MODE 1 :(Input/output with Hand shake)
In this mode, input or output is transferred by hand
shaking Signals.
Computer DATA BUS Printer
STB
ACK
0 1 B
21 3 4 5 6 7
0 1 B
02 1 0 1 0 1
0 0 1 1 0 0 1 1
0 0 0 0 1 1 1 1
BIT SET/RESET FLAG
=0 Active
PC0-PC7 is set or reset as per the status of D0.
A BSR word is written for each bit
Example:
PC3 is Set then control register will be 0XXX0111.
PC4 is Reset then control register will be 0XXX01000.
X is a don’t care.
FOR I/O MODE:
The mode format for I/O as shown in figure
D7 D6 D5 D4 D3 D2 D1 D0
Group A Group B
Port C Upper
1=Input Port C Lower
Mode set
flag=1=I/O 0=Output 1=Input
mode Port A 0=Output
1=Input Port B
0=Output 1=Input
Mode selection 0=Output
00=mode 0 Mode selection
01=mode 1 0=mode 0
1x=mode 2 1=mode 1
Bit D7 is used for specifying whether word loaded in to
Bit set/reset mode or I/O Mode .
D7=1= I/O Mode.
D7=0=Bit set/Reset mode.
Introduction:
Direct Memory Access (DMA) is a method of allowing data
to be moved from one location to another in a computer
without intervention from the central processor (CPU).
It is also a fast way of transferring data within (and
sometimes between) computer.
The DMA I/O technique provides direct access to the
memory while the microprocessor is temporarily disabled.
The DMA controller temporarily borrows the address bus,
data bus and control bus from the microprocessor and
transfers the data directly from the external devices to a
series of memory locations (and vice versa).
Basic DMA Operation:
Two control signals are used to request and acknowledge a
direct memory access (DMA) transfer in the microprocessor-
based system.
The HOLD signal as an input(to the processor) is used to
request a DMA action.
The HLDA signal as an output that acknowledges the DMA
action.
When the processor recognizes the hold, it stops its execution and
enters hold cycles.
Cont.,
HOLD input has higher priority than INTR or NMI.
The only microprocessor pin that has a higher priority
than a HOLD is the RESET pin.
HLDA becomes active to indicate that the processor has
placed its buses at high-impedance state.
Basic DMA Definitions:
Direct memory accesses normally occur between an I/O
device and memory without the use of the microprocessor.
A DMA read transfers data from the memory
to the I/O device.
A DMA write transfers data from an I/O device
to memory.
The system contains separate memory and I/O control
signals.
Hence the Memory & the I/O are controlled simultaneously
The DMA controller provides memory with its address, and the
controller signal selects the I/O device during the transfer.
Data transfer speed is determined by speed of the memory device
or a DMA controller.
In many cases, the DMA controller slows the speed of the system
when transfers occur.
The serial PCI (Peripheral Component Interface) Express bus
transfers data at rates exceeding DMA transfers.
This in modern systems has made DMA is less important.
78
The 8237 DMA Controller
The 8237 supplies memory & I/O with control signals and
memory address information during the DMA transfer.
It is actually a special-purpose microprocessor whose job is
high-speed data transfer between memory and I/O
CPU having the control over the bus:
When DMA operates:
8257 DMA Controller
Features
It is a 4-channel DMA.
So 4 I/O devices can be interfaced to DMA
It is designed by Intel
Each channel have 16-bit address and 14 bit counter
It provides chip priority resolver that resolves priority of
channels in fixed or rotating mode.
It provide on chip channel inhibit logic.
It generates a TC signal to indicate the peripheral that the
programmed number of data bytes have been transferred.
The maximum frequency is 3Mhz and minimum frequency is
250 Hz.
Block Diagram
D0-D7:
it is a bidirectional ,tri state ,Buffered ,Multiplexed data (D0-D7)and
(A8-A15).
IOR:
It is active low ,tristate ,buffered ,Bidirectional lines.
IOW:
It is active low ,tristate ,buffered ,Bidirectional control lines.
CLK:
It is the input line ,connected with TTL clock generator
RESET:
Used to clear mode set registers and status registers
A0-A3:
A0-A3 bits of memory address on the lines.
READY:
It is a asynchronous input line.
In master mode,
When ready is high it is received the signal.
HRQ:
It is used to receiving the hold request signal from the output device.
HLDA:
It is acknowledgment signal from microprocessor.
AEN (Address enable):
It is a control output line.
Used it isolate the system address ,data ,and control lines.
ADSTB: (Address Strobe)
It is a control output line.
Used to split data and address line.
TC (Terminal Count):
It is a status of output line.
It is high ,it selected the peripheral.
It is low ,it free and looking for a new peripheral.
MARK:
It is a modulo 128 MARK output line.
DRQ0-DRQ3(DMA Request):
These are the asynchronous peripheral request input signal.
The request signals is generated by external peripheral device.
DACK0-DACK3:
These are the active low DMA acknowledge output lines.
Low level indicate that ,peripheral is selected for giving the
information (DMA cycle).
In master mode it is used for chip select.
Control logic block:
It contains ,
1. Control logic
2. Mode set register and
3. Status Register.
MODE SET REGISTERS:
It is a write only registers.
It is used to set the operating modes.
This registers is programmed after initialization of DMA channel.
D7 D6 D5 D4 D3 D 2 D1 D0
AL TCS EW RP EN3 EN2 EN1 EN0
❖ When the 8259A is in buffered mode, this pin is an output that controls the data bus
transceivers in a large microprocessor-based system.
❖ When the 8259A is not in buffered mode, this pin programs the device as a master
(1) or a slave (0).
❖ CAS2-CAS0, the cascade lines are used as outputs from the master to the slaves for
cascading multiple 8259As in a system.
8259A PIC- PIN DIGRAM
8
2
5
9
8259A PIC- BLOCK DIAGRAM
DATA BUS BUFFER
8 bit (D7-D0) Bidirectional data lines
Tri-state Buffer used to Interface the 8259 to the system data bus.
Control words, Status words and vectoring data are all passed
through the data bus buffer.
Control Logic
INT (Interrupt)→ Output
External e device 00
……..… IR0
……..…
INT
Master 8259A
Interrupt controller
INTR
…………………
IR0
……..…
INT INT
IR7
Slave 8259A
Interrupt controller
External e device 53
IR0
……..…
……..…
INT
❖ Selects the vector number used with the interrupt request inputs.
❖ For example, if we decide to program the 8259A so that it functions at vector
locations 08H-0FH, we place a 08H into this command word.
❖ Likewise, if we decide to program the 8259A for vectors 70H-77H, we place a
70H in this ICW.
ICW3:
❖ Is used only when ICW1 indicates that the system is operated in cascade mode.
❖ This ICW indicates where the slave is connected to the master.
❖ For example, if we connected a slave to IR2, then to program ICW3 for this
connection, in both master and slave, we place a 04H in ICW3.
❖ Suppose we have two slaves connected to a master using IR0 and IR1. The
master is programmed with an ICW3 of 03H; one slave is programmed with an
ICW3 of 01H and the other with an ICW3 of 02H.
ICW4:
AEOI:
Selects automatic or normal end of interrupt. The EOI commands of OCW2 are
used only if the AEOI mode is not selected by ICW4. If AEOI is selected, the interrupt
automatically resets the interrupt request bit and does not modify priority. This is the
preferred mod of operation for the 8259A and reduces the length of the interrupt service
procedure.
Operation Command Words
OCW1:
❖ Is programmed only when the AEOI mod is not selected for the 8259A.
❖ In this case, this OCW selects how the 8259A responds to an interrupt.
❖ The modes are listed as follows in next slide:
❖ Nonspecific End-of-Interrupt:
A command sent by the interrupt service procedure to signal the end of the interrupt.
The 8259A automatically determines which interrupt level was active and resets the
correct bit of the interrupt status register. Resetting the status bit allows the interrupt to
take action again or a lower priority interrupt to take effect.
❖ Specific End-of –Interrupt:
A command that allows a specific interrupt request to be reset. The exact position is
determined with bits L2-L0 of OCW2.
❖ Rotate-on-Nonspecific EOI:
A command that function exactly like the nonspecific end-of-interrupt command except
that it rotates interrupt priorities after resetting the interrupt status register bit. The
level reset by this command becomes the lowest priority interrupt. For example, if IR4
was just serviced by this command, it becomes the lowest priority interrupt and IR5
becomes the highest priority.
❖ Rotate-on-Automatic EOI:
A command that selects automatic EOI with rotating priority. This command must be
sent to the 8259A only once if this mode is desired. If this mode must be turned off, use
the clear command.
❖ Rotate-on-Specific EOI:
Functions as the specific EOI, except that it selects rotating priority.
❖ Set Priority:
Allows the programmer to set the lowest priority interrupt input using the L2-L0 bits.
OCW3:
➢ Selects the register to be read, the operation of the special mask register, and
the poll command.
➢ If polling is selected, the P-bit must be set and then output to the 8259A. The
next read operation would read the poll word. The rightmost three bits of the
poll word indicate the active interrupt request with the highest priority.
➢ The leftmost bit indicates whether there is an interrupt, and must be checked
to determine whether the rightmost three bits contain valid information.
Status Register: -
Three status registers are available in the 8259A:
Both the IRR and ISR are read by programming OCW3 and IMR is read
through OCW1. To read the IMR, A0 = 1, to read IRR or ISR, A0 = 0. Bit positions
D0 and D1 of OCW3 select which register (IRR or ISR) is read when A0 = 0.
Modes of 8259A PIC
❖ Fully Nested mode
❖ Nonspecific Rotating
❖ Specific Rotating
❖ Special Mask
❖ Polling
❖ Poll command
➢ The INT output is neglected, though it functions normally by not connecting INT
output or by masking INT input of the microprocessor.
Prepared By:
Ms. Ranjeeta Yadav
Intel’s Programmable
Not Counter/ Timer Device
Possible To (8253/8254) Facilitates
Generate • Accurate Time Delays
Accurate • Minimizes Load On Mp
Time • Real Time Clock
Delays • Event Counter
Using Delay • Digital One Shot
Routines in • Square Wave Generator
8086 • Complex Waveform
Generator
8253 8254-ADVANCED VERSION OF 8253
• 8253 can • 8254 can operate with higher clock
operate at
frequency Frequency Range ( DC To 8 Mhz AND 10
from dc to Mhz FOR 8254-2)
2mhz
• Includes Status Read Back Command That
Latches The Count And Status Of Counters
Features
• Three Independent 16-Bit Counters,
• Clock input upto 10 MHz,
• Status Read-Back Command,
• Six Programmable Counter Modes,
• Binary or BCD Counting,
• Single +5V Supply,
• Superset of PIT-8253.
Pin Diagram
Pin Description
Block Diagram of 8254
Internal Blocks of Counter
• Count Register (CR) to store count (CRL &
CRM),
• Counting elements (CE) are used for counting,
• Output Latch (OLL & OLM) to latch the count
in CE,
• The Control Word Register is not part of the
Counter itself, but its contents determine how
the Counter operates.
• The status register, when latched, contains the
current contents of the Control Word Register
and status of the output and null count flag.
8254 Programming
• Each counter is individually programmed by
writing a control word, followed by the initial
count.
• The control word allows the programmer to
select the counter, mode of operation, binary
or BCD count and type of operation
(read/write).
WRITE Operation
N : Undefined Count
MODE 1: Hardware Retriggerable One Shot.
MODE 2: Rate Generator
MODE 3: Square Wave Mode
MODE 4: Software Triggered Strobe
MODE 5 : Hardware Triggered Strobe
(Retriggerable)
Applications of 8254
• Real time clock
• Event-counter
• Digital one-shot
• Programmable rate generator
• Square wave generator
• Binary rate multiplier
• Complex waveform generator
• Complex motor controller
References
• Microprocessors and Interfacing by
Douglas V. Hall, TMH Publication.
• Intel 8254 data sheet
(www.datasheetcatalog.com)
→Telegram Channel
→Telegram Group
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
Date-16/06/2021
Subject Name-KCS-403-Microprocessor_CSE-Semester 4
UNIT-1
a. 0030H
b. 0024H
c. 0048H
d. 0060H
Answer: (a).0030H
d. end of program
3. What is SIM?
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
a. MROM
b. PROM
c. EPROM
d. EEPROM
Answer: (a).MROM
a. MROM
b. PROM
c. FROM
d. FPROM
Answer: (b).PROM
a. Micro-operations
b. Macro-operations
c. Multi-operations
d. Bi control-operations
Answer: (b).Macro-operations
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
a. incremented by one.
d. data processing with registers takes fewer cycles than that with memory
Answer: (d).data processing with registers takes fewer cycles than that with memory
b. A fetch cycle
12. The output data lines of microprocessor and memories are usually tristated
because
a. More than one device can transmit information over the data bus by enabling
only one device at a time
b. More than one device can transmit over the data bus at the same time
c. The data line can be multiplexed for both input and output
Answer: (a).More than one device can transmit information over the data bus by
enabling only one device at a time
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
13. The correct sequence of steps in the instruction cycle of a basic computer is
14. The register which holds the information about the nature of results of
arithmetic and logic operations is called as
a. Accumulator
c. Flag register
a. 1, 2, 3 and 4
b. 1, 2 and 3
c. 1 and 2 only
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
d. 3 and 4 only
17. Both the ALU and control section of CPU employ which special purpose
storage location?
a. Buffers
b. Decoders
c. Accumulators
d. Registers
Answer: (c).Accumulators
c. all the registers and counters are being reset and this signal can be used to
reset external support chip
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
Answer: (c).all the registers and counters are being reset and this signal can be
used to reset external support chip
20. The content of the A15-A8 (higher order address lines) while executing “IN
8-bit port address” instruction are
b. irrelevant
a. TRAP
b. RST 7.5
d. RST 6.5
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
22. Which one of the following instruction may be used to clear the
accumulator content irrespective of its initial value?
a. CLR A
b. ORA A
c. SUB A
d. MOV A, 00H
Answer: (c).SUB A
23. ___________ signal prevent the microprocessor from reading the same data
more than one.
a. pipelining
b. handshaking
c. controlling
d. signaling
Answer: (b).handshaking
24. Data transfer between the microprocessor for peripheral takes place
through __________.
a. I/O port
b. input port
c. output port
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
d. multi port
a. +5V
b. -5V
c. -10V
d. +10V
Answer: (a).+5V
26. The _______ allow data transfer between memory and peripherals.
a. DMA technique
b. Microprocessor
c. Register
d. Decoder
a. P2
b. P4
c. P6
d. P8
Answer: (c).P6
29. The number of hardware chips needed for multiple digit display can be
minimized by using the technique called ______.
a. interfacing
b. multiplexing
c. demultiplexing
d. multiprocessing
Answer: (b).multiplexing
a. a parallel interface
b. a serial interface
c. printer interface
d. a modem interface
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
a. medium voltage
b. higher voltage
c. lower voltage
c. interrupt is Masked
a. clock
d. signal bus
36. The advantage of memory mapped I/O over I/O mapped I/O is _________
a. faster operation
37. In 8279 Status Word, data is read when ________ pins are low, and write to
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
38. In 8279, the keyboard entries are de bounced and stored in an _________,
that is further accessed by the CPU to read the key codes.
a. 8-bit FIFO
b. 8-byte FIFO
c. 16 byte FIFO
d. 16 bit FIFO
39. For the most Static RAM the write pulse width should be at least
a. 10 ns
b. 60 ns
c. 300 ns
d. 350 ns
Answer: (b).60 ns
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
a. Motorala
b. Intel
c. Stephen Mors
d. HCL
Answer: (b).Intel
a. bidirection
b. unidirection
c. mulidirection
d. circular
Answer: (b).unidirection
a. 40
b. 45
c. 20
d. 35
Answer: (a).40
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
a. +5V
b. -5V
c. +12V
d. -12V
Answer: (a).+5V
44. Which is used to store critical pieces of data during subroutines and
interrupts ?
a. Stack
b. Queue
c. Accumulator
d. Data register
Answer: (a).Stack
a. Pushing data
b. Pushed
c. Pulling
d. None of these
46. The external system bus architecture is created using from ______
architecture.
a. Pascal
b. Dennis Ritchie
c. Charles Babbage
d. Von Neumann
b. Compiler
c. Operating system
d. All of these
a. Auxiliary
b. Backup store
c. Both A and B
d. None of these
49. The lower red curvy arrow show that CPU places the address extracted
from the memory location on the_____.
a. Address bus
b. System bus
c. Control bus
d. Data bus
50. The CPU sends out a ____ signal to indicate that valid data is available on
the data bus.
a. Read
b. Write
c. Both a and b
d. None of these
Answer: (b).Write
UNIT-2
1. In 8085 microprocessor, how many interrupts are maskable.
a. Two
b. Three
c. Four
d. Five
Answer. c
2. Which stack is used in 8085 microprocessors?
a. FIFO
b. FILO
c. LIFO
d. LILO
Answer. c
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
3. In the instruction of the 8085 microprocessor, how many bytes are present?
a. One or two
b. One, two or three
c. One only
d. Two or three
Answer. b
4. Which one of the following addressing technique is not used in 8085
microprocessor?
a. Register
b. Immediate
c. Register indirect
d. Relative
Answer. d
5. Which one of the following register of 8085 microprocessor is not a part of the
programming model?
a. Instruction register
b. Memory address register
c. Status register
d. Temporary data register
Answer. c
6. The program counter in 8085 microprocessor is a 16-bit register, because
a. It counts 16 bits at a time
b. There are 16 address times
c. It facilitates the users storing 16-bit data temporarily
d. It has to fetch two 8-bit data at a time.
Answer. b
7. A direct memory access (DMA) transfer replies
a. Direct transfer of data between memory and accumulator
b. Direct transfer of data between memory and I/O devices without the use of
microprocessor
c. Transfer of data exclusively within microprocessor registers
d. A fast transfer of data between microprocessor and I/O devices
Answer. b
8. Handshaking mode of data transfer is
a. Synchronous data transfer
b. asynchronous data transfer
c. interrupt driven data transfer
d. level Mode of DMA data transfer
Answer. a
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
a. Micro-operations
b. Macro-operations
c. Multi-operations
d. Bi control-operations
Answer. c
27. Consider the following registers:
1. Accumulator and flag register
2. B and C registers
3. D and E registers
4. H and L registers
Which of these 8-bit registers of 8085 μP can be paired together to make a 16-bit
register?
a. (a) 1, 3 and 4
b. 2, 3 and 4
c. 1, 2 and 3
d. 1, 2 and 4
Answer. b
28. The first microprocessor to include virtual memory in the Intel
microprocessor family is
a. 80286
b. 80386
c. 80486
d. Pentium
Answer. a
29. Program counter in a digital computer
a. counts the numbers of programs run in the machine ,
b. counts the number of times a subroutine is called
c. counts the number of times the loops are executed
d. points the memory address of the current or the next instruction to be
executed
Answer
Answer. d
30. Assuming LSB is at position 0 and MSB at position 7, which bit positions are
not used (undefined) in Flag Register of an 8085 microprocessor?
a. 1, 3, 5
b. 2, 3, 5
c. 1, 2, 5
d. 1, 3, 4
Answer. a
31. At the beginning of a fetch cycle, the contents of the program counter are
a. incremented by one
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
c. T3 and T4
d. T4 and T1
Answer. c
37. Which one of the following circuits transmits two messages simultaneously in
one direction?
a. Duplex
b. Diplex
c. Simplex
d. Quadruplex
Answer. b
38. A microprocessor is ALU
a. and control unit on a single chip
b. and memory on a single chip
c. register unit and I/O device on a single chip
d. register unit and control unit on a single chip
Answer. d
39. In Intel 8085 microprocessor, ALE signal is made high to
a. Enable the data bus to be used as low order address bus
b. To latch data D0— D7 from the data bus
c. To disable data bus
d. To achieve all the functions listed above
Answer. a
40. Output of the assembler in machine codes is referred to as
a. Object program
b. Source program
c. Macro instruction
d. Symbolic addressing
Answer. a
41. Which one of the following statements for Intel 8085 is correct?
a. Program counter (PC) specifies the address of the instruction last executed
b. PC specifies the address of the instruction being executed
c. PC specifies the address of the instruction be executed
d. PC specifies the number of instruction executed so far
Answer. c
42. The instruction RET executes with the following series of machine cycle
a. Fetch, read, write
b. Fetch, write, write
c. Fetch, read, read
d. Fetch, read
Answer. c
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
43. Which one of the following statements is correct regarding the instruction
CMP A?
a. Compare accumulator with register A
b. Compare accumulator with memory
c. Compare accumulator with register H
d. This instruction does not exist
Answer. a
44. The instruction JNC 16-bit refers to jump to 16-bit address if
a. Sign flag is set
b. Carry flag is reset
c. Zero flag is set
d. Parity flag is reset
Answer. b
45. Consider the following interrupts for 8085 microprocessor:
1. INTR
2. RST 5.5
3. RST 6.5
4. RST 7.5
5. TRAP
If the interrupt is to be vectored to any memory location then which of the above
interrupt is/are correct?
a. 1 and 2 only
b. 1, 2, 3 and 4
c. 5 only
d. 1 only
Answer. d
46. Consider the following statements:
1. Auxiliary carry flag is used only by the DAA and DAS instruction.
2. Zero flag is set to 1 if the two operands compared are equal.
3. All conditional jumps are long type jumps.
Which of the above statements are correct?
a. 1, 2 and 3 only
b. 1 and 2 only
c. 1 and 3 only
d. 2 and 3 only
Answer. b
47. Among the given instructions, the one which affects maximum number of
flags is
a. RAL
b. POP PSW
c. XRA A
d. DCR A
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
Answer. c
48. XCHG instruction of 8085 exchanges the content of
a. top of stack with contents of register pair
b. BC and DE register pairs
c. HL and DE register pairs
d. None of the above
Answer. c
49. Direction flag is used with
a. String instructions
b. Stack instructions
c. Arithmetic instructions
d. Branch instructions
Answer. a
50. What will be the contents of DE and HL register pairs respectively after the
execution of the following instructions?
LXIH, 2500 H
LXID, 0200 H
DAD D
XCHG
a. 0200 H, 2500 H
b. 0200 H, 2700 H
c. 2500 H, 0200 H
d. 2700 H, 0200 H
Answer. d
UNIT-3
51. In 8085 microprocessor, the address for ‘TRAP’ interrupt is
a. 0024 H
b. 002C H
c. 0034 H
d. 003C H
Answer. a
52. A ‘DAD H” instruction is the same as shifting each bit by one position to the
a. left
b. right
c. left with a zero inserted in LSB position
d. right with a zero inserted in LSB position
Answer. c
53. When a program is being executed in an 8085 microprocessor, its program
counter contains
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
a.
the memory address as the instruction that is to be executed next.
b.
the memory address of the instruction that is being currently matched.
c.
the total number of instructions in the program being executed.
d.
the number of instructions in the current program that have already been
executed.
Answer. a
54. Which of the following data transfer is not possible in microprocessor?
a. Memory to accumulator
b. Accumulator to memory
c. Memory to memory
d. I/O device to accumulator
Answer. c
55. LOADER is a program that
a. loads the memories and generates a hex file
b. loads the hex file and converts to the executable file
c. loads the COM file and generates the binary code
d. loads English like command and generates the binary code
Answer. b
56. Which of the following instructions is closest match to the instruction POP
PC?
a. RET
b. PCHL
c. POP PSW
d. DAD SP
Answer. a
57. How many machine cycles are required by STA instruction?
a. 2
b. 3
c. 4
d. 5
Answer. c
58. Which of the following 8085 instruction will require maximum T-states for
execution?
a. XRI byte
b. STA address
c. CALL address
d. JMP address
Answer. c
59. In 8085 microprocessor, which mode of addressing does the instruction CMP
M use?
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
a. Direct addressing
b. Register addressing
c. Indirect addressing
d. Immediate addressing
Answer. c
60. With reference to 8085 microprocessor, which of the following statements
are correct?
1. INR is 1 byte instruction
2. OUT is 2 byte instruction
3. STA is 3 byte instruction
a. 1 and 2 only
b. 2 and 3 only
c. 1 and 3 only
d. 1, 2 and 3
Answer. d
61. Assume that the accumulator and the register C of 8085 microprocessor
contain respectively F0 H
and OF H initially. What will be the content of accumulator after execution of
instruction ADD C?
a. 00 H
b. FF H
c. EF H
d. FE H
Answer. b
62. It is desired to multiply the numbers 0A H by OB H and store the result in the
accumulator. The numbers are available in registers B and C respectively. A part
of the 8085 program for this purpose is given below:
MVI A, OO H
Loop; ………..
………..
………..
HLT END
The sequence of instruction to complete the program would be
a. JNZ LOOP; ADD B, DCR C
63. Find the content of the accumulator after the execution of the following
program:
MVI A, F0 H
ORI FF H
XRI F0 H
a. 00 H
b. F0 H
c. 0F H
d. FF H
Answer. c
64. The following program starts at location 0100 H
LXI SP, 00FF
LXI H, 0701 H
MVI A, 20 H
SUB M
The content of accumulator when the program counter reaches 0107 H is
a. 20 H
b. 02 H
c. 00 H
d. FF H
Answer. c
65. The difference between 8085 instructions RST n and PCHL is
a. RST n is equivalent to a sub-routine call while PCHL is equivalent to
unconditional branch.
b. RST n uses direct addressing while PCHL uses register indirect addressing.
c. RST n is a software interrupt while PCHL simulates a hardware interrupt
d. RST n resets the processor while PCHL restarts the processor.
Answer. a
66. The content of accumulator are 70 H. Initially all flags are zero. What will be
values of CY and S after executing instruction RLC?
a. CY = 0 and S = 0
b. CY = 1 and S = 1
c. CY = 1 and S = 0
d. CY = 0 and S = 1
Answer. d
67. A software delay subroutine is written as given below:
DELAY: MVI H, 255D H
MVI L, 255D H
LOOP: DCR L
JNZ LOOP
DCR H
JNZ LOOP
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
a. 255
b. 510
c. 65025
d. 65279
Answer. d
68. What is content of accumulator of 8085 microprocessor after the execution of
XRI F0 H instruction?
a. Only the upper nibble of accumulator is complemented
b. Only the lower nibble is complemented
c. Only the upper nibble is reset to zero
d. Only the lower nibble is reset to zero
Answer. a
69. The 8085 programming manual says that it takes seven T states to fetch and
execute the MOV instruction. If the system clock has a frequency of 2.5 MHz, how
long is an instruction Cycle?
a. 2.8 s
b. 2.5ns
c. 2.8 ns
d. 2.8 μs
Answer. d
70. The instruction PCHL, in 8085 is used for
a. STA address
b. LDAX B
c. LHLD address
d. LDA address
Answer. a
72. The instruction that exchanges top of stack with HL pair is
a. XTHL
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
b. SPHL
c. PUSH H
d. POP H
Answer. a
73. In 8085 microprocessor, during PUSH PSW Operation, Stack pointer is
a. Decremented by one
b. Decremented by two
c. Incremented by one
d. Incremented by two
Answer. b
74. While a program is being executed in an Intel 8085 microprocessor, the
program counter of the microprocessor contains:
a. The memory address of the instruction that is being currently executed.
b. The memory address of the instruction that is to be executed next.
c. The number of instructions that have already been executed.
d. The total number of instructions in the current program still to be
executed.
Answer. b
75. The description of a program counter (PC) in 8085 microprocessor is
a. An up/down counter
b. An 8-bit register
c. Initialized automatically by microprocessor
d. Used to point to stack memory area
Answer. c
76. If the status of the control lines SI and SO is LOW, then 8085 microprocessor
is performing
a. Reset operation
b. HOLD operation
c. Halt operation
d. Interrupt acknowledge
Answer. c
77. LXI SP, 7FFF H
MVI A, 25 H
XRI 02 H
PUSH PSW
POP H
MOV A,L
ORI 10 H
HLT
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
What are the contents of A, H, L, SP and PSW registers after executing the above
set of instructions? Assume undefined flags always remain clear.
a. 10H, 25H, 00H, 7FFFH, 00H respectively
b. 14H, 27H, 04H, 7FFFH, 04H respectively
c. 14H, 25H, 00H. 7FFFH, 04H respectively
d. 10H, 27H, 04H, 7FFFH, 00H respectively
Answer. b
78. The content of the programme counter of an 8085 microprocessor is
a. the total number of instructions in the program already executed.
a. ADI
b. ACI
c. ADC
d. ADD
Answer. b
80. MVI A, AA H
ORI FFH
RRC
RRC
CMC
INR A
What are the contents of A and PSW registers after executing the above set of
instructions in sequence?
a. AAH and 00H
b. FFH and 66H
c. 00H and 54H
d. 00H and 00H
Answer. c
81. For which one of the following, the instruction XRA A in 8085 microprocessor
can be used?
a. Set the carry flag
b. Set the zero flag
c. Reset the carry flag and clear the accumulator
d. Transfer FFH to the accumulator
Answer. b
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
Answer. b
85. When the operand requires for instruction is stored inside the processor, then
What this addressing mode is called?
a. Direct
b. Register
c. Implicit
d. Immediate
Answer. b
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
86. Which one of the following addressing technique is not used in 8085
microprocessor?
a. Register
b. Immediate
c. Register indirect
d. Relative
Answer. d
87. In an instruction of 8085 microprocessor, how many bytes are present?
a. One or two
b. One, two or three
c. One only
d. Two or three
Answer. b
88. Which one is the indirect addressing mode in the following instructions?
a. LXI H 2050 H
b. MOV A, B
c. LDAX B
d. LDA 2050 H
Answer. c
89. The addressing mode used in the instruction JMP F347 H in case of an Intel
8085A microprocessor is which one of the following?
a. Direct
b. Register—indirect
c. Implicit
d. Immediate
Answer. d
90. Carry flag is not affected after the execution of
a. ADD B
b. SBB B
c. INR B
d. ORA B
Answer. c
91. The contents of the Program Counter (PC), when the microprocessor is
reading from 2FFF H memory location, will be
a. 2FFE H
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
b. 2FFF H
c. 3000 H
d. 3001 H
Answer. c
92. If the HLT instruction of an Intel 8085A microprocessor is executed
a. the microprocessor is disconnected from the system bus till the RESET is
pressed.
b. the microprocessor halts the execution of the program and returns to the
monitor.
c. the microprocessor enters into a HALT state and the buses are tri-stated.
d. the microprocessor reloads the program counter from the locations 0024 H
and 0025 H.
Answer. c
93. The stack pointer of an 8085 A microprocessor contains ABCD H.
PUSH PSW
XTHL
PUSH D
JMP EC75 H
At the end of the execution of the above instructions, what would be the content
of the stack pointer?
a. ABCB H
b. ABCA H
c. ABC9 H
d. ABC8 H
Answer. c
94. In an Intel 8085 A, what is the content of the Instruction Register (IR)?
Answer. c
96. Which one of the following statement does not describe
property/characteristic of a stack pointer register in 8085 microprocessor?
a. MVI A
b. LDAX B
c. JMP 2050 H
d. MOV A,M
Answer. c
98. In 8085, the DAA instruction is used for
UNIT-4
ANS: B
ANS: C
ANS: C
4) How many memory locations are required to store the instruction LXIH,
0800H in an 8085 assembly language program?
A) 1
B) 2
C) 3
D) 4
ANS: B
ANS: A
6) In 8085 microprocessor, the value of the most significant bit of the result
following the execution of any arithmetic or Boolean instruction is stored in
the
A) carry status flag
B) auxiliary carry status flag
C) sign status flag
D) zero status flag
ANS: C
ANS: B
ANS: C
Answer: c
Clarification: An assembler is a software used to convert the programs into
machine instructions.
12) The instructions like MOV or ADD are called as ______
a) OP-Code
b) Operators
c) Commands
d) None of the mentioned
Answer: a
Clarification: This OP – codes tell the system what operation to perform on the
operands.
13) The alternate way of writing the instruction, ADD #5,R1 is ______
a) ADD [5],[R1];
b) ADDI 5,R1;
c) ADDIME 5,[R1];
d) There is no other way
Answer: b
Clarification: The ADDI instruction, means the addition is in immediate
addressing mode.
14) Instructions which won’t appear in the object program are called as
_____
a) Redundant instructions
b) Exceptions
c) Comments
d) Assembler Directives
Answer: d
Clarification: The directives help the program in getting compiled and hence
won’t be there in the object code.
15) The assembler directive EQU, when used in the instruction: Sum EQU
200 does ________
a) Finds the first occurrence of Sum and assigns value 200 to it
b) Replaces every occurrence of Sum with 200
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
Answer: b
Clarification: This basically is used to replace the variable with a constant value.
16) The purpose of the ORIGIN directive is __________
a) To indicate the starting position in memory, where the program block is
to be stored
b) To indicate the starting of the computation code
c) To indicate the purpose of the code
d) To list the locations of all the registers used
Answer: a
Clarification: This does the function similar to the main statement.
17) The directive used to perform initialization before the execution of
the code is ______
a) Reserve
b) Store
c) Dataword
d) EQU
Answer: c
Clarification: None.
18) _____ directive is used to specify and assign the memory required for
the block of code.
a) Allocate
b) Assign
c) Set
d) Reserve
Answer: d
Clarification: This instruction is used to allocate a block of memory and to store
the object code of the program there.
19) _____ directive specifies the end of execution of a program.
a) End
b) Return
c) Stop
d) Terminate
Answer: b
Clarification: This instruction directive is used to terminate the program
execution.
20) The last statement of the source program should be _______
a) Stop
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
b) Return
c) OP
d) End
Answer: d
Clarification: This enables the processor to load some other process.
21) When dealing with the branching code the assembler ___________
a) Replaces the target with its address
b) Does not replace until the test condition is satisfied
c) Finds the Branch offset and replaces the Branch target with it
d) Replaces the target with the value specified by the DATAWORD directive
Answer: c
Clarification: When the assembler comes across the branch code, it immediately
finds the branch offset and replaces it with it.
22) The assembler stores all the names and their corresponding values in
______
a) Special purpose Register
b) Symbol Table
c) Value map Set
d) None of the mentioned
Answer: b
Clarification: The table where the assembler stores the variable names along with
their corresponding memory locations and values.
23) The assembler stores the object code in ______
a) Main memory
b) Cache
c) RAM
d) Magnetic disk
Answer: d
Clarification: After compiling the object code, the assembler stores it in the
magnetic disk and waits for further execution.
24) The utility program used to bring the object code into memory for
execution is ______
a) Loader
b) Fetcher
c) Extractor
d) Linker
Answer: a
Clarification: The program is used to load the program into memory.
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
Answer: d
Clarification: This creates entries into the symbol table first and then creates the
object code.
26) In 8085 microprocessor, the address for ‘TRAP’ interrupt is
a. 0024 H
b. 002C H
c. 0034 H
d. 003C H
Answer. a
27) A ‘DAD H” instruction is the same as shifting each bit by one position
to the
a. left
b. right
c. left with a zero inserted in LSB position
d. right with a zero inserted in LSB position
Answer. c
28) When a program is being executed in an 8085 microprocessor, its
program counter contains
a. the memory address as the instruction that is to be executed next.
b. the memory address of the instruction that is being currently matched.
c. the total number of instructions in the program being executed.
d. the number of instructions in the current program that have already been
executed.
Answer. a
29) Which of the following data transfer is not possible in
microprocessor?
a. Memory to accumulator
b. Accumulator to memory
c. Memory to memory
d. I/O device to accumulator
Answer. c
30) LOADER is a program that
a. loads the memories and generates a hex file
b. loads the hex file and converts to the executable file
c. loads the COM file and generates the binary code
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
a. 20 H
b. 02 H
c. 00 H
d. FF H
Answer. c
40) The difference between 8085 instructions RST n and PCHL is
a. RST n is equivalent to a sub-routine call while PCHL is equivalent to
unconditional branch.
b. RST n uses direct addressing while PCHL uses register indirect addressing.
c. RST n is a software interrupt while PCHL simulates a hardware interrupt
d. RST n resets the processor while PCHL restarts the processor.
Answer. a
41) The content of accumulator are 70 H. Initially all flags are zero. What
will be values of CY and S after executing instruction RLC?
a. CY = 0 and S = 0
b. CY = 1 and S = 1
c. CY = 1 and S = 0
d. CY = 0 and S = 1
Answer. d
42) A software delay subroutine is written as given below:
DELAY: MVI H, 255D H
MVI L, 255D H
LOOP: DCR L
JNZ LOOP
DCR H
JNZ LOOP
How many times DCR instruction will be executed?
a. 255
b. 510
c. 65025
d. 65279
Answer. d
43) What is content of accumulator of 8085 microprocessor after the
execution of XRI F0 H instruction?
a. Only the upper nibble of accumulator is complemented
b. Only the lower nibble is complemented
c. Only the upper nibble is reset to zero
d. Only the lower nibble is reset to zero
Answer. a
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
44) The 8085 programming manual says that it takes seven T states to
fetch and execute the MOV instruction. If the system clock has a frequency
of 2.5 MHz, how long is an instruction Cycle?
a. 2.8 s
b. 2.5ns
c. 2.8 ns
d. 2.8 μs
Answer. d
45) The instruction PCHL, in 8085 is used for
a. STA address
b. LDAX B
c. LHLD address
d. LDA address
Answer. a
47) The instruction that exchanges top of stack with HL pair is
a. XTHL
b. SPHL
c. PUSH H
d. POP H
Answer. a
48) In 8085 microprocessor, during PUSH PSW Operation, Stack pointer
is
a. Decremented by one
b. Decremented by two
c. Incremented by one
d. Incremented by two
Answer. b
49) While a program is being executed in an Intel 8085 microprocessor,
the program counter of the microprocessor contains:
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
UNIT-5
1. The block of 8237 that decodes the various commands given to the 8237 by the
CPU is
a) timing and control block
b) program command control block
c) priority block
d) none of the mentioned
Answer: b
Explanation: The program control block decodes various commands given to the
8237 by the CPU before servicing a DMA request.
2. The priority between the DMA channels requesting the services can be
resolved by
a) timing and control block
b) program command control block
c) priority block
d) none of the mentioned
Answer: c
Explanation: The priority encoder block resolves the priority between the DMA
channels requesting the services.
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
Answer: b
Explanation: The current address register holds the current memory address. The
current address register is accessed during the DMA transfer.
4. The register that holds the data byte transfers to be carried out is
a) current word register
b) current address register
c) base address register
d) command register
Answer: a
Explanation: The current word register is a 16-bit register that holds the data
transfers. The word count is decremented after each transfer, and the new value
is stored again in the register.
5. When the count becomes zero in the current word register then
a) Input signal is enabled
b) Output signal is enabled
c) EOP (end of process) is generated
d) Start of process is generated
Answer: c
Explanation: When the count becomes zero, the EOP signal is generated. This can
be written in successive bytes by the CPU, in program mode.
Answer: c
Explanation: The contents of base address register cannot be read by the CPU.
These contents are used internally for auto-initialization.
8. The register that maintains an original copy of the respective initial current
address register and current word register is
a) mode register
b) base address register
c) command register
d) mask register
Answer: b
Explanation: The base address register maintains an original copy of the current
address register and current word register, before incrementing or
decrementing.
Answer: d
Explanation: The address is automatically incremented or decremented after
each DMA transfer, and the resulting address value is again stored in the current
address register.
Answer: d
Explanation: Memory read, memory write and verify transfer are the three types
of DMA transfer.
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
a. 24
b. 20
c. 32
d. 40
Answer: d. 40
Question 2: In which mode do all the Ports of the 8255 PPI work as Input-Output
units for data transfer?
a. BSR mode
b. Mode 0 of I/O mode
c. Mode 1 of I/O mode
d. Mode 2 of I/O mode
Question 3: Which of the following pins are responsible for handling the on the
Read Write control logic unit of the 8255 PPI?
a. CS'
b. RD'
c. WR'
d. ALL of the above
a. BSR mode
b. Mode 0 of I/O mode
c. Mode 1 of I/O mode
d. Mode 2 of I/O mode
Question 5: How many bits of data can be transferred between the 8255 PPI and
the interfaced device at a time? or What is the size of internal bus of the 8255
PPI?
a. 16 bits
b. 12 bits
c. 8 bits
d. None of the above
Answer: c. 8 bits
Question 6: Which port of the 8255 PPI is capable of performing the handshaking
function with the interfaced devices?
a. Port A
b. Port B
c. Port C
d. All of the above
Answer: c. Port C
Question 7: In which of the following modes of the 8255 PPI, only port C is taken
into consideration?
a. BSR mode
b. Mode 0 of I/O mode
c. Mode 1 of I/O mode
d. Mode 2 of I/O mode
Question 8: In mode 2 of I/O mode, which of the following ports are capable of
transferring the data in both the directions?
a. Port A
b. Port B
c. Port C
d. All of the above
Answer: a. Port A
Question 9: In which of the following modes we do not consider the D6, D5 and
D4 bits of the control word?
a. BSR mode
b. Mode 0 of I/O mode
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
Question 10: How many data lines in total are there in the 8255 PPI IC?
a. 8 data lines
b. 32 data lines
c. 24 data lines
d. None of the above
1. The number of counters that are present in the programmable timer device
8254 is
a) 1
b) 2
c) 3
d) 4
Answer: c
Explanation: There are three counters that can be used as either counters or
delay generators.
Answer: b
Explanation: The control word register can only be written and cannot be read.
3. The mode that is used to interrupt the processor by setting a suitable terminal
count is
a) mode 0
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
b) mode 1
c) mode 2
d) mode 3
Answer: a
Explanation: Mode 0 is also called as an interrupt on the terminal count.
4. In mode 2, if N is loaded as the count value, then after (N-1) cycles, the output
becomes low for
a) 1 clock cycle
b) 2 clock cycles
c) 3 clock cycles
d) 4 clock cycles
Answer: a
Explanation: After (N-1) cycles, the output becomes low for only 1 clockcycle. If
the count N is reloaded and again the output becomes high and remains so for (N-
1) clock pulses.
Answer: c
Explanation: When the count N loaded is even, then for half of the count, the
output remains high and for the remaining half it remains low. If the count loaded
is odd, the first clock pulse decrements it by 1 resulting in an even count value.
6. In control word register, if SC1=0 and SC0=1, then the counter selected is
a) counter 0
b) counter 1
c) counter 2
d) none
Answer: b
Explanation: SC denotes select counter.
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
Answer: c
Explanation: To access 16 bit, first LSB is loaded first, and then MSB.
Answer: b
Explanation: If BCD=0 then hexadecimal count. If BCD=1, then the operation is
BCD count.
Answer: b
Explanation: If the GATE signal is enabled, then the counter starts counting.
Answer: d
Explanation: The control word register contents are used for
i) initializing the operating modes (mode 0-mode 4)
ii) selection of counters (counter0-counter2)
iii) choosing binary or BCD counters
iv) loading of the counter registers.
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
Answer: c
Explanation: The processor 8085 has five hardware interrupt pins. Out of these
five, four pins were alloted fixed vector addresses but the pin INTR was not
alloted by vector address, rather an external device was supposed to hand over
the type of the interrupt to the microprocessor.
2. The register that stores all the interrupt requests in it in order to serve them
one by one on a priority basis is
a) Interrupt Request Register
b) In-Service Register
c) Priority resolver
d) Interrupt Mask Register
Answer: a
Explanation: The interrupts at IRQ input lines are handled by Interrupt Request
Register internally.
3. The register that stores the bits required to mask the interrupt inputs is
a) In-service register
b) Priority resolver
c) Interrupt Mask register
d) None
Answer: c
Explanation: Also, Interrupt Mask Register operates on IRR(Interrupt Request
Register) at the direction of the Priority Resolver.
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
Answer: d
Explanation: The interrupt control logic performs all the operations that are
involved within the interrupts like accepting and managing interrupt
acknowledge signals, interrupts.
Answer: d
Explanation: A single 8259A provides 8 vectored interrupts. In cascade mode, 64
vectored interrupts can be provided.
6. When the PS(active low)/EN(active low) pin of 8259A used in buffered mode,
then it can be used as a
a) input to designate chip is master or slave
b) buffer enable
c) buffer disable
d) none
Answer: b
Explanation: When the pin is used in buffered mode, then it can be used as a
buffer enable to control buffer transreceivers. If it is not used in buffered mode,
then the pin is used as input to designate whether the chip is used as a master or
a slave.
Answer: d
Explanation: The initialization procedure involves
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
Answer: b
Explanation: When non-specific EOI command is issued to 8259A it will
automatically reset the highest ISR.
9. In the application where all the interrupting devices are of equal priority, the
mode used is
a) Automatic rotation
b) Automatic EOI mode
c) Specific rotation
d) EOI
Answer: a
Explanation: The automatic rotation is used in the applications where all the
interrupting devices are of equal priority.
Answer: c
Explanation: Basically, there are three modes of data transmission. simplex,
duplex and half duplex.
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
Answer: a
Explanation: In simplex mode, the data transmission is unidirectional. For
example, a CPU may transmit data for a CRT display unit in this mode.
3. If the data transmission takes place in either direction, but at a time data may
be transmitted only in one direction then, it is of
a) simplex mode
b) duplex mode
c) semi duplex mode
d) half duplex mode
Answer: d
Explanation: In half duplex mode, data transmission is bidirectional but not at a
time. For example, Walkie-Talkie.
4. In 8251A, the pin that controls the rate at which the character is to be
transmitted is
a) TXC(active low)
b) TXC(active high)
c) TXD(active low)
d) RXC(active low)
Answer: a
Explanation: Transmitter Clock Input (TXC(active low)) is a pin that controls the
rate at which the character is to be transmitted.
Answer: d
Explanation: Transmitted Data Output pin carries a serial stream of the
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
transmitted data bits along with other information like start bits, stop bits and
parity bits etc.
6. The signal that may be used either to interrupt the CPU or polled by the CPU is
a) TXRDY(Transmitter ready)
b) RXRDY(Receiver ready output)
c) DSR(active low)
d) DTR(active low)
Answer: b
Explanation: RXRDY(Receiver ready output) may be used either to interrupt the
CPU or polled by the CPU.
Answer: d
Explanation: RS232C has been used for long and has a few disadvantages like
limited speed of communication, high-voltage level signaling and big-size
communication adapters.
Answer: d
Explanation: The USB standards support the signaling rates. Also, USB signaling is
implemented in a differential in low- and full-speed options.
9. The bit packet that commands the device either to receive data or transmit
data in transmission of USB asynchronous communication is
a) Handshake packet
b) Token packet
c) PRE packet
d) Data packet
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
Answer: b
Explanation: The token packet is the second type of packet which commands the
device either to receive data or transmit data.
Answer: c
Explanation: PRE packets are only of importance to low-speed USB devices.
→Telegram Channel
→Telegram Group
→Telegram Channel
→Telegram Group
1. A microcontroller at-least should consist of:
3. What is the order decided by a processor or the CPU of a controller to execute an instruction?
a) decode,fetch,execute
b) execute,fetch,decode
c) fetch,execute,decode
d) fetch,decode,execute
Answer: d
Explanation: First instruction is fetched from Program Memory. After fetching, instruction is decoded to generate co
ntrol signals to perform the intended task. After decoding, instruction is executed and the complete intended task of t
hat particular instruction.
a) Data Bus
b) ALU
c) Control Bus
d) Address Bus
Answer: b
Explanation: If we say a microcontroller is 8-bit it means that it is capable of processing 8-bit data at a time. Data pr
ocessing is the task of ALU and if ALU is able to process 8-bit data then the data bus should be 8-bit wide. In most
books it tells that size of data bus but to be precise it is the size of ALU because in Harvard Architecture there are tw
o sets of data bus which can be of same size but it is not mandatory.
5. How are the performance and the computer capability affected by increasing its internal bus width?
7. Give the names of the buses present in a controller for transferring data from one place to another?
8. What is the file extension that is loaded in a microcontroller for executing any instruction?
a) .doc
b) .c
c) .txt
d) .hex
Answer: d
Explanation: Microcontrollers are loaded with .hex extension as they understand the language of 0’s and 1’s only.
9. What is the most appropriate criterion for choosing the right microcontroller of our choice?
a) speed
b) availability
c) ease with the product
d) all of the mentioned
Answer: d
Explanation: For choosing the right microcontroller for our product we must consider its speed so that the instructio
ns may be executed in the least possible time. It also depends on the availability so that the particular product may b
e available in our neighboring regions or market in our need. It also depends on the compatibility with the product s
o that the best results may be obtained.
1. How many types of architectures are available, for designing a device that is able to work on its own?
a) 3
b) 2
c) 1
d) 4
Answer: b
Explanation: There are basically two main types of architectures present, they are Von Neumann and Harvard archit
ectures.
a) Harvard architecture
b) Von Neumann architecture
c) None of the mentioned
d) All of the mentioned
Answer: b
Explanation: General purpose microprocessors make use of Von Neumann architecture as here a simpler design is of
fered.
3. Which architecture involves both the volatile and the non volatile memory?
a) Harvard architecture
b) Von Neumann architecture
c) None of the mentioned
d) All of the mentioned
Answer: a
Explanation: In Harvard architecture, both the volatile and the non volatile memories are involved. This is done to in
crease its efficiency as both the memories are being used over here.
4. Which architecture provides separate buses for program and data memory?
a) Harvard architecture
b) Von Neumann architecture
c) None of the mentioned
d) All of the mentioned
Answer: a
Explanation: Harvard Architecture provides separated buses for data and program memory to fetch program and dat
a simultaneously. By doing this access time is reduced and hence performance is increased.
a) ARM7
b) Pentium
c) SHARC
d) All of the mentioned
Answer: c
Explanation: SHARC supports harvard architecture for signal processing in DSP.
a) ARM7
b) ARM9
c) SHARC
d) None of the mentioned
Answer: c
Explanation: SHARC supports both the CISC and the Harvard architecture.
a) Harvard
b) Von Neumann
c) Harvard & Von Neumann
d) None of the mentioned
Answer: b
Explanation: As only one memory is present in the Von Neumann architecture so it saves a lot of memory.
a) Atmel
b) Philips
c) Intel
d) All of the mentioned
Answer: d
Explanation: 8051 microcontrollers are manufactured by Intel, Atmel, Philips/Signetics, Infineon, Dallas Semi/Maxi
m.
a) 128 bytes
b) 256 bytes
c) 64 bytes
d) 512 bytes
Answer: a
Explanation: It has 128 bytes of RAM in it.
a) 2
b) 3
c) 1
d) 0
Answer: a
Explanation: It has two 16 bit registers DPTR and PC.
a) PSW
b) SP
c) PC
d) None of the mentioned
Answer: c
Explanation: When 8051 wakes up, Program Counter (P
c) loaded with 0000H. Because of this in 8051 first opcode is stored in ROM address at 0000H.
5. When the microcontroller executes some arithmetic operations, then the flag bits of which register are affected?
a) PSW
b) SP
c) DPTR
d) PC
Answer: a
Explanation: It stands for program status word. It consists of carry, auxiliary carry, overflow, parity, register bank se
lect bits etc which are affected during such operations.
6. How are the status of the carry, auxiliary carry and parity flag affected if the write instruction
a) CY=0,AC=0,P=0
b) CY=1,AC=1,P=0
c) CY=0,AC=1,P=0
d) CY=1,AC=1,P=1
Answer: b
Explanation: On adding 9C and 64, a carry is generated from D3 and from the D7 bit so CY and AC are set to 1. In t
he result, the number of 1’s present are even so parity flag is set to zero.
7. How are the bits of the register PSW affected if we select Bank2 of 8051?
9. On power up, the 8051 uses which RAM locations for register R0- R7
a) 00-2F
b) 00-07
c) 00-7F
d) 00-0F
Answer: b
Explanation: On power up register bank 0 is selected which has memory address from 00H-07H.
10. How many bytes of bit addressable memory is present in 8051 based microcontrollers?
a) 8 bytes
b) 32 bytes
c) 16 bytes
d) 128 bytes
Answer: c
Explanation: 8051 microcontrollers have 16 bytes of bit addressable memory.
a) 2
b) 3
c) 1
d) Can’t be determined
Answer: a
Explanation: DJNZ is 2-byte instruction. This means jump can be of -128 to +127 locations with respect to PC. Here
-128 means upward or backward jump and +127 means downward or forward jump.
a) DPTR
b) B
c) A
d) PSW
Answer: c
Explanation: JZ and JNZ instructions checked the content of A register and if condition was satisfied or true then ju
mp to target address.
3. Calculate the jump code for again and here if code starts at 0000H
a) F3,02
b) F9,01
c) E9,01
d) E3,02
Answer: c
Explanation: Loop address is calculated by subtracting destination address and the address next to the source address
.
4. When the call instruction is executed the topmost element of stack comes out to be
a) 2 bytes
b) 4 bytes
c) 3 bytes
d) 1 byte
Answer: c
Explanation: LCALL instruction moves the pointer to a 16 bit address so it is a 3 byte instruction.
a) yes
b) no
c) none of the mentioned
d) cant be determined
Answer: b
Explanation: PUSH and POP instructions are not CALL instructions because in POP and PUSH instructions the poi
nter does not move to any location specified by its address which is the fundamental of CALL instruction, so it is no
t a type of CALL instruction.
7. What is the time taken by one machine cycle if crystal frequency is 20MHz?
a) yes
b) no
c) cant be determined
d) yes and the second one is preferred
Answer: b
Explanation: In the first statement, when the decrements approach zero then the jump moves back and in the second
statement, when the result after decrements is not zero, then it jumps back.
a) 0xFF
b) 0x00
c) 0x01
d) A port is by default an output port
Answer: d
Explanation: In 8051, a port is initialized by default in its output mode no need to pass any value to it.
2. Which out of the four ports of 8051 needs a pull-up resistor for using it is as an input or an output port?
a) PORT 0
b) PORT 1
c) PORT 2
d) PORT 3
Answer: a
Explanation: These pins are the open drain pins of the controller which means it needs a pull-up resistor for using it
as an input or an output ports.
3. Which of the ports act as the 16 bit address lines for transferring data through it?
a) SCON
b) PCON
c) A
d) PSW
Answer: b
Explanation: PCON register is not a bit addressable register.
a) MOV A,P0
b) ADD A,#05H
c) JNB PO.0, label
d) CLR P0.05H
Answer: b
Explanation: JNB which stands for Jump if no bit checks the status of the bit P0.0 and jumps if the bit is 0.
6. Which addressing mode is used in pushing or popping any element on or from the stack?
a) immediate
b) direct
c) indirect
d) register
Answer: c
Explanation: If we want to push or pop any element on or from the stack then direct addressing mode has to be used
in it, as the other way is not accepted.
7. Which operator is the most important while assigning any instruction as register indirect instruction?
a) $
b) #
c) @
d) &
Answer: b
Explanation: In register, indirect mode data is copied at that location where R0 or R1 are present, so @ operator is u
sed ex. MOV @R0,A
a) MOVX A, @DPTR
b) MOVC @A+DPTR,A
c) MOV A,R0
d) MOV @R0,A
Answer: b
Explanation: Indexed addressing mode stands for that instruction where the bits of the accumulator is also indexed w
ith the 16 bit registers.
1. When we add two numbers the destination address must always be.
a) R4+A
b) R4-A
c) A-R4
d) R4+A
Answer: c
Explanation: SUBB command subtracts with borrow the contents of an accumulator with that of the register or some
immediate value. So A-R4 is being executed.
a) CY=0,AC=1
b) CY=1,AC=1
c) CY=0,AC=0
d) no relation with AC and CY
Answer: c
Explanation: When we divide two numbers then AC and CY become zero.
a) OV
b) CY
c) AC
d) PSW
Answer: b
Explanation: If unsigned numbers operations are involved, then the status of CY flag is important and in signed num
ber operation the status of OV flag is important.
a) ANL
b) ORL
c) XRL
d) All of the mentioned
Answer: d
Explanation: These instructions are the arithmetic operations and the flags are affected by the data copy instructions,
so all these instructions don’t affect the bits of the flag.
a) the pointer to jump if the values of the destination and the source address are equal
b) sets CY=1, if the contents of the destination register are greater then that of the source register
c) sets CY=0, if the contents of the destination register are smaller then that of the source register
d) none of the mentioned
Answer: d
Explanation: In CJNE command, the pointer jumps if the values of the two registers are not equal and it resets CY if
the destination address is larger then the source address and sets CY if the destination address is smaller then the so
urce address.
a) accumulator as the destination address and any register, memory or any immediate data as the source address
b) accumulator as the destination address and any immediate data as the source address
c) any register as the destination address and accumulator, memory or any immediate data as the source address
d) any register as the destination address and any immediate data as the source address
Answer: a
Explanation: These commands have accumulator as the destination address and any register, memory or any immedi
ate data as the source address.
a) some external crystal applied to the micro-controller for executing the timer
b) from the crystal applied to the micro-controller
c) through the software
d) through programming
Answer: b
Explanation: Timer’s clock source is the crystal that is applied to the controller.
2. What is the frequency of the clock that is being used as the clock source for the timer?
4. What is the maximum delay that can be generated with the crystal frequency of 22MHz?
a) 2978.9 sec
b) 0.011 msec
c) 11.63 sec
d) 2.97 msec
Answer: d
Explanation: For generating the maximum delay we have to multiply the maximum number of counts with the time
period required to execute one machine cycle( 65536*1/22MHz).
a) Mode 0
b) Mode 1
c) Mode 2
d) Mode 3
Answer: c
Explanation: Auto reload is allowed in the Mode 2 of the timer because here in this mode, we don’t need to load the
count again and again in the register.
6. Find out the roll over value for the timer in Mode 0, Mode 1 and Mode 2?
a) 00FFH,0FFFH,FFFFH
b) 1FFFH,0FFFH,FFFFH
c) 1FFFH,FFFFH,00FFH
d) 1FFFH,00FFH,FFFFH
Answer: c
Explanation: For Mode 0 13 bit value is used so 1FFFH is chosen to be the roll over value. Similarly for Mode 1 FF
FFH and for Mode 2 FFH is the roll over value for the timers and counter.
a) load the count, start the timer, keep monitoring it, stop the timer
b) load the TMOD register, load the count, start the timer, keep monitoring it, stop the timer
c) load the TMOD register, start the timer, load the count, keep monitoring it, stop the timer
d) none of the mentioned
Answer: b
Explanation: When any timer is to turn on, then firstly we have to load the TMOD register and the count. Then the ti
mer is to get started. After then, we need to monitor the timer properly and then when the roll over condition arises t
hen the timer is to be stopped.
8. If Timer 0 is to be used as a counter, then at what particular pin clock pulse need to be applied?
a) P3.3
b) P3.4
c) P3.5
d) P3.6
Answer: b
Explanation: If Timer 0 is to be used as a counter, then a pulse has to be applied at P3.4 and if it is for Timer 1 then t
he clock pulse has to be applied at the pin P3.5.
9. In the instruction “MOV TH1,#-3”, what is the value that is being loaded in the TH1 register?
a) 0xFCH
b) 0xFBH
c) 0xFDH
d) 0xFEH
Answer: c
Explanation: Negative value is loaded in 2’s complement form. -3 represented in 2’s complement form as FDH.
a) TMOD
b) SCON
c) TCON
d) SMOD
Answer: c
Explanation: All of these bits are part of TCON (Timer Control) register. TF0 and TF1 are used to check overflow o
f timer 0 and timer 1 respectively. TR0 and TR1 are timer control bits used to start and stop of timer 0 and timer 1 re
spectively.
1. Which devices are specifically being used for converting serial to parallel and from parallel to serial respectively?
a) timers
b) counters
c) registers
d) serial communication
Answer: c
Explanation: Some registers like the parallel in serial out and serial in parallel out are used to convert serial data into
parallel and vice versa respectively.
a) they are the names of the same particular thing, just the difference of A and S is there in it
b) one uses asynchronous means of communication and the other uses synchronous means of communication
c) one uses asynchronous means of communication and the other uses asynchronous and synchronous means of com
munication
d) one uses angular means of the communication and the other uses linear means of communication
Answer: c
Explanation: UART stands for Universal Asynchronous receiver-transmitter and USART stands for Universal Sync
hronous and Asynchronous receiver-transmitter.
3. Which of the following best describes the use of framing in asynchronous means of communication?
a) RTS
b) DTR
c) RTS & DTR
d) None of the mentioned
Answer: a
Explanation: RTS is a request to send control signal which is a control for the flow of data. On the other hand DTR i
s a Data Terminal Ready control signal which tells about the current status of the DTE.
a) no data transmission
b) no MAX232
c) the RxD of one is the TxD for the other
d) no serial communication
Answer: c
Explanation: In null modem connection the RxD of one is the TxD for the other.
7. Which of the following best states the reason that why baud rate is mentioned in serial communication?
8. With what frequency UART operates( where f denoted the crystal frequency )?
a) f/12
b) f/32
c) f/144
d) f/384
Answer: d
Explanation: UART frequency is the crystal frequency f/12 divided by 32, that comes out to be f/384.
1. When an interrupt is enabled, then where does the pointer moves immediately after this interrupt has occurred?
2. What are the contents of the IE register, when the interrupt of the memory location 0x00 is caused?
a) 0xFFH
b) 0x00H
c) 0x10H
d) 0xF0H
Answer: b
Explanation: When interrupt of 0x00 is caused (the reset interrupt) then all the other interrupts will be disabled or th
e contents of the IE register becomes null.
3. After RETI instruction is executed then the pointer will move to which location in the program?
a) pin no 10
b) pin no 11
c) pin no 12
d) pin no 13
Answer: c
Explanation: INT0 interrupt is caused when pin no 12 in the hardware of the 8051 controller is enabled with a low le
veled pulse.
a) IE.D5
b) IE.D2
c) IE.D3
d) IE.D4
Answer: d
Explanation: IE.D4 is used to enable RS interrupt or the serial communication interrupt.
6. Which of the following combination is the best to enable the external hardware interrupt 0 of the IE register (assu
ming initially all bits of the IE register are zero)?
a) EX0=1
b) EA=1
c) any of the mentioned
d) EX0=1 & EA=1
Answer: d
Explanation: For executing the EX0 interrupt, the EX0 and EA bits of the IE register should be set. EA is set to enab
le all the interrupts and EX0 is set to enable the external hardware interrupt 0 interrupt and mask the other enabled in
terrupts.
7. Why normally LJMP instructions are the topmost lines of the ISR?
a) so as to jump to some other location where there is a wider space of memory available to write the codes
b) so as to avoid overwriting of other interrupt instructions
c) all of the mentioned
d) none of the mentioned
Answer: c
Explanation: There is a small space of memory present in the vector table between two different interrupts so in orde
r to avoid overwriting of other interrupts we normally jump to other locations where a wide range of space is availab
le.
8. Which register is used to make the interrupt level or an edge triggered pulse?
a) TCON
b) IE
c) IPR
d) SCON
Answer: a
Explanation: TCON register is used to make any interrupt level or edge triggered.
10. What is the correct order of priority that is set after a controller gets reset?
1. How many rows and columns are present in a 16*2 alphanumeric LCD?
a) rows=2, columns=32
b) rows=16, columns=2
c) rows=16, columns=16
d) rows=2, columns=16
Answer: d
Explanation: 16*2 alphanumeric LCD has 2 rows and 16 columns.
a) pin no 1
b) pin no 2
c) pin no 3
d) pin no 4
Answer: c
Explanation: Pin no 3 is used for controlling the contrast of the LCD.
a) set
b) reset
c) set & reset
d) none of the mentioned
Answer: b
Explanation: For writing commands on an LCD, RS pin is reset.
5. Which command of an LCD is used to shift the entire display to the right?
a) 0x1C
b) 0x18
c) 0x05
d) 0x07
Answer: a
Explanation: 0x1C is used to shift the entire display to the right.
6. Which command is used to select the 2 lines and 5*7 matrix of an LCD?
a) 0x01
b) 0x06
c) 0x0e
d) 0x38
Answer: d
Explanation: 0x38 is used to select the 2 lines and 5*7 matrix of an LCD.
7. Which of the following step/s is/are correct for sending data to an LCD?
9. Which instruction is used to select the first row first column of an LCD?
a) 0x08
b) 0x0c
c) 0x80
d) 0xc0
Answer: c
Explanation: 0x80 is used to select the first row first column of an LCD.
a) input
b) output
c) input & output
d) none of the mentioned
Answer: a
Explanation: The RS pin is an input pin for an LCD.
1. Which of the following steps detects the key in a 4*4 keyboard matrix about the key that is being pressed?
a) masking of bits
b) ensuring that initially, all keys are open
c) checking that whether the key is actually pressed or not
d) all of the mentioned
Answer: d
Explanation: For detecting that whether the key is actually pressed or not, firstly this must be ensured that initially al
l the keys are closed. Then we need to mask the bits individually to detect that which key is pressed. Then we need t
o check that is the key actually pressed or not, by checking that whether the key pressed for a time more than 20 mic
ro seconds.
a) it masks the bit and then jumps to the label where ROW1 is written
b) it makes the value of the accumulator 0FH and then jumps at the address where ROW1 label is written
c) it compares the value of the accumulator with 0FH and jumps to the location where ROW1 label is there if the val
ue becomes equal
d) it compares the value of the accumulator with 0FH and jumps to the location where ROW1 label is there if the val
ue is not equal
Answer: d
Explanation: This particular command CJNE A,#00001111b, ROW1 compares the value of the accumulator with O
FH and jumps to ROW1 address if the value is not equal.
4. In reading the columns of a matrix, if no key is pressed we should get all in binary notation
a) 0
b) 1
c) F
d) 7
Answer: b
Explanation: If no key is pressed, then all the keys show 1 as they are all connected to power supply.
5. If we need to operate a key of a keyboard in an interrupt mode, then it will generate what kind of interrupt?
a) ES
b) EX0/EX1
c) T0/T1
d) RESET
Answer: b
Explanation: If a key is to operate in an interrupt mode then it will generate an external hardware interrupt.
a) its active high input used to inform ADC0804 to the end of conversion
b) its active low input used to inform ADC0804 to the end of conversion
c) its active low input used to inform ADC0804 to the start of conversion
d) its active high input used to inform ADC0804 to the start of conversion
Answer: c
Explanation: WR is active low input used to inform the ADC0804 to start the conversion process.
a) CLK IN pin used for External Clock Input or Internal Clock with external RC element
b) INTR pin tells about the end of the conversion
c) ADC0804 IC is an 8 bit parallel ADC in the family of the ADC0800 series
d) None of the mentioned
Answer: d
Explanation: CLK IN pin is used to tell about the conversion time, INTR pin tells about the end of the conversion an
d ADC0804 has a resolution of 8 bits only so all three statements are true.
a) select the analog channel, start the conversion, monitor the conversion, display the digital results
b) select the analog channel, activate the ALE signal (L to H pulse), start the conversion, monitor the conversion, rea
d the digital results
c) select the analog channel, activate the ALE signal (H to L pulse), start the conversion, monitor the conversion, rea
d the digital results
d) select the channel, start the conversion, end the conversion
Answer: b
Explanation: While programming the ADC0808/0809 IC firstly we need to select the channel from the A, B, C pins.
Then we need to activate the ALE signal, this is needed to latch the address. Then we start the conversion from the
WR pin. After monitoring the INTR pin we get to know about the end of the conversion. Then we activate the OE e
nable to read out data out of the ADC chip.
a) Vref
b) Vin
c) Vref/2 & Vin
d) None of the mentioned
Answer: a
Explanation: Step Size is calculated by formula Vref/(2n). As ADC0808/0809 8-bit ADC value of n=8. Therefore fo
rmula becomes Vref/(28) = Vref/256. If Vref = 5V then Step Size will be 5/256 i.e. 19.53mV.
a) ADC0804 has 8 bits and MAX1112 has 1 bit for data output
b) ADC0804 is used for adc and dac conversions whereas MAX1112 is used for serial data transmissions
c) ADC0804 has 32 bits and MAX1112 has 3 bit for data output
d) None of the mentioned
Answer: a
Explanation: ADC0804 is used for parallel ADC and MAX1112 is used for serial ADC.
1. A thermistor is a __________
a) sensor
b) adc
c) transducer
d) micro controller
Answer: c
Explanation: A thermistor is a device which is used to convert the temperature into electrical signals, so it acts as a tr
ansducer.
3. An electronic device which converts physical quantity or energy from one form to another is called ______
a) Sensor
b) Transistor
c) Transducer
d) Thyristor
Answer: c
Explanation: An electronic device that converts physical quantity or energy from one form to another is called Trans
ducer. Examples: Sensor, Speaker, Microphone, etc.
a) make the appropriate connections with the controller, ADC conversion, analyse the results
b) interface sensor with ADC and ADC with 8051
c) interface sensor with the MAX232, send now to microcontroller, analyse the results
d) none of the mentioned
Answer: b
Explanation: For interfacing a sensor with an 8051 microcontroller, we need ADC in between because output of sen
sor is analog and microcontroller works on digital signals only. So whatever signal generated by the sensor is conver
ted into its digital equivalent using ADC and equivalent digital signal is given to the microcontroller for processing.
a) 2
b) 1
c) 3
d) 4
Answer: c
Explanation: LM35 has 3 pins.
7. Why Vref is set of ADC0848 to 2.56 V if analog input is connected to the LM35?
a) to set the step size of the sampled input
b) to set the ground for the chip
c) to provide supply to the chip
d) all of the mentioned
Answer: a
Explanation: Vref is used to set the step size of the ADC conversion, if it is selected to 2.56 then the step size will be
selected to 10mV, so for every step increase of the analog voltage an increase of 10 mV will be there.
a) Input/Output
b) Analog to Digital
c) Digital to analog
d) None of the mentioned
Answer: a
Explanation: The 8255 is Input/Output (I/O) chip. It has three separate accessible ports. The 8255 chip is used to exp
and the I/O ports of microcontrollers.
a) RD
b) WR
c) D0-D7
d) All of the mentioned
Answer: d
Explanation: RD, WR, D0-D7 all are directly connected to the 8051 for telling the chip about the control signals and
also for transferring the data.
3. Find the control word for PA = out, PB = in, PCL = out, PCH = out (Mode0)?
a) 0x02H
b) 0x82H
c) 0x83H
d) 0x03H
Answer: b
Explanation: The value that is being loaded in the control word is 10000010b for PB as an input port and all others a
s the output ports being operated in mode0. The hex equivalent of 10000010b → 0x82H.
4. Which pins are used to select the ports and the control register?
a) CS
b) A1
c) A0
d) All of the mentioned
Answer: d
Explanation: CS pin is an active low input pin for 8255 and it is used for selecting a chip. A0 and A1 pins are used f
or select ports and the control register.
5. What is the value of the control register when RESET button is set to zero?
a) 0x00H
b) 0xFFH
c) 0x11H
d) value remains the same
Answer: d
Explanation: RESET is active-high signal input into the 8255 used to clear the control register. When RESET is acti
vated (i.e. set to high), all ports are initialized as input mode. Hence the value of the control register remains the sam
e as it is even when the RESET button is set to zero.
6. Why MOVX instruction is being used to access the ports of the 8255?
8. How many pins of the 8255 can be used as the I/O ports?
a) 8
b) 16
c) 24
d) 32
Answer: c
Explanation: There are 3 ports available in the 8255 so 24 pins are available for the I/O ports pins.
1. DS12887 is a ____________
a) Timer IC
b) Serial communication IC
c) RTC IC
d) Motor
Answer: c
Explanation: DS12887 is a real time clock that is widely used to provide accurate time and date for many application
s.
a) 14 bytes
b) 114 bytes
c) 128 bytes
d) 64 bytes
Answer: c
Explanation: DS12887 has 128 bytes of non-volatile RAM.
a) 9 bytes
b) 114 bytes
c) 128 bytes
d) 14 bytes
Answer: b
Explanation: DS12887 has 128 bytes of non-volatile RAM. Out of 128 bytes, 14 bytes of RAM for clock/calendar a
nd control registers, and another 114 bytes of RAM for general purpose data storage.
4. In DS12887, which bits of the Register A are used to turn on the oscillator?
a) D4
b) D5
c) D6
d) All of the mentioned
Answer: d
Explanation: In DS12887, D4-D6 bits of register A are used to turn on the oscillator. A specific value of 010 of D4-
D6 is desirable for turning on the oscillator.
5. In DS12887, which out of the following is correct about the SQW pin?
a) it is an output pin
b) it can provide up to 15 different square waves
c) the frequency of the square wave is set by the register A
d) all of the mentioned are correct
Answer: d
Explanation: In DS12887, SQW pin stands for SQuare Wave. It is an output pin that can provide us with 15 differen
t square waves. The frequency of the square wave is selected by programming register A.
7. In DS12887, what is the range of RAM addresses which are used to store the values of time, calendar and alarm d
ata?
a) 00-7FH
b) 00-09H
c) 0EH-7FH
d) 0A-0DH
Answer: b
Explanation: In DS12887, the first ten locations i.e. 00-09H are used to store the values of time, calendar and alarm
data.
a) Yes
b) No
c) Can’t be determined
d) None of the mentioned
Answer: a
Explanation: Yes, DS12887 has non-volatile RAM.
a) register A, register B
b) register B, register C
c) register C, register D
d) register D, register A
Answer: c
Explanation: Register C and D are the read only registers in the DS12887 found at memory locations 0C-0DH.
10. In DS12887, when the external source is turned-off, how does DS12887 get power to retain its data?
a) electromagnetic induction
b) motor control
c) switching
d) none of the mentioned
Answer: a
Explanation: Electromagnetic relays work on the principle of electromagnetic induction. It is used as a switch in ind
ustrial controls, automobile and appliances. It allows the isolation of the sections of a system with two different volt
age sources.
a) it is a driver
b) it is a thing isolated from the entire world
c) it is a device that can be used as an electromagnetic relay without a driver
d) none of the mentioned
Answer: c
Explanation: Optoisolators are devices that can be used as an electromagnetic relay without a driver. It usually consi
sts of a led (transmitter) and a photoresistive receiver.
a) kg/m2
b) ounce-inch
c) kg-m3
d) g/m
Answer: b
Explanation: Torque is equal to the force applied at a particular distance. So its unit can be ounce-inch.
a) Yes
b) No
c) Cant be said
d) None of the mentioned
Answer: b
Explanation: If LDI Rd,k is written then the range of Rd varies from R16-R31, as R3 is less than R16 so this instruct
ion will generate an error.
4. The total space for the data memory available in the AVR based microcontroller is?
a) FFH
b) FFFH
c) FFFFH
d) FFFFFH
Answer: c
Explanation: The maximum value that can be loaded in the code memory of an AVR based microcontroller is FFFF
H.
5. Which of the following instructions affect the flags of the status register?
a) AND
b) INC
c) OR
d) All of the mentioned
Answer: d
Explanation: AND, INC, OR could affect status register flags. All arithmetic and logical instructions affect status re
gister flags except SER Rd instruction. SER Rd is used to SEt Register i.e. after the execution of this instruction Rd l
oaded with FFH value and no flag is affected.
a) One copies the hexadecimal value to R16 and the other copies the decimal value to the R16 register
b) One is for command, other is for data
c) One is for assignment, other is for operations
d) Both the commands are the same
Answer: d
Explanation: Both the above commands are the same. They both are used for assigning the hexadecimal values to th
e registers.
a) .EQU
b) .DEVICE
c) .ORG
d) .LDI
Answer: d
Explanation: .EQU, .DEVICE, .ORG all are the directives to the assembler whereas LDI is a command.
a) Yes
b) No
c) Can’t be said
d) None of the mentioned
Answer: b
Explanation: Assembly language is not high level language rather it is low level language because it deals directly w
ith the internal structure of CPU. To program in assembly, the internal structure of the CPU must be known. Wherea
s in high level programming languages programmers don’t bother about the internal structure of the CPU because th
is is done by the compiler.
a) 4K
b) 8K
c) 16K
d) 64K
Answer: c
Explanation: A 14-bit program counter can access 214 bytes of memory locations i.e. 16k bytes.
214 = 24 x 210
a) 00H
b) 000H
c) 0000H
d) 00000H
Answer: d
Explanation: When an AVR wakes up, then the PC starts at the memory location 00000H.
a) 10
b) 70
c) 700
d) none of the mentioned
Answer: b
Explanation: As the R21 register is loaded with 70, so to make it zero it needs to be decremented 70 times then only
the OUT instruction will be executed so this loop repeats 70 times.
a) BRLO
b) BRMI
c) BRVC
d) None of the mentioned
Answer: d
Explanation: BRLO is used to branch if C=1, BRMI is used when N=1 and BRVC are used when V=0, so all are the
conditional jumps.
4. What is the relation between the target and the relative address?
5. In the JMP instruction, how many bits are there for determining the target address?
a) 16
b) 32
c) 22
d) 10
Answer: c
Explanation: In the JMP instruction of 4 bytes space, 22 bits are there for determining the target address and the othe
r 10 are for the op code verification.
a) MEM
b) LASTRAM
c) RAMEND
d) None of the mentioned
Answer: c
Explanation: RAMEND is a micro used to represent the last RAM address. In AVR, Stack Pointer is initialized on t
op of the stack i.e. last address of RAM.
8. Which of the following statements are correct about the RCALL instruction?
a) it is a 2 byte instruction
b) it is a 4 byte instruction
c) it is a 16 byte instruction
d) none of the mentioned
Answer: a
Explanation: RCALL instruction is used to go to the target address in the memory from -2048 to 2047.
1. In AVR, which registers are there for the I/O programming of ports?
a) PORT
b) PIN
c) DDR
d) All of the mentioned
Answer: d
Explanation: For I/O programming of the ports in AVR microcontrollers, there are basically three main registers. Th
ey are PORT, PIN, DDR, so all of the mentioned is the right option.
2. The data will not go from the port registers to the pin unless:
a) 0
b) 1
c) None of the mentioned
d) 0 & 1
Answer: a
Explanation: On reset, the DDR registers of all the ports are set to 0 which means that the by default all ports are set
as input ports.
a) PIN register of a port is used to bring data into CPU from pins
b) PORT register is used to send data out to pins
c) DDR register is used to control the direction of a port
d) All of the mentioned
Answer: d
Explanation: There are three registers that are related to a port. They are PIN, PORT, DDR. PIN register is used to b
ring data into CPU from pins, PORT register is used to send data to pins and DDR register is used to control the dire
ction of the data transfer. So all are the right options.
a) true
b) false
c) none of the mentioned
d) can’t be determined
Answer: b
Explanation: In the AVR family, all I/O ports don’t have 8 pins. Number of I/O pins depends on the total number of
pins of the controller. Eg. ATtinyxx is an 8 pin controller and it has 6 I/O pins.
a) SBI
b) PORT
c) CBI
d) All of the mentioned
Answer: b
Explanation: PORT is not an instruction. It is the name of a register in AVR.
9. Which of the following instruction can be used to toggle a bit of the PORT?
a) SBI
b) CBI
c) SBI & CBI
d) None of the mentioned
Answer: c
Explanation: If SBI and CBI are used together, then they can be used to toggle a bit of a port successfully.
10. What is the main function of the SBIC instruction?
1. In AVR microcontrollers, ADD instruction affects the status of which of the following bits of a status register?
a) Z
b) C
c) N
d) All of the mentioned
Answer: d
Explanation: ADD instruction affects the status of Z, C, N, V, H and S bits of a status register.
a) SUB
b) SBC
c) SUBI
d) All of the mentioned
Answer: d
Explanation: AVR supports five types of subtraction instructions. They are SUB, SBC, SUBI, SBCI, SBIW.
4. What steps are involved when we subtract two numbers present at two different locations?
8. To set the bits of a register R1 to 1, we must OR the contents of the register with?
a) 00H
b) 11H
c) FFH
d) 0FH
Answer: c
Explanation: To make the contents of the register R1 to 1 we must OR the contents of that register with FFH becaus
e according to Or algorithm 0+1=1 and 1+0=1.
a) true
b) false
c) none of the mentioned
d) can’t be said
Answer: b
Explanation: CP command is used to compare the contents of the two registers. It doesn’t actually alter the value of t
he register.
1. In AVR, which of the following registers are not used for programming timers?
a) TCNT
b) TCON
c) TIFR
d) None of the mentioned
Answer: b
Explanation: In the timer programming of an AVR microcontroller, mainly used registers are TCNTn that stores the
values of the count. TCCRn that is used to assign the mode of operation of a timer and TIFR that stores the status of
various flags of the timers. Two more registers are used they are OCRn and OCFn. They are used for comparison wi
th the count register.
a) Normal mode
b) CTC mode
c) PWM mode
d) All of the mentioned
Answer: d
Explanation: Modes of a timer are decided by the WGM00 and WGM01 bit of the TCCR0 register and for timer0 th
ese modes are normal mode, CTC mode, pwm mode and the fast pwm mode.
a) timer0
b) timer1
c) timer2
d) all of the mentioned
Answer: b
Explanation: Timer0 and Timer2 can operate in the 8 bit condition while only Timer 1 operates in the 16 bit conditio
n.
a) f/2
b) f/4
c) f/16
d) f/32
Answer: d
Explanation: f/32 has the lowest frequency as it is divided by the maximum value of the constant, so as time and fre
quency are inversely related to each other so this will generate the maximum amount of machine cycle which will as
a result generate the greatest delay.
7. What is the difference in the operation of a normal and a CTC mode of a timer?
8. We can count the pulses on the positive or the negative edge triggered pulse of the clock?
a) true
b) false
c) can’t be determined
d) depends on the circumstances
Answer: a
Explanation: A counter can count pulses on the positive or the negative edge of the clock.
a) PORTB.0
b) PORTB.1
c) PORTB.2
d) PORTB.3
Answer: a
Explanation: In ATmega32/16, T0 is the alternative function of PORTB.0. T0 is Timer/Counter 0 External Clock In
put.
10. Which resource provides the clock pulse to AVR timers if CS02-00=6?
a) 00h
b) ffh
c) 1fh
d) 11h
Answer: a
Explanation: On reset, all the interrupts are masked and so the contents of the SREG register is also set to zero as it s
hows the status of the flags.
a) 0002h
b) 0004h
c) 0006h
d) all of the mentioned
Answer: d
Explanation: The ISR addresses for the external hardware interrupts are 0002h, 0004h, 0006h.
5. What is the address in the interrupt service routine assigned for the timer0 overflow flag?
a) 0012h
b) 000Ah
c) 0016h
d) all of the mentioned
Answer: c
Explanation: 0016h is the address in the interrupt service routine assigned for the timer0 overflow flag.
6. Is the same address is assigned for the timer0 and timer1 overflow flag in the interrupt vector table of the interrupt
s?
a) true
b) false
c) can’t be determined
d) depends on the situation
Answer: b
Explanation: Different addresses are assigned for Timer0 and Timer1 overflow flags in the interrupt vector table. Th
ey are 0016h and 0012h for timer0 and timer1 respectively.
a) PORTD.2
b) PORTD.3
c) PORTB.2
d) All of the mentioned
Answer: d
Explanation: There are three external hardware interrupts in the atmega32 microcontrollers. They are assigned to bit
s PORTD.2, PORTD.3 and PORTB.2.
8. Which register is responsible for handling all the external hardware interrupts?
a) TIMSK
b) GICR
c) MCUCR
d) IVCE
Answer: b
Explanation: GICR register is responsible for all the external hardware interrupts in the AVR.
a) edge triggered
b) level triggered
c) all of the mentioned
d) none of the mentioned
Answer: b
Explanation: By default, INT0-INT2 are the level triggered pulses. The low level of the pulse generates the interrupt
.
10. What will happen in that condition, if an interrupt occurs while the microcontroller is serving any other interrupt
?
1. What actually are the DB9, DB25 ports available in our computers?
a) they are connectors used to transfer data either serially or parallelly
b) they are the RS232 connectors used to connect two incompatible devices
c) they are the TTL logic connector pins used for communication
d) they are just data transfer pins used to transfer the data
Answer: b
Explanation: DB9 and the DB25 ports are the ports that are based on the RS232 logic that is basically used for com
municating two incompatible devices.
4. Which of the following is correct about the baud rate during serial transmission?
5. With fosc=8 MHz, what will the count that has to filled in the UBRR register to account for the 9600 baud rate?
a) 67H
b) CEH
c) 33H
d) 34H
Answer: c
Explanation: The count that had to be filled in the UBRR register is calculated as (fosc/16(desired baud rate))-1.
6. The USART in AVR based microcontrollers operate at which of the following modes?
7. Which bit of the UCSRA is used for doubling the baud rate of the transmission?
a) DOR
b) PE
c) U2X
d) MPCM
Answer: c
Explanation: U2X bit of the UCSRA is used for doubling the baud rate of the transmission.
8. What is the use of the PE and the FE bits of the UCSRA register?
a) they are used for keeping a check at the speed of transmission and reception
b) they are used for keeping a check at the data bits to be transferred
c) they are used to keep the transmission error free
d) they are used as extra redundant bits with no use
Answer: c
Explanation: PE and the FE bits of the UCSRA register are used for error checking in the transmission.
9. Which of the following bits are used for setting the data frame size?
a) UCSZ0
b) U2X
c) DOR
d) MPCM
Answer: a
Explanation: UCSZ0 and UCSZ1 bits of the UCSRB register and the UCSZ2 bit of the UCSRC register are used for
setting the data frame size in AVR based microcontrollers.
10. Which of the following parameters should the transmitter and the receiver agree upon before starting a serial tran
smission?
a) baud rate
b) frame size
c) stop bit
d) all of the mentioned
Answer: d
Explanation: Before starting the serial transmission, the following parameters should be taken care of. They are the b
aud rate, frame size, stop bit and the parity bit.
1. In AVR, the LCD operates in two main modes, it can be in 8 bit or 4 bit data.
a) true
b) false
c) depends on the situation
d) can’t be said
Answer: a
Explanation: In AVR, the LCD operates in two main modes, they are in the 8 bit data transfer mode and the 4 bit dat
a transfer mode.
2. What can be the sequence of commands that may be used for initializing an LCD?
3. When the LCD operates in the 4 bit mode, then what more commands are added to it?
a) 33
b) 32
c) 28
d) all of the mentioned
Answer: d
Explanation: When an LCD operates in the 4 bit mode than 33, 32, 28 in hex are sent to it. They represent 3, 3, 3, 2
nibbles which tell the LCD to do into the 4 bit mode for saving the i/o pins of the port.
a) input pin
b) output pin
c) any of the mentioned depending on the conditions
d) none of the mentioned
Answer: a
Explanation: The RS pin of the LCD is used for selecting a particular register used for sending a command or the dat
a to the LCD.
8. What is the address of the second column and the second row of the 2*20 LCD?
a) 0x80
b) 0x81
c) 0xc0
d) 0xc1
Answer: d
Explanation: 0xc0 acts as the address for selecting the second row and the first column of the LCD, so according to i
t if we need to select the second row and the second column of the LCD, then the address should be 0xc1.
9. Which of the following commands takes more than 100 microseconds to run?
a) 1
b) 0
c) F
d) 10
Answer: a
Explanation: For selecting the data pins of the LCD, the RS pin of the LCD should be set to 1.
1. In reading the columns of a keyboard matrix, when no key is pressed then all the pins show?
a) 0
b) 1
c) F
d) 7
Answer: b
Explanation: When no key is pressed, in a keyboard then all the pins will read 1 as they all are connected to the main
power supply.
a) true
b) false
c) can’t be said
d) depends on the conditions
Answer: a
Explanation: To see that whether any key is pressed or not then all the rows are grounded so that columns can be rea
d to deliver the better results.
3. Identify the row and the column for the following case when for the row D3-D0= 1110 and for the column D3-D0
= 1101
4. What are the actual steps that are followed in identifying any key that is being pressed?
5. To identify that the key is present in which row and the column
6. The key detection and the key identification are two different procedures?
a) true
b) false
c) depends on the circumstances
d) difficult to tell
Answer: a
Explanation: The key detection and the key identification are the two different procedures, one is used to detect that
whether any key is pressed or not and the other technique is used to find that the pressed key is located in which row
and column.
9. What will happen if the two keys of the keyboard are pressed at a time?
10. Why initially all keys are considered open before detecting the key pressed?
1. Which of the following is correct about the word resolution in ADC DAC converters in AVR’s?
4. Which of the following factors can affect the step size calculation?
a) number of bits
b) input current
c) output current
d) all of the mentioned
Answer: a
Explanation: There are mainly two factors that can affect the step size calculation of an ADC converter, they are the
number of bits and the Vref voltage.
a) parallel
b) 12 bit
c) serial
d) all of the mentioned
Answer: c
Explanation: MAX1112 is a serial ADC converter, as it has only one pin for the data output.
6. Why do we connect a capacitor between the Vref and the Gnd pin?
7. Which of the following are the registers that are used for controlling the ADC conversion in the AVR?
a) ADCSRA
b) ADMUX
c) SPIOR
d) All of the mentioned
Answer: d
Explanation: For programming the ADC conversion in an AVR, we require the following registers. They are ADCS
RA, ADMUX, SPIOR. There are two more registers used for handling the output data, they are ADCH and ADCL r
egisters.
a) 5V
b) 3.3V
c) 2.56V
d) all of the mentioned
Answer: c
Explanation: 2.56V is the internal Vref selected for an Atmega32 series based microcontrollers.
a) electrical pulse
b) current
c) voltage
d) all of the mentioned
Answer: b
Explanation: The output of a DAC0808 is in the form of a current.
a) analog, digital
b) current, voltage
c) digital, analog
d) analog, current
Answer: c
Explanation: In a DAC, the input is digital and the output is analog in nature.
a) true
b) false
c) can’t say
d) depends on the conditions
Answer: a
Explanation: For analyzing purposes, every transducer must be connected to a signal conditioning circuit in order to
measure its value as a practical platform.
a) 1
b) 0.1
c) 0.001
d) 10
Answer: c
Explanation: LM35 provides 10mV for every degree change of the Celsius scale.
7. Why for the 8 bit analog input we select Vref as the 2.56V?
8. What is the temperature for LM35 sensor if the analog output is 0011 1001?
a) 3
b) 9
c) 57
d) 41
Answer: c
Explanation: The binary for the above output is 57, so in case of LM35 sensors we obtain the output as 57 C.
9. In an external hardware, there are how many pins available for the LM35 and the LM34 based sensors?
a) 2
b) 3
c) 10
d) 1
Answer: b
Explanation: LM35 consists of mainly 3 pins, they are Vcc, Gnd, analog output.
a) yes
b) no
c) depends on the conditions
d) can’t say
Answer: a
Explanation: LM34 and the LM35 based sensors are linearly proportional to their corresponding Fahrenheit and the
Celsius scale, so they are linear by nature.
a) Input/Output
b) Analog to Digital
c) Digital to analog
d) None of the mentioned
Answer: a
Explanation: The 8255 is Input/Output (I/O) chip. It has three separate accessible ports. The 8255 chip is used to exp
and the I/O ports of microcontrollers.
a) RD
b) WR
c) D0-D7
d) All of the mentioned
Answer: d
Explanation: RD, WR, D0-D7 all are directly connected to the 8051 for telling the chip about the control signals and
also for transferring the data.
3. Find the control word for PA= out, PB= in, PCL=out, PCH=out (Mode0)?
a) 0x02H
b) 0x82H
c) 0x83H
d) 0x03H
Answer: b
Explanation: The value that is being loaded in the control word is 10000010b for PB as an input port and all others a
s the output ports being operated in mode0. The hex equivalent of 10000010b → 0x82H.
4. Which pins are used to select the ports and the control register?
a) CS
b) A1
c) A0
d) All of the mentioned
Answer: d
Explanation: CS pin is an active low input pin for 8255 and it is used for selecting a chip. A0 and A1 pins are used f
or select ports and the control register.
5. What is the value of the control register when RESET button is set to zero?
a) 0x00H
b) 0xFFH
c) 0x11H
d) value remains the same
Answer: d
Explanation: RESET is active-high signal input into the 8255 used to clear the control register. When RESET is acti
vated (i.e. set to high), all ports are initialized as input mode. Hence the value of the control register remains the sam
e as it is even when the RESET button is set to zero.
6. Why MOVX instruction is being used to access the ports of the 8255?
8. How many pins of the 8255 can be used as the I/O ports?
a) 8
b) 16
c) 24
d) 32
Answer: c
Explanation: They are 3 ports available in the 8255 so 24 pins are available for the I/O ports pins.
a) 16
b) 8
c) 40
d) 60
Answer: c
Explanation: 8255 is a 40 pin IC.
a) yes
b) no
c) cant be said
d) depends on the conditions
Answer: a
Explanation: 8255 is a device that with the help of its handshaking property gets interfaced with any microcontroller
.
a) 2 modes
b) 3 modes
c) 4 modes
d) 5 modes
Answer: c
Explanation: 8255 can be programmed in any of the 4 modes.
a) conversion
b) communication
c) real time and clock measurement
d) memory management
Answer: c
Explanation: RTC is a device that is basically used for all the real time clock related issues.
2. RTC chips use ______ to compute time, date when the power is off.
a) ac supply
b) generators
c) rectifiers
d) battery
Answer: d
Explanation: RTC chips require batteries in order to calculate the time and date when the power of the device is off.
a) Communication device
b) Good battery device
c) RTC chip
d) All of the mentioned
Answer: c
Explanation: DS12887 is known as an RTC chip.
a) true
b) false
c) cant be said
d) depends on the conditions
Answer: b
Explanation: DS1307 is a serial RTC with I2C bus.
5. DS1307 is a _______ pin IC and operates on _______ clock frequency.
a) 16, 8Mhz
b) 8, 16Mhz
c) 16, 32Mhz
d) 8, 32Khz
Answer: d
Explanation: DS1307 is a 8 pin IC and operates on a 32KHz clock frequency.
a) 3V
b) 5V
c) 9V
d) 12V
Answer: a
Explanation: Vbat requires a positive signal of 3V which can be obtained through a battery.
7. In DS1307, which out of the following is correct about the SQW pin?
a) input pin
b) output pin
c) i/o pin
d) none of the mentioned
Answer: b
Explanation: In DS1307, SQW pin is an output pin. It provides a clock of frequency 1khz, 4khz, 8khz, 32khz if the p
in is enabled.
a) 32
b) 64
c) 128
d) 256
Answer: c
Explanation: DS1307 has a total of 64 bytes(00-3F) of RAM space.
a) 00H
b) 03H
c) 07H
d) 10H
Answer: b
Explanation: DS1307 control register has an address of 07H.
2. Why are ULN2803 normally used between the microcontrollers and the relays?
3. Why are opto isolators normally used between the microcontrollers and the ULN2803?
a) SPST
b) SPDT
c) DPDT
d) All of the mentioned
Answer: d
Explanation: There are normally three kinds of electromagnetic relays. They are SPST(single pole single throw), SP
DT(single pole double throw) and the DPDT(double pole double throw) relays.
5. Reed switches show connectivity whenever they are in the presence of an electrical field?
a) true
b) false
c) can’t say
d) depends on the conditions
Answer: b
Explanation: Reed switches are the devices that show connectivity whenever they are in the presence of some magne
tic field.
a) in printers
b) in robots
c) in vehicles
d) all of the mentioned
Answer: d
Explanation: Stepper motors are used wherever there is a need of a movement at an angle, maybe it in printers, in m
otors or in vehicles stepper motors are used everywhere.
7. What are normal 4 step sequence of a stepper motor if we start to move in clockwise direction with 0110 value?
a) 1100,1001,0011,0110
b) 0011,1001,1100,0110
c) 1001,1100,0110,0011
d) 0101,1010,0101,1010
Answer: b
Explanation: For a normal 4 step sequence of a stepper motor, if we start to move in a clockwise direction then we r
otate towards right direction with every rotation.
9. For a normal 4 step sequence, what are the number of teeth required to accomplish a 2 degree step angle?
a) 180
b) 90
c) 360
d) 45
Answer: d
Explanation: For a 2 degree step angle there will be 180 step per rotation, so the total number of rotor teeth are (180/
4=45).
a) true
b) false
c) can’t say
d) depends on the situation
Answer: a
Explanation: Torque is a quantity which is obtained by multiplying the amount of force that is applied at a particular
angle. It is measured in terms of ounch-inch.
1. Why do we make the connection of the SCLK for communicating serially between two devices?
a) true
b) false
c) can’t be said
d) depends on the cases
Answer: d
Explanation: In SPI write, MSB goes first.
a) SPSR
b) SPCR
c) SPDR
d) All of the mentioned
Answer: b
Explanation: In AVR, SPSR(SPI Status Register), SPCR(SPI Control Register) and SPDR(SPI Data Register) are us
ed for programming the SPI module.
a) We set the MSTR bit, and make the CPOL= 1 and CPHA=0
b) We set the MSTR bit, and make the CPOL= 0 and CPHA=1
c) We reset the MSTR bit, and make the CPOL= 1 and CPHA=0
d) We reset the MSTR bit, and make the CPOL= 0 and CPHA=1
Answer: b
Explanation: In SPI, to make it work in the master mode, we make the MSTR bit is equal to 1 and for operating it in
the mode 1 we make the CPOL=0 and CPHA=1.
a) true
b) false
c) depends on the conditions
d) can’t be said
Answer: d
Explanation: No, SPI can’t work in the half duplex transmission mode.
a) fosc/4
b) fosc/64
c) fosc/16
d) fosc/2
Answer: a
Explanation: fosc/2 is not recommended frequency for SPI transfer in AVR.
a) I2C is a technique by which data is transmitted with the help of only eight pins
b) SDA is used to synchronize data transfer between two chips
c) TWI is another name for I2C
d) All of the mentioned
Answer: c
Explanation: I2C is a technique by which data is transmitted between two devices by the help of only 2 pins so it is a
lso called Two wire Serial Interface.
a) the data line cannot change when the clock line is high
b) the data line can change when the clock line is high
c) the clock line cannot change when the data line is high
d) the clock line can change when the data line is high
Answer: a
Explanation: According to I2C protocols, the data line(SD
a) changes only if the clock line(SCL) is at its active low level.
a) true
b) false
c) cant be said
d) depends on the conditions
Answer: a
Explanation: I2C is a connection oriented protocol i.e each transmission is initiated by a START condition and is ter
minated by a STOP condition.
a) high to low change in the SDA line when the SCL is low
b) high to low change in the SDA line when the SCL is high
c) low to high change in the SDA line when the SCL is low
d) low to high change in the SDA line when the SCL is high
Answer: c
Explanation: The STOP condition is generated when there is a low to high change in the SDA line when the SCL is l
ow.
a) true
b) false
c) cant be said
d) depends on the conditions
Answer: a
Explanation: I2C is that module of the AVR, which is used for short distances.
8. Which of the following is a register used for programming AVR’s I2C module?
a) TWBR
b) TWCR
c) TWSR
d) All of the mentioned
Answer: d
Explanation: TWBR( TWI Bit rate register), TWCR( TWI Control Register), TWSR(TWI Status Register), TWAR(
TWI Address Register), TWDR( TWI Data Register) are used for programming an AVR’s I2C module.
9. Which bit is polled to know that whether the TWI is ready or not?
a) TWWC
b) TWINT
c) TWEA
d) All of the mentioned
Answer: b
Explanation: TWINT is the bit that is polled to know that whether the TWI is ready or not.
a) 1 byte
b) 2 bytes
c) 1 bit
d) 2 bit
Answer: b
Explanation: In MSP430, the size of the status register is 2 bytes. The bits of the status register consists of the C flag
, Z flag, N flag, GIE flag, CPU off, OSC off, SCG0, SCG1, V flag and 7 reserved bits.
2. Which of the following bit/s of the status register that allows the microcontroller to operate in its low power mode
?
a) Z
b) Reserved
c) CPU off
d) N
Answer: d
Explanation: The CPU off bit, OSC off bit, SCG0 bit, SCG1 bit of the status register are used to allow the microcont
roller to operate in its low power mode.
a) true
b) false
c) cant be said
d) depends on the conditions
Answer: a
Explanation: MSP430 supports only post increment addressing. For performing pre increment addressing, we requir
e some special functions that accomplish that work.
a) ADC(.
b) dst
b) ADD(.
b) src,dst
c) ADDC(.
b) src,dst
d) AND(.
b) src,dst
Answer: a
Explanation: “ADC(.
b) dst” this is emulated to “ADDC.B #0,dst” hence this is an emulated instruction. The emulated instructions use cor
e instructions combined with the architecture and implementation of the CPU for higher code efficiency and faster e
xecution.
1. There are _____ number of addressing modes found for the source and _____ number of modes for the destinatio
n part.
a) 4,4
b) 2,4
c) 7,4
d) 2,2
Answer: c
Explanation: In MSP430, Seven addressing modes for the source operand and four addressing modes for the destinat
ion operand can address the complete address space with no exceptions.
a) Format1 addressing
b) Format2 addressing
c) Jump addressing
d) None of the mentioned
Answer: b
Explanation: MSP430 describes reti instruction as that type of addressing which consists of only single operand, so i
t comes under Format2 addressing.
a) one cycle
b) two cycles
c) four cycles
d) eight cycles
Answer: a
Explanation: mov.w R3, R4 takes only one cycle to transfer the data from register R3 to R4. This type of mode of ad
dressing is called the register mode of addressing.
a) source
b) destination
c) source & destination
d) none of the mentioned
Answer: c
Explanation: Indexed addressing is used for both the source and the destination addresses.
a) R6 = X+PC
b) R6 = PC-X
c) R6 = -X-PC
d) R6 = -X+PC
Answer: a
Explanation: This instruction mov.w X(PC), R6 means that the contents of X+PC address are copied to the R6 regist
er.
a) source register
b) destination register
c) source & destination register
d) none of the mentioned
Answer: a
Explanation: Indirect addressing mode is used only by the source register.
8. Indirect mode and the indirect auto increment mode have which common operator in them
a) +
b) –
c) @
d) &
Answer: c
Explanation: Both the indirect and the indirect auto increment mode use the @ operator for the source register to tra
nsfer the data from one memory location to a register.
a) yes
b) no
c) cant be said
d) depends on the conditions
Answer: b
Explanation: MOV @R10,0(R11) → Move the contents of the source address (contents of R10) to the destination ad
dress (contents of R11).
a) Register Mode
b) Indirect Register Mode
c) Immediate Mode
d) Indirect Autoincrement Mode
Answer: b
Explanation: The type of given instruction is Indirect Register Mode.
a) MOV
b) GO
c) CALL
d) All of the mentioned
Answer: c
Explanation: CALL instruction is used for going to a particular address in MSP430. It actually causes the pointer to j
ump at a particular address and push the current address of the PC to the stack.
3. According to conventions being followed, R12 to R15 are used for _________
a) parameter passing
b) preserved for call
c) all of the mentioned
d) none of the mentioned
Answer: a
Explanation: According to the conventions, R12 to R15 are used for parameter passing and hence are not preserved f
or the call.
4. We can store the temporary results across a call instruction with the help of which of the following registers
a) R1-R4
b) R4-R11
c) R12-R15
d) All of the mentioned
Answer: b
Explanation: Temporary results are stored by the registers R4-R11.
a) yes
b) no
c) cant be said
d) depends on the conditions
Answer: a
Explanation: Yes, we can allocate the variables on the stack, it is a very effective way of storing the variables.
6. Which registers are reserved for passing the parameters to a subroutine and then returning the final result?
a) R1-R4
b) R4-R11
c) R12-R15
d) All of the mentioned
Answer: c
Explanation: Originally, R12-R15 registers are reserved for passing the parameters to a subroutine and then returnin
g the final result.
7. What actually is the order of stack frame for a parameter to pass to a subroutine?
8. When any subroutine is called, then the first value of stack will be
a) value of PC
b) the return address
c) none of the mentioned
d) both are one and the same things
Answer: d
Explanation: When any subroutine is called then the first place of the stack will be filled with the return address, or t
he address of the PC so that the pointer may return back to its appropriate place after the return instruction of the sub
routine.
9. Which of the following instruction/s is/are used to return back to the main program after the subroutine is complet
ed?
a) ret
b) reti
c) ret and reti
d) none of the mentioned
Answer: c
Explanation: For returning back from the subroutine, both ret and reti can be used, the main difference between the t
wo is that reti just resets the interrupt flag before the return, so that the interrupt can occur again.
a) yes
b) no
c) cant be said
d) depends on the conditions
Answer: a
Explanation: The approach of making subroutine is indeed very effective, as with its help we don’t need to retrace/w
rite a particular set of codes again and again. It makes our approach modular.
a) true
b) false
c) cant be said
d) depends on the conditions
Answer: a
Explanation: MSP430 has vectored interrupts i.e. the address of each ISR is stored in a vector table, that’s why it has
vectored interrupts.
2. Which of the following is true?
3. After the interrupt has occurred, the stack is filled with ______________
a) return address
b) status register
c) return address & status register
d) none of the mentioned
Answer: c
Explanation: When an interrupt had occurred, the top place of the stack is filled with the return address, so that imm
ediately after the reti instruction the pointer moves to the main program, the stack is also filled with the bits of the st
atus register so that all the temporary values get stored in it.
a) GIE=0
b) GIE=1
c) None of the mentioned
d) GIE=0 & 1
Answer: b
Explanation: If GIE is set to 1, then only other hardware interrupts are enabled.
a) true
b) false
c) cant be said
d) depends on the conditions
Answer: b
Explanation: Nonmaskable interrupts are stored in the same vector location, it may be of higher or the lower priority
.
a) true
b) false
c) cant be said
d) depends on the conditions
Answer: a
Explanation: Yes, external RST/NMI pin is a nonmaskable interrupt( The function of the RST/NMI pin is configure
d in the control register for the watchdog timer module, WDTCTL).
10. How many cycles are used by MSP430, when reti instruction is executed?
a) 3
b) 4
c) 5
d) depends on the conditions
Answer: c
Explanation: When reti instruction is executed, five cycles are used because it firstly pops the stack register complet
ely and then takes the top of the stack into the PC to return to the next address of the main program.
1. There are how many MSP430’s low power modes available in the chip?
a) two
b) three
c) four
d) five
Answer: d
Explanation: There are five low power modes available in the MSP430, out of which two are rarely employed in the
current devices.
a) LPM0
b) LPM3
c) LPM4
d) All of the mentioned
Answer: d
Explanation: LPM0, LPM3, LPM4 all are the low power modes that are available in the MSP430.
3. Which of the following modes is also known as the RAM retention mode?
a) LPM0
b) LPM3
c) LPM4
d) All of the mentioned
Answer: c
Explanation: LPM4 is known as the RAM retention mode. Here, the CPU and all clocks are disabled, I ≈ 0.1A. The
device can be woken only by an external signal.
4. Waking a device simply means that switching that device’s operation from a low power mode to an active mode.
a) true
b) false
c) cant be said
d) depends on the conditions
Answer: a
Explanation: When a device is operating in a low power mode, it can also be assumed that the device is sleeping, so
waking a device simply means to turn that device’s operation from a low power mode to an active mode.
5. When an interrupt is accepted, the contents of the status register are ___________
a) set
b) reset
c) remains the same
d) cant be said
Answer: d
Explanation: When an interrupt is accepted, the contents of the status register are cleared, it actually puts the process
or in the active mode.
6. Which of the following basic clock modules supplies clock signals to the MSP430?
a) ACLK
b) MCLK
c) SMCLK
d) All of the mentioned
Answer: a
Explanation: All of the mentioned options are correct. The basic clock module supplies the MSP430 with three cloc
k signals as follows:
8. More power can be saved by using low_power mode 0 than low_power mode 3.
a) true
b) false
c) cant be said
d) depends on the conditions
Answer: b
Explanation: More power is saved in low_ power mode 3.
a) P1SEL
b) P1DIR
c) P1IES
d) All of the mentioned
Answer: d
Explanation: All of the mentioned registers are related to Port1.
a) it is an interrupt
b) it is a timer
c) it is an analog to Digital Converter
d) it is a serial communication module
Answer: c
Explanation: SD16_A is an analog to the digital module.
5. P1IE and P1IES are registers that are used to ___________
6. Unused pins must never be left unconnected in their default state as inputs.
a) true
b) false
c) cant be said
d) depends on the conditions
Answer: a
Explanation: Unused pins must never be left unconnected in their default state as inputs. This follows a general rule
that inputs to CMOS must never be left unconnected or “floating”.
a) it turns slowly varying inputs, which might cause problems while they pass slowly through the undefined range of
input voltages, into abrupt, clean logical transitions
b) It eliminates the effect of noise on the input, provided that it is not large enough to span the gap between the upwa
rd and downward thresholds
c) none of the mentioned
d) all of the mentioned
Answer: d
Explanation: Schmidt trigger has two of the above mentioned effects in it.
8. To ensure that a negative fluctuation does not trigger an unwanted downward transition by pulling the input down
through VIT−, we must choose
a) minimum hysteresis
b) maximum hysteresis
c) all of the mentioned
d) none of the mentioned
Answer: a
Explanation: To ensure that a negative fluctuation does not trigger an unwanted downward transition by pulling the i
nput down through VIT−, we must choose a minimum hysteresis of 0.3V.
a) detecting circuit
b) debouncing circuit
c) devaluing circuit
d) degenerating circuit
Answer: b
Explanation: The SPDT(single pole, double pole) switch can be used as a debouncing circuit of a switch.
10. Debouncing can be carried out at a hardware as well as the software end?
a) yes
b) no
c) cant be said
d) depends on the conditions
Answer: a
Explanation: Debouncing can be carried out at both the fronts both at the software as well as the hardware front, to c
arry out the process appropriately.
a) three
b) four
c) five
d) seven
Answer: c
Explanation: MSP430 has mainly five types of timers in it. They are Watchdog Timer, Basic Timer1, Real clock Ti
me, Timer_A, Timer_B.
a) true
b) false
c) cant be said
d) depends on the conditions
Answer: a
Explanation: A Watchdog Timer can act as an interval timer if the protection is not needed for it.
6. LCD_A controllers make use of the Basic Timer1 timer for providing a clock to the LCD?
a) true
b) false
c) cant be said
d) depends on the conditions
Answer: b
Explanation: Basic Timer1 is not used in LCD_A controllers, because these provide an internal clock of its own to al
l of its devices.
a) true
b) false
c) cant be said
d) depends on the conditions
Answer: a
Explanation: Real time clock is an extension of Basic Timer1 and is present in almost all devices for controlling its r
eal time clock.
a) generate interrupts
b) handle external inputs
c) drive outputs
d) all of the mentioned
Answer: d
Explanation: Timer_A can be used to generate the interrupts, handle the external inputs or for driving the outputs.
a) yes
b) no
c) cant be said
d) depends on the conditions
Answer: a
Explanation: Yes, time stamp inputs can be measured by a Timer_A.
a) sampling inputs
b) driving outputs
c) sampling inputs & driving outputs
d) none of the mentioned
Answer: b
Explanation: Timer_B is used for driving the outputs as with Timer_A but it lacks the property of Timer_A of sampl
ing inputs.
a) true
b) false
c) cant be said
d) depends on the conditions
Answer: a
Explanation: The watchdog timer is used for the protection of the device. It keeps a track at the counter so that the c
ode doesn’t reach an infinite unending loop. So it actually resets the counter before this particular condition.
a) it is a 16 bit register
b) it is guided against accidental writes that require a password
c) a reset will occur if a value with an incorrect password is written to WDTCTL
d) all of the mentioned
Answer: d
Explanation: WDTCTL is a 16 bit register that is used for protecting the microcontroller. It actually resets the value
when an incorrect password is written to WDTCTL.
4. Which of the following bits reads 0 under normal conditions but goes 1 when it wants to initiate some action?
a) WDTNMI
b) WDTHOLD
c) WDTTMSEL
d) WDTCNTCL
Answer: d
Explanation: WDTCNTCL is the bit that reads 0 under normal conditions but goes 1 when it wants to initiate some a
ction like resetting the counter.
a) petting
b) feeding
c) kicking
d) all of the mentioned
Answer: d
Explanation: the process of setting the WDTCNTCL bit in the WDTCTL register is by the processes like petting, fee
ding and kicking.
7. What is the function of this instruction “WDTCTL = WDTPW | WDTCONFIG”, where **#define WDTCONFIG
(WDTCNTCL|WDTSSEL)**
a) yes
b) no
c) cant be said
d) depends on the conditions
Answer: b
Explanation: No WDTCTL_bit.WDTCNTCL = 1; is an incorrect way of setting the bits of the WDTCTL register be
cause it violates the password protection.
9. Setting the WDTTMSEL bit of the WDTCTL register makes the watchdog timer act as
a) interrupt
b) communication device
c) converter
d) interval timer
Answer: d
Explanation: The WDTTMSEL bit of the WDTCTL register makes the watchdog timer act as the interval timer.
1. Which of the following is true about the FRFQx bits of the BTCTL register?
a) 2hz-256hz
b) 12hz-512hz
c) 128hz-1khz
d) 1khz-10khz
Answer: c
Explanation: For fACLK = 32khz, the desirable range of the fLCD is the fACLK/256 to fACLK/32. This value com
es out to be in the range of 128hz-1khz.
a) true
b) false
c) cant be said
d) depends on the conditions
Answer: a
Explanation: LCD’s controllers nowadays don’t require a clock pulse, so the only main function of the BTCNT1 is t
o provide a prescalar for the BNTCNT2.
a) true
b) false
c) cant be said
d) depends on the conditions
Answer: b
Explanation: BNTCNT2 has no outputs. Instead, it raises the BTIFG flag at a frequency determined by the BTIPx bi
ts.
6. RTCSEC, RTCMIN, RTCDOW etc. are the bytes of a set of registers that are used to store
a) seconds
b) minutes
c) days of a week
d) all of the mentioned
Answer: d
Explanation: The current time and date are held in a set of registers that contain the following bytes like RTCSEC, R
TCMIN, RTCHOUR, RTCDOW etc.
8. The RTC module makes use of the Basic Timer1 because of _________
a) yes
b) no
c) cant be said
d) depends on the conditions
Answer: a
Explanation: There is only one TAR in Timer_A so all of its channels share the same timer block.
a) RTC module in it
b) Compare/ capture channel
c) Communication channel
d) Converter channel
Answer: b
Explanation: Timer_A has compared/ capture channel inbuilt inside it.
6. TAxCCTLn is a _________
a) set of 2 bits used for selecting the mode of operation of the timer
b) a register of 8 bits used for giving the count to the timer
c) a register of 16 bits used to select the compare/capture channel of the Timer_Ax
d) a register of 16 bits used to cause the timer interrupt
Answer: c
Explanation: TAxCCTLn is a register of 16 bits used to select the compare/capture channel of the Timer_Ax.
a) ACLK
b) CAOUT
c) SCLK
d) TACLK
Answer: b
Explanation: CCI1B comes from CAOUT.
a) Capture/compare input. The selected input signal can be read by this bit
b) Synchronized capture/compare input. The selected CCI input signal is latched with the EQUx signal and can be re
ad from this bit
c) Holds the data for the comparison to the timer value in the Timer_A Register, TAR
d) None of the mentioned
Answer: c
Explanation: Compare mode: TAxCCRn holds the data for the comparison to the timer value in the Timer_A Regist
er, TAR.
a) true
b) false
c) cant be said
d) depends on the conditions
Answer: b
Explanation: Immediate mode offers no double buffering condition. As here, values are copied to TBCLn as soon as
they are written to TBCCRn.
5. The capture/compare registers TBCCRn are double-buffered when used for compare events?
a) true
b) false
c) cant be said
d) depends on the conditions
Answer: a
Explanation: The capture/compare registers TBCCRn are double-buffered when used for compare events.
a) 8 bits
b) 12 bits
c) 16 bits
d) all of the mentioned
Answer: d
Explanation: The length of TBR can be programmed to be 8, 12, 16 or 10 bits long.
a) a comparator
b) compare latch
c) controller
d) control logic
Answer: b
Explanation: TBCLn is actually a compare latch that is provided in its every channel.
1. Which of the following is the analog to digital converter that is present in the MSP430 based processors?
a) comparator
b) successive approximation ADC
c) sigma delta ADC
d) all of the mentioned
Answer: d
Explanation: A comparator module, a successive approximation ADC module and a sigma delta ADC converters are
found in the MSP based processors.
2. Higher resolution along with the slow speed is given by which ADC module?
a) comparator
b) successive approximation ADC
c) sigma delta ADC
d) all of the mentioned
Answer: c
Explanation: Higher resolution along with the slow speed is given by the sigma delta ADC module.
a) resolution
b) accuracy
c) precision
d) all of the mentioned
Answer: c
Explanation: The degree of closeness of the measured value to the actual true value is its accuracy, while on the othe
r hand the measure of the repeated accuracy is termed as the precision.
5. Resolution is _________
a) levelling
b) signalling
c) quantization
d) converting
Answer: c
Explanation: The process of reduction of a continuous input to a discrete output is called as quantization.
7. Which of the following functions can be used for converting the nearest integer to its argument?
a) int
b) mint
c) uint
d) nint
Answer: d
Explanation: nint is the function that is priorly used for converting the nearest integer to its argument.
a) remains constant
b) goes up
c) goes down
d) goes asymmetrically
Answer: b
Explanation: The SNR goes up with the number of bits.
10. The intervals between the samples are obtained from _________
a) Fs
b) Ts
c) Us
d) Ks
Answer: b
Explanation: The intervals between the samples is obtained by Ts that is equal to 1/fs.
a) CACTL1
b) CACTL2
c) CACTL1 & CACTL2
d) None of the mentioned
Answer: c
Explanation: Comparator_A+ is controlled by the CACTL1 and the CACTL2 registers.
a) start a timer
b) start an A/D conversion
c) switch on the comparator module
d) switch on the bit transmission
Answer: c
Explanation: CAON bit is used to switch on the comparator module namely, Comparator_A+.
5. Which of the following bits are not actually associated with the comparator module?
a) CAREFx
b) CLLDx
c) CAON
d) CAIFG
Answer: b
Explanation: CLLDx bit is related to the Timer_2 module. All others are related to the comparator module.
7. Setting a bit in the Port Disable register CAPD causes the circuits for the usual digital input and output buffers to
be disconnected from the appropriate pin.
a) true
b) false
c) cant be said
d) depends on the conditions
Answer: a
Explanation: Setting a bit in the Port Disable register CAPD causes the circuits for the usual digital input and output
buffers to be disconnected from the appropriate pin.
8. Which bit is used for exchanging the two inputs of the comparator and invert its output to compensate?
a) CAIFG
b) CASHORT
c) CAPD
d) CAEX
Answer: d
Explanation: CAEX is used for exchanging the two inputs of the comparator and invert its output to compensate.
a) true
b) false
c) cant be said
d) depends on the conditions
Answer: a
Explanation: When some variation is made in the value of Vcc, in the same manner, itself the value of the V+ chang
es because, the voltage from the potential divider is proportional to Vcc. This changing effect can be reduced if the s
imilar change takes place in the value of V- itself.
10. The relaxation oscillator circuit helps in _______
a) 8-10 bits
b) 10-12 bits
c) 12-16 bits
d) 16-32 bits
Answer: b
Explanation: The successive approximation converters have a resolution of about 10-12 bits in it.
2. In SAR based conversions, each bit typically requires one clock cycle (sometimes two) to make a comparison and
set up the new voltage.
a) true
b) false
c) cant be said
d) depends on the conditions
Answer: a
Explanation: In SAR based conversions, each bit typically requires one clock cycle (sometimes two) to make a com
parison and set up the new voltage.
3. The main operations that are basically performed in a SAR ADC are?
4. Usually, a capacitor is inserted between an analog input and the ground because
a) true
b) false
c) cant be said
d) depends on the conditions
Answer: b
Explanation: ADC12 needs external capacitors on its voltage reference as compared to the ADC10 module.
a) ADC10ON
b) ADC10MEM
c) ADC10BUSY
d) ADC10DF
Answer: c
Explanation: While conversion is in progress, then ADC10BUSY flag is set.
a) 4
b) 8
c) 16
d) all of the mentioned
Answer: d
Explanation: ADC10SHTx bits allow 4,8,16 and 64 cycles of the ADC10CLK.
10. The input to the ADC10 is selected from_______bits of the ADC10CTL1 register?
a) INCHx
b) ADC10SC
c) ADC10ON
d) ENC
Answer: a
Explanation: The input to the ADC10 is selected from the INCHx bits of the ADC10CTL1 register.
********** Join:- https://t.me/AKTU_Notes_Books_Quantum **********
a) 1 bit converter
b) 2 bit converter
c) 3 bit converter
d) 4 bit converter
Answer: a
Explanation: Sigma delta converter is a 1 bit converter.
a) yes
b) no
c) cant be said
d) depends on the conditions
Answer: b
Explanation: Sigma delta converter is having poor resolution quality.
a) final frequency
b) oversampling frequency
c) oversampling frequency/final frequency
d) final frequency/oversampling frequency
Answer: c
Explanation: Oversampling ratio is defined as the ration of the oversampling frequency fm to the final frequency fs.
a) subtraction
b) differentiation
c) integration
d) none of the mentioned
Answer: c
Explanation: In a sigma delta converter, sigma word represents that the output obtained from the delta function is get
ting integrated.
a) true
b) false
c) cant be said
d) depends on the conditions
Answer: a
Explanation: The second part of the ADC handles purely digital signals.
a) multipled by 10
b) multiplied by 100
c) divided by 10
d) divided by 100
Answer: c
Explanation: Decimated means to divide the result by 10.
a) sinc filter
b) sinc2 filter
c) sinc3 fiter
d) rect filter
Answer: c
Explanation: The SD16 has a second-order modulator with a sinc3 filter.
2. SPI, I2C, Asynchronous serial communication are the means of communicating a processor with its associate part
ners?
a) true
b) false
c) cant be said
d) depends on the conditions
Answer: a
Explanation: SPI, I2C, Asynchronous serial communication are the means for the processor by which communicatio
n is made possible.
a) true
b) false
c) cant be said
d) depends on the conditions
Answer: b
Explanation: Clock is the prior need for any communication to occur. This is because synchronization is maintained
with the help of a clock.
a) less
b) same
c) more
d) depends on the conditions
Answer: c
Explanation: In SPI, there is no control of transmission in software—no addresses or acknowledgment, that’s why it
requires more amount of wires.
a) SPI
b) I2C
c) SPI & I2C
d) None of the mentioned
Answer: c
Explanation: USI(Universal Serial Interface) supports both the types of synchronous communication i.e. SPI and I2
C.
a) one channel
b) two channels
c) three channels
d) four channels
Answer: b
Explanation: USCI consists of mainly two channels, A and B. These are largely independent but share a few register
s and interrupt vectors.
a) A
b) B
c) C
d) D
Answer: a
Explanation: Channel A is the asynchronous receiver/ transmitter channel. It can detect the baud rate of an incoming
signal, which enables its use on a local interconnect network (LIN).
a) yes
b) no
c) depends on the conditions
d) cant be said
Answer: a
Explanation: Yes, one device can have more than one USC interfaces. There is a small difference because the interru
pt flags and enable bits for the “0” modules are in a special function registers IFG2 and IE2, while those for the “1”
modules are in their own registers, UC1IFG and UC1IE.
a) synchronous masters
b) synchronous slaves
c) asynchronous masters
d) asynchronous slaves
Answer: d
Explanation: Synchronous slaves are the most difficult to attain because the problem is that the slave must react quic
kly when a clock transition arrives from the master.
a) SPI
b) I2C
c) Asynchronous Serial Communication
d) All of the mentioned
Answer: c
Explanation: Timer_A is used in the Asynchronous Serial Communication.
a) yes
b) no
c) cant be said
d) depends on the conditions
Answer: a
Explanation: Yes, SPI is a technique where a data can be transmitted/ received in both the directions.
a) two counters
b) four flip flops
c) two shift registers
d) four steady state machines
Answer: c
Explanation: The concept of the SPI is based on the two shift registers, one for the transmitter and the other is there f
or the receiver terminal.
3. Writing on the trailing edge of the clock pulse and reading on the leading edge of the clock pulse is done when
a) CPHA is set
b) CPHA is reset
c) CPOL is set
d) CPOL is reset
Answer: b
Explanation: When CPHA is reset to zero, then writing on the trailing edge of the clock pulse and reading on the lea
ding edge of the clock pulse.
a) yes
b) no
c) cant be said
d) depends on the conditions
Answer: b
Explanation: CPKL=CPOL and CPKH=(not CPHA).
a) P1.0-2
b) P1.2-4
c) P1.4-6
d) P1.5-7
Answer: d
Explanation: SCLK, SDO, and SDI are found at P1.5-7 on F20x3.
a) true
b) false
c) cant be said
d) depends on the conditions
Answer: a
Explanation: Transmission and reception occur at a time in SPI. This means that a value is received only if the trans
mitter is active.
a) empty, reset
b) having one byte, reset
c) full, reset
d) empty, two
Answer: c
Explanation: When the buffer is full, the low power mode is cleared.
a) CLK
b) MISO
c) SDA
d) All of the mentioned
Answer: c
Explanation: The I2C bus uses only two lines. They are SDA and SCL.
a) yes
b) no
c) depends on the conditions
d) cant be said
Answer: b
Explanation: I2C is a slower means of transfer than SPI because here only one line is there for the two way commun
ication to occur.
a) true
b) false
c) cant be said
d) depends on the conditions
Answer: a
Explanation: Yes, in I2C protocol each slave has its own unique address, in order to differentiate it from others.
6. Which of the following is an issue while programming I2C using the software?
a) open-collector output
b) open-drain output
c) totem pole output
d) all of the mentioned
Answer: b
Explanation: There are two main issues while programming I2C using software, they are the open-drain output and t
he detection of start and stop conditions.
7. Which of the following is the slave to be addressed when a device acts as a master?
a) UCB0I2COA
b) UCB0I2CSA
c) UCB0I2CIE
d) All of the mentioned
Answer: b
Explanation: UCB0I2CSA is the slave to be addressed when a device acts as a master.
a) yes
b) no
c) cant be said
d) depends on the conditions
Answer: a
Explanation: Yes, baud rate is also selected in the I2C module, as is the case with the SPI module.
1. Asynchronous serial communication usually requires two wires for each direction plus a common ground.
a) true
b) false
c) cant be said
d) depends on the conditions
Answer: b
Explanation: Asynchronous serial communication usually requires only a single wire for each direction plus a comm
on ground.
2. In an asynchronous mode of transmission, usually the data is sent along with the
3. The _____ rate gives the frequency at which the bits are transmitted on the line.
a) bit rate
b) packet rate
c) baud rate
d) data rate
Answer: c
Explanation: Baud rate is the rate which determines us the frequency at which the bits are transmitted on the line.
4. Baud rate is the reverse of the ________
a) baud time
b) baud period
c) bit time
d) bit period
Answer: b
Explanation: Baud rate is the reverse of the baud period.
a) yes
b) no
c) cant be said
d) depends on the conditions
Answer: b
Explanation: No clock is transmitted in the asynchronous communication, so the transmitter and the receiver are allo
wed to work independently at their own terminals.
a) high
b) low
c) same
d) changed
Answer: b
Explanation: Framing error occurs if the bit is low.
a) the bits are either high or low and have no gaps between them
b) the bits are either high or low and have gaps between them
c) the bits are high and have gaps between them
d) the bits are low and have no gaps between them
Answer: a
Explanation: Non-return to zero format represents a format in which the bits are either high or low and have no gaps
between them.
a) true
b) false
c) cant be said
d) depends on the conditions
Answer: a
Explanation: In non-return to zero format, normally LSB is sent first.
a) 1
b) 2
c) 3
d) 4
Answer: c
Explanation: they are 3 clocks in the USCI_A. They are BRCLK, BITCLK and BITCLK16.
MCQs
Answer: c
Explanation: Machine language instruction format has one or more fields. The first one is the
operation code field.
a) Operand field
Answer: c
Explanation: Machine language instruction format has both the fields.
a) 2 bytes
b) 1 byte
c) 3 bytes
d) 4 bytes
Answer: b
Explanation: This format is only one byte long.
b) 1 byte
c) 3 bytes
d) 4 bytes
Answer: a
Explanation: This format is 2 bytes long.
a) another register
c) other operands
Answer: d
Explanation: The LSBs
leastsignificantbits
from 0 to 3 represent R/M field that specifies another register or memory location i.e. the other
operand.
a) status bit
b) sign bit
Answer: c
Explanation: The S-bit known as sign extension bit is used along with W-bit to show the type of
operation.
a) W-bit
b) S-bit
c) V-bit
d) Z-bit
Answer: d
Explanation: The Z-bit is used by the REP instruction to control the loop.
a) 8 bits
b) 4 bits
c) 16 bits
d) 2 bits
Answer: c
Explanation: If W-bit is ‘1’ then the operand is of 16-bits, and if it is ‘0’ then the operand is of
8-bits.
9. The instructions which after execution transfer control to the next instruction in the sequence
are called
Answer: a
Explanation: The sequential control flow instructions follow sequence order in their execution.
10. The instructions that transfer the control to some predefined address or the address
specified in the instruction are called as
Answer: b
Explanation: The control transfer instructions transfer control to the specified address.
c) branch instructions
Answer: d
Explanation: The JUMP instruction transfers the control to the address located in the instruction.
To practice all areas of Microprocessors, here is complete set of 1000+ Multiple Choice
Questions and Answers .
MCQs
a) register
b) direct
c) immediate
d) register relative
Answer: c
Explanation: In Immediate addressing mode, immediate data is a part of instruction and appears
in the form of successive byte or bytes.
Answer: c
Explanation: Since immediate data is present in the instruction.
Answer: b
Explanation: Since the address is directly specified in the instruction as a part of it.
4. If the data is present in a register and it is referred using the particular register, then it is
Answer: b
Explanation: Since register is used to refer the address.
Answer: d
Explanation: Since the register used to refer to the address is accessed indirectly.
6. If the offset of the operand is stored in one of the index registers, then it is
Answer: c
Explanation: In the indexed addressing mode, the offset of an operand is stored and in the rest
of them, address is stored.
Answer: b
Explanation: In intrasegment indirect mode, the branch address is found as the content of a
register or a memory location.
8. If the location to which the control is to be transferred lies in a different segment other than
the current one, then the mode is called
a) intrasegment mode
Answer: d
Explanation: In intersegment mode, the control to be transferred lies in a different segment.
is an example of
Answer: c
Explanation: Since in intersegment direct mode, the address to which the control is to be
transferred is in a different segment.
10. The contents of a base register are added to the contents of index register in
a) indexed addressing mode
Answer: d
Explanation: The effective address is formed by adding the contents of both base and index
registers to a default segment.
To practice all areas of Microprocessors, here is complete set of 1000+ Multiple Choice
Questions and Answers .
MCQs
1. The instruction that is used to transfer the data from source operand to destination operand is
b) branch instruction
c) arithmetic/logical instruction
d) string instruction
Answer: a
Explanation: These instructions are used to copy and transfer the instructions.
a) MOV
b) PUSH
c) DAS
d) POP
Answer: c
Explanation: DAS
DecimalAdjustafterSubtraction
is an arithmetic instruction.
3. The instructions that involve various string manipulation operations are
a) branch instructions
d) string instructions
Answer: d
Explanation: The string instructions perform operations on strings such as load, move, scan,
compare etc.
a) MOV AX, BX
d) PUSH AX
Answer: b
Explanation: Both the source and destination operands cannot be memory locations except for
string instructions.
5. In PUSH instruction, after each execution of the instruction, the stack pointer is
a) incremented by 1
b) decremented by 1
c) incremented by 2
d) decremented by 2
Answer: d
Explanation: The actual current stack-top is always occupied by the previously pushed data. So,
the push operation decrements SP by 2 and then stores the two bytes contents of the operand
onto the stack.
6. The instruction that pushes the contents of the specified register/memory location on to the
stack is
a) PUSHF
b) POPF
c) PUSH
d) POP
Answer: c
Explanation: Since PUSH operation transfers data to stack from a register or memory location.
7. In POP instruction, after each execution of the instruction, the stack pointer is
a) incremented by 1
b) decremented by 1
c) incremented by 2
d) decremented by 2
Answer: c
Explanation: The actual current stack top is poped into the specific operand as the contents of
stack top memory is stored in AL&SP and further contents of the memory location pointed to by
SP are copied to AH & SP.
8. The instructions that are used for reading an input port and writing an output port respectively
are
a) MOV, XCHG
b) MOV, IN
c) IN, MOV
d) IN, OUT
Answer: d
Explanation: The address of the input/output port may be specified directly or indirectly.
Example for input port: IN AX, DX; This instruction reads data from a 16-bit port whose address
is in DX and stores it in AX
Example for output port: OUT 03H, AL; This sends data available in AL to a port whose address
is 03H.
9. The instruction that is used for finding out the codes in case of code conversion problems is
a) XCHG
b) XLAT
c) XOR
d) JCXZ
Answer: b
Explanation: The translate
XLAT
instruction is used to find codes.
10. The instruction that loads effective address formed by destination operand into the specified
source register is
a) LEA
b) LDS
c) LES
d) LAHF
Answer: a
Explanation: The instruction, LEA loads effective address and is more useful for assembly
language rather than for machine language.
11. The instruction that loads the AH register with the lower byte of the flag register is
a) SAHF
b) AH
c) LAHF
d) PUSHF
Answer: c
Explanation: The instruction LAHF
LoadAHfromalowerbyteofFlag
may be used to observe the status of all the condition code flags
exceptoverflowflag
at a time.
12. The instruction that pushes the flag register on to the stack is
a) PUSH
b) POP
c) PUSHF
d) POPF
Answer: c
Explanation: The instruction PUSHF
pushflagstostack
pushes the flag register on to the stack.
13. The instruction that loads the flag register completely from the word contents of the memory
location is
a) PUSH
b) POP
c) PUSHF
d) POPF
Answer: d
Explanation: POPF is pop flags to stack.
14. The instruction that adds immediate data/contents of the memory location specified in an
instruction/register to the contents of another register/memory location is
a) SUB
b) ADD
c) MUL
d) DIV
Answer: b
Explanation: ADD instruction adds the data.
a) ADD
b) ADC
Answer: b
Explanation: ADC
AddwithCarry
instruction performs the same operation as ADD operation, but adds the carry flag bit to the
result.
To practice all areas of Microprocessors, here is complete set of 1000+ Multiple Choice
Questions and Answers .
This set of Microprocessors Interview Questions and Answers focuses on “Instruction Set of
8086/8088 – 2”.
1. The instruction, “INC” increases the contents of the specified register or memory location by
a) 2
b) 0
c) 1
d) 3
Answer: c
Explanation: This instruction adds 1 to the contents of the operand and so increments by 1.
2. The instruction that subtracts 1 from the contents of the specified register/memory location is
a) INC
b) SUBB
c) SUB
d) DEC
Answer: d
Explanation: The DEC instruction decrements the contents of a specified register/memory
location by 1.
a) DEC
b) SUB
c) SBB
a) direction flag
b) carry flag
c) parity flag
d) trap flag
Answer: b
Explanation: If borrow exists in the subtraction operation performed then carry flag is set.
a) memory location
b) register
c) immediate data
Answer: d
Explanation: The source operand is the element which is data or data stored memory location
on which operation is performed.
a) memory location
b) register
c) immediate data
Answer: d
Explanation: Since the destination should be able to store the data, immediate data cannot be
considered as a destination operand.
a) addition
b) subtraction
c) division
d) multiplication
Answer: b
Explanation: For comparison, the instruction CMP subtracts source operand from destination
operand.
a) memory
b) registers
c) stack
d) no where
Answer: d
Explanation: The result of subtraction operation is not stored anywhere during a comparison.
a) AAA
b) AAS
c) AAM
Answer: d
Explanation: All the ASCII adjust instructions give result in unpacked decimal form and so are
called as “Unpacked BCD arithmetic instructions”.
a) ADD
b) ADC
c) AAA
Answer: c
Explanation: AAA is a mnemonic. It doesn’t have either a source or destination operand.
11. The instruction in which adjustment is made before performing the operation is
a) AAA
b) AAS
c) AAM
d) AAD
Answer: d
Explanation: The AAD instruction converts two unpacked BCD digits in AH and AL to the
equivalent binary number in AL. This adjustment must be made before dividing the two
unpacked BCD digits.
Answer: c
Explanation: This instruction performs conversion operation.
13. The instruction that is used to convert the result of the addition of two packed BCD numbers
to a valid BCD number is
a) DAA
b) DAS
c) AAA
d) AAS
Answer: a
Explanation: In this conversion, the result has to be only in AL.
14. The ROR instruction rotates the contents of the destination operand to
a) left
b) right
Answer: b
Explanation: ROR stands for Rotate Right without carry. so, the instruction rotates right.
To practice all areas of Microprocessors for Interviews, here is complete set of 1000+ Multiple
Choice Questions and Answers .
This set of Microprocessors Questions and Answers for Freshers focuses on “Instruction Set of
8086/8088 – 3”.
a) AAA
b) AAS
c) AAM
d) AAD
Answer: d
Explanation: The AAD instruction converts two unpacked BCD digits in AH and AL to the
equivalent binary number in AL.
a) AAA
b) ADC
c) AAM
d) AAD
Answer: d
Explanation: Since the operation, AAD is performed before division operation is performed, the
carry flag, auxiliary flag and overflow flag are undefined.
3. The instruction that performs logical AND operation and the result of the operation is not
available is
a) AAA
b) AND
c) TEST
d) XOR
Answer: c
Explanation: In the TEST instruction, the logical AND operation is performed and the result is
not stored but flags are affected.
4. In the RCL instruction, the contents of the destination operand undergo function as
a) carry flag is pushed into LSB & MSB is pushed into the carry flag
b) carry flag is pushed into MSB & LSB is pushed into the carry flag
c) auxiliary flag is pushed into LSB & MSB is pushed into the carry flag
d) parity flag is pushed into MSB & LSB is pushed into the carry flag
Answer: a
Explanation: In RCL
Rotaterightthroughcarry
, for each operation, the carry flag is pushed into LSB and the MSB of the operand is pushed
into carry flag.
5. The instruction that is used as prefix to an instruction to execute it repeatedly until the CX
register becomes zero is
a) SCAS
b) REP
c) CMPS
d) STOS
Answer: b
Explanation: The instruction to which the REP is prefix, is executed repeatedly until CX register
becomes zero. When CX becomes zero, the execution proceeds to the next instruction in
sequence.
b) A-2,B-1,C-4,D-3
c) A-2,B-3,C-1,D-4
d) A-2,B-3,C-4,D-1
Answer: d
Explanation: By using the string instructions, the operations on strings can be performed.
7. The instructions that are used to call a subroutine from the main program and return to the
main program after execution of called function are
a) CALL, JMP
b) JMP, IRET
c) CALL, RET
d) JMP, RET
Answer: c
Explanation: At each CALL instruction, the IP and CS of the next instruction are pushed onto the
stack, before the control is transferred to the procedure. At the end of the procedure, the RET
instruction must be executed to retrieve the stored contents of IP & CS registers from a stack.
8. The instruction that unconditionally transfers the control of execution to the specified address
is
a) CALL
b) JMP
c) RET
d) IRET
Answer: b
Explanation: In this the control transfers to the address specified in the instruction and flags are
not affected by this instruction.
9. Which instruction cannot force the 8086 processor out of ‘halt’ state?
a) Interrupt request
b) Reset
c) Both interrupt request and reset
d) Hold
Answer: d
Explanation: Only an interrupt request or Reset will force the 8086 processor to come out of the
‘halt’ state.
a) Address
b) Delay
c) Memory location
Answer: b
Explanation: NOP is the No operation. It means that the processor performs no operation for the
clock cycle and thus there exists a delay.
a) HLT
b) CLC
c) LOCK
d) ESC
Answer: b
Explanation: Since CLC is a flag manipulation instruction where CLC stands for Clear Carry
Flag.
To practice all areas of Microprocessors for Freshers, here is complete set of 1000+ Multiple
Choice Questions and Answers .
MCQs
1. The assembler directives which are the hints using some predefined alphabetical strings are
given to
a) processor
b) memory
c) assembler
Answer: c
Explanation: These directives help the assembler to correctly understand the assembly
language programs to prepare the codes.
2. The directive used to inform the assembler, the names of the logical segments to be assumed
for different segments used in the program is
a) ASSUME
b) SEGMENT
c) SHORT
d) DB
Answer: a
Explanation: In ALP, each segment is given a name by using the directive ASSUME
SYNTAX: ASSUME segment:segment_name
Eg: ASSUME CS:Code
here CS is the Code segment and code is the name assumed to the segment.
Answer: d
Explanation: These directives are used for allocating memory locations in the available memory.
4. The directive that marks the end of an assembly language program is
a) ENDS
b) END
Answer: b
Explanation: The directive END is used to denote the completion of the program.
a) ENDS
b) END
Answer: a
Explanation: The directive ENDS is used to end a segment where as the directive END is used
to end the program.
6. The directive that updates the location counter to the next even address while executing a
series of instructions is
a) EVN
b) EVEN
c) EVNE
d) EQU
Answer: b
Explanation: The directive updates location counter to next even address if the current location
counter contents are not even.
7. The directive that directs the assembler to start the memory allotment for a particular
segment/block/code from the declared address is
a) OFFSET
b) LABEL
c) ORG
d) GROUP
Answer: c
Explanation: If an ORG is written then the assembler initiates the location counter to keep the
track of allotted address for the module as mentioned in the directive.
If the directive is not present, then the location counter is initialized to 0000H.
a) SEG
b) SEGMENT
d) PROC
Answer: b
Explanation: The directive SEGMENT indicates the beginning of the segment.
a) ASSUME
b) LOCAL
c) LABEL
d) EQU
Answer: d
Explanation: In this, the recurring/repeating value is assigned with a label. The label is placed
instead of the numerical value in the entire program code.
10. The labels or constants that can be used by any module in the program is possible when
they are declared as
a) PUBLIC
b) LOCAL
c) GLOBAL
Answer: c
Explanation: The labels, constants, variables, procedures declared as GLOBAL can be used by
any module in the program.
To practice all areas of Microprocessors, here is complete set of 1000+ Multiple Choice
Questions and Answers .
This set of Microprocessors Technical Interview Questions & Answers focuses on “Do’s and
Don’ts While Using Instructions”.
a) flowchart
b) algorithm
Answer: c
Explanation: The logic required for implementing a program must be visualized clearly which is
possible by flowchart and algorithm.
a) register, register
Answer: b
Explanation: Only one memory operand can be specified in one instruction.
a) MOV AX, BX
c) MOV 55H, BL
Answer: c
Explanation: 8-bit or 16-bit operand cannot be used as a destination operand.
4. The instruction that is not possible among the following is
Answer: d
Explanation: Both the operands cannot be memory operands.
a) register, register
Answer: c
Explanation: Since destination operand should not be immediate data.
6. The registers that cannot be used as operands for arithmetic and logical instructions are
b) pointers
c) index registers
d) segment registers
Answer: d
Explanation: Segment registers are not allowed as operands for arithmetic and logical
instructions.
a) registers
c) immediate operands
d) memory operands
Answer: b
Explanation: Both the operands should not be immediate operands and memory operands.
To practice all technical interview questions on Microprocessors, here is complete set of 1000+
Multiple Choice Questions and Answers .
MCQs
a) time consuming
c) debugging is difficult
Answer: d
Explanation: The machine level programming is complicated.
a) .ASM file
b) .OBJ file
c) .EXE file
d) .OBJECT file
Answer: b
Explanation: .OBJ file is created with same name as source file and extension .OBJ. It contains
the coded object modules of the program to be assembled.
c) debugging is easy
d) all of the mentioned
Answer: d
Explanation: The assembly level programming is more advantageous than the machine level
programming.
a) .ASP
b) .ALP
c) .ASM
d) .PGM
Answer: c
Explanation: All the files should have the extension, .ASM.
5. The directory that is under work must have the files that are related to
a) Norton’s editor
b) Assembler
c) Linker
Answer: d
Explanation: Before starting the process of entering a small program on PC, ensure that all the
files namely Norton’s editor, assembler, linker and debugger are available in the same directory
in which work is been done.
b) extension .LSF
Answer: d
Explanation: The listing file is automatically generated in the assembly process and is identified
by the entered or source file name and an extension .LST.
7. The extension file that is must for a file to be accepted by the LINK as a valid object file is
a) .OBJ file
b) .EXE file
c) .MASM file
d) DEBUG file
Answer: a
Explanation: The .OBJ extension is a must for a file to be accepted by the LINK as a valid object
file.
Answer: d
Explanation: The listing file contains total offset map of source file including labels, offset
addresses, opcodes, memory allotments for different directives and labels and relocation
information.
a) debugging
b) trouble shooting
Answer: c
Explanation: DEBUG.COM is a DOS utility that facilitates the debugging and trouble shooting.
a) .EXE files
b) .OBJ files
c) .EXE file and .OBJ file
Answer: a
Explanation: The DEBUG may be used either to debug a source program or to observe the
results of execution of an .EXE file.
To practice all areas of Microprocessors, here is complete set of 1000+ Multiple Choice
Questions and Answers .
MCQs
focuses on “Stack”.
a) first-in-first-out
b) first-in-last-out
c) last-in-first-out
d) last-in-last-out
Answer: c
Explanation: The stack follows last-in-first-out sequence.
2. If the processor is executing the main program that calls a subroutine, then after executing
the main program up to the CALL instruction, the control will be transferred to
b) subroutine address
Answer: b
Explanation: Since subroutine is called, to start the execution of the subroutine, the control is
transferred to the subroutine address.
Answer: d
Explanation: Stack is used for temporary storage of contents of registers and memory locations,
status of registers.
a) SP register
b) SS register
c) SP and SS register
Answer: c
Explanation: The stack is accessed using a pointer that is implemented using SP and SS
registers.
5. As the storing of data words onto the stack is increased, the stack pointer is
a) incremented by 1
b) decremented by 1
c) incremented by 2
d) decremented by 2
Answer: d
Explanation: The data is stored from top address of the stack and is decremented by 2.
a) incremented by 1
b) incremented by 2
c) decremented by 1
d) decremented by 2
Answer: b
Explanation: The data in the stack, may again be transferred back from a stack to register. At
that time, the stack pointer is incremented by 2.
7. The process of storing the data in the stack is called ……… the stack.
a) pulling into
b) pulling out
c) pushing into
d) popping into
Answer: c
Explanation: The data is pushed into the stack while loading the stack.
8. The reverse process of transferring the data back from the stack to the CPU register is known
as
Answer: d
Explanation: The data retrieved from stack is called popping off.
a) queue
c) stack
Answer: d
Explanation: If the books are arranged one on the other, then the book that is placed last will be
the first out.
a) data flow
b) data flow and uses queue
c) sequential flow
Answer: d
Explanation: Since PID temperature controller has steps that need to be sequentially executed
such as sampling the output, conversion of a signal with ADC, finding errors, deriving control
signals and applying the control signal to control flow of energy.
To practice all areas of Microprocessors, here is complete set of 1000+ Multiple Choice
Questions and Answers .
MCQs
Answer: c
Explanation: The stack pointer register contains the offset of the address of the stack segment.
Answer: b
Explanation: The stack segment register contains base address of the stack segment in the
memory. The stack pointer register
sP
and stack segment register
SS
together address the stack-top.
3. PUSH operation
a) decrements SP
b) increments SP
c) decrements SS
d) increments SS
Answer: a
Explanation: Each PUSH operation decrements the SP
StackPointer
register.
4. POP operation
a) decrements SP
b) increments SP
c) decrements SS
d) increments SS
Answer: b
Explanation: Each POP operation increments the SP
StackPointer
register.
5. The register or memory location that is pushed into the stack at the end must be
Answer: c
Explanation: The data can be retrieved by POP operation and as in stack, the data that is
pushed at the end must be popped off first.
6. In the instruction, ASSUME CS : CODE, DS : DATA, SS : STACK
Answer: d
Explanation: The directive ASSUME facilitates to name the segments with the desired name
that is not a mnemonic or keyword.
b) only SS is initialised
c) only SP is initialised
Answer: a
Explanation: Though the Stack segment is initialised, the SS and SP pointers must be
initialised.
Answer: c
Explanation: The number of PUSH instructions must be equal to the number of POP
instructions.
a) Arithmetic operations
b) logical operations
c) BCD operations
Answer: d
Explanation: The 8086 microprocessor does not support direct BCD packed operations.
10. For 8086 microprocessor, the stack segment may have a memory block of a maximum of
a) 32K bytes
b) 64K bytes
c) 16K bytes
d) NONE
Answer: b
Explanation: In 8086 microprocessor, the memory segments each have a memory of 64K bytes.
To practice all areas of Microprocessors, here is complete set of 1000+ Multiple Choice
Questions and Answers .
MCQs
Answer: c
Explanation: An interrupt function is to break the sequence of operation.
d) control unit
Answer: a
Explanation: An interrupt transfers the control to interrupt service routine
ISR
. After executing ISR, the control is transferred back again to the main program.
3. While executing the main program, if two or more interrupts occur, then the sequence of
appearance of interrupts is called
a) multi-interrupt
b) nested interrupt
Answer: d
Explanation: If an interrupt occurs while executing a program, and the processor is executing
the interrupt, if one more interrupt occurs again, then it is called a nested interrupt.
4. Whenever a number of devices interrupt a CPU at a time, and if the processor is able to
handle them properly, it is said to have
Answer: c
Explanation: The processor if handles more devices as interrupts then it has multiple interrupt
processing ability.
a) nonmaskable interrupt
b) nonmultiple interrupt
c) nonmovable interrupt
d) none of the mentioned
Answer: a
Explanation: NMI is the acronym for nonmaskable interrupt.
7. If any interrupt request given to an input pin cannot be disabled by any means then the input
pin is called
a) maskable interrupt
b) nonmaskable interrupt
Answer: b
Explanation: A nonmaskable interrupt input pin is one which means that any interrupt request at
NMI
nonmaskableinterrupt
input cannot be masked or disabled by any means.
a) maskable
b) nonmaskable
Answer: a
Explanation: the INTR
interruptrequest
is maskable or can be disabled.
a) direction flag
b) overflow flag
c) interrupt flag
d) sign flag
Answer: c
Explanation: If a microprocessor wants to serve any interrupt then interrupt flag, IF=1. If interrupt
flag, IF=0, then the processor ignores the service.
To practice all areas of Microprocessors, here is complete set of 1000+ Multiple Choice
Questions and Answers .
MCQs
a) internal interrupt
b) external interrupt
c) interrupt
Answer: b
Explanation: If an external device or a signal interrupts the processor from outside then it is an
external interrupt.
a) internal interrupt
b) external interrupt
c) interrupt-in-interrupt
Answer: a
Explanation: The internal interrupt is generated internally by the processor circuit or by the
execution of an interrupt instruction.
b) keyboard interrupt
c) overflow interrupt
d) type2 interrupt
Answer: b
Explanation: Since the keyboard is external to the processor, it is an external interrupt.
b) overflow interrupt
Answer: d
Explanation: Since the interrupts occur within the processor itself, they are called internal
interrupts.
a) NMI
b) TRAP
c) Divide by zero
Answer: d
Explanation: These requests are independent of IF flag.
6. The type of the interrupt may be passed to the interrupt structure of CPU from
b) stack
c) interrupt controller
Answer: c
Explanation: After an interrupt is acknowledged, the CPU computes the vector address from the
type of the interrupt that may be passed to the internal structure of the CPU from an interrupt
controller in case of external interrupts.
7. During the execution of an interrupt, the data pushed into the stack is the content of
a) IP
b) CS
c) PSW
Answer: d
Explanation: The contents of IP, CS and PSW are pushed into the stack during the execution.
8. After every response to the single step interrupt the flag that is cleared is
a) IF
InterruptFlag
b) TF
TrapFlag
c) OF
OverflowFlag
d) None of the mentioned
Answer: b
Explanation: If the trap flag is set then the processor enters the single step execution mode.
After the execution, the trap flag is cleared.
a) END
b) ENDS
c) IRET
d) INTR
Answer: c
Explanation: After the execution of the ISR, the control must go to the previous program
maybemainprogram
which was being executed. To execute it, IRET is placed at the end of ISR.
Answer: a
Explanation: When the instruction IRET is executed, the contents of flags, IP and CS which
were saved at the stack by the CALL instruction are retrieved to the respective registers.
To practice all areas of Microprocessors, here is complete set of 1000+ Multiple Choice
Questions and Answers .
MCQs
INTR
”.
1. The interrupt for which the processor has the highest priority among all the external interrupts
is
a) keyboard interrupt
b) TRAP
c) NMI
d) INT
Answer: c
Explanation: The Non-Maskable Interrupt input pin has the highest priority among all the
external interrupts.
2. The interrupt for which the processor has highest priority among all the internal interrupts is
a) keyboard interrupt
b) TRAP
c) NMI
d) INT
Answer: b
Explanation: TRAP is the internal interrupt that has highest priority among all the interrupts
except the Divide By Zero
Type0
exception.
3. In case of string instructions, the NMI interrupt will be served only after
a) initialisation of string
Answer: c
Explanation: When NMI is activated, the current instruction being executed is completed and
then NMI is served. In the case of string instructions, it is served after the complete string is
manipulated.
b) 3 clock cycles
c) 1 clock cycle
d) 2 clock cycles
Answer: d
Explanation: The NMI pin should remain high for atleast 2 clock cycles and need not be
synchronized with the clock for being sensed.
a) TRAP flag
b) INTERRUPT flag
c) MASK flag
d) DIRECTION flag
Answer: b
Explanation: The INTR signal can be masked by resetting the interrupt flag.
6. For the INTR signal, to be responded to in the next instruction cycle, it must go ________ in
the last clock cycle of the current instruction
a) high
b) low
c) high or low
d) unchanged
Answer: a
Explanation: The INTR signal must go high in the clock cycle of the current instruction in order
to respond in the next instruction cycle.
Answer: d
Explanation: At the end of each instruction, the status of the pending interrupts is checked.
a) set
b) reset
c) high
d) low
Answer: b
Explanation: The IF is automatically reset when the processor responds to an INTR signal. If the
processor wants to respond to any type of INTR signal further then, the IF should again be set.
activelowbased
is low at the trailing edge of the first ALE pulse, then till the start of the next machine cycle, the
pin LOCK
activelow
is
a) low
b) high
c) low or high
Answer: a
Explanation: The pin LOCK
activelow
remains low till the start of the next machine cycle.
activelow
, the INTA
activelow
a) 0 clock cycle
b) 1 clock cycle
c) 2 clock cycles
d) 3 clock cycles
Answer: c
Explanation: The INTA
activelow
goes low and remains low for two clock cycles before returning back to the high state.
To practice all areas of Microprocessors, here is complete set of 1000+ Multiple Choice
Questions and Answers .
This set of Microprocessors Interview Questions and Answers for freshers focuses on “Interrupt
Programming, Passing Parameters to Procedures, Handling Programs of Size More Than
64KB”.
Answer: a
Explanation: For both software and hardware, the method of defining the interrupt service
routine is the same.
2. While programming for any type of interrupt, the interrupt vector table is set
a) externally
b) through a program
Answer: c
Explanation: The programmer must, either externally or through the program, set the interrupt
vector table for that type preferably with the CS and IP addresses of the interrupt service
routine.
Answer: d
Explanation: To execute a program, first assemble it, link it and then execute it. After execution,
a new file RESULT is created in the directory. Then external pulse is applied to IRQ2 pin, and
this will again cause the execution of ISR into the file.
a) macros
b) segment
c) subroutines
d) none
Answer: c
Explanation: Procedures are also known as subroutines.
a) input data
b) output data
c) constants
Answer: d
Explanation: Procedures require input data or constants for their execution. Their data or
constants may be passed to the subroutine by the main program.
6. The technique that is used to pass the data or parameter to procedures in assembly
language program is by using
b) registers
c) stack
Answer: d
Explanation: The techniques that are used to pass the data or parameter to procedures are by
using global declared variable, registers of CPU, memory locations, stack, PUBLIC & EXTRN.
c) it uses stack
Answer: a
Explanation: If a procedure is interactive, then it accepts the inputs directly from input devices.
8. For passing the parameters to procedures using the PUBLIC & EXTRN directives, it must be
declared PUBLIC in the
a) subroutine
b) procedure
c) main routine
Answer: c
Explanation: For passing the parameters to procedures, it must be declared PUBLIC in the main
routine and the same should be declared EXTRN in the procedure.
9. The technique to estimate the size of an executable program, before it is assembled and
linked is
c) stack
d) none
Answer: d
Explanation: There is no technique to estimate the size of an executable program before it is
assembled and linked.
10. To estimate the size of an executable program before it is assembled and linked, the
programming methodology concerned is by writing
a) programs with more than one segment for data and code
Answer: d
Explanation: By writing programs with more than one segment for data, code or stack or by
writing programs with FAR subroutines each of size 64KB, the size of an executable program
can be estimated.
To practice all areas of Microprocessors for Interviews, here is complete set of 1000+ Multiple
Choice Questions and Answers .
MCQs
focuses on “Macros”.
1. If a number of instructions are repeating through the main program, then to reduce the length
of the program, __________ is used.
a) procedure
b) subroutine
c) macro
Answer: c
Explanation: For a certain number of instructions that are repeated in the main program, when
macro is defined then the code of a program is reduced by placing the name of the macro at
which the set of instructions are needed to be repeated.
a) initialising macro
d) defining a macro
Answer: d
Explanation: The process of assigning a label to the string is called defining a macro.
a) macro-within-macro
b) nested macro
c) macro-in-macro
Answer: b
Explanation: A macro may be called from inside a macro. This type of macro is called nested
macro.
a) beginning of a program
b) end of a program
d) anywhere in a program
Answer: d
Explanation: A macro can be defined anywhere in a program.
a) in data segment
b) to represent directives
c) to represent statements
Answer: d
Explanation: A macro may be used in data segment and can also be used to represent
statements and directives.
a) END
b) ENDS
c) ENDM
d) ENDD
Answer: c
Explanation: The ENDM directive marks the end of the instructions or statements sequence
assigned with the macro name.
7. Inserting the statements and instructions represented by macro, directly at the place of the
macroname, in the program, is known as
a) calling a macro
b) inserting a macro
c) initializing a macro
Answer: a
Explanation: Inserting the statements and instructions at the place of macroname, in the
program, is known as calling a macro.
8. The time required for execution of a macro is ________ that of the procedure.
a) greater than
b) less than
c) equal to
a) complete code of instruction string is inserted at each place, wherever the macroname
appears
Answer: c
Explanation: Macro does not require stack memory and hence has less time for execution.
a) START
b) BEGIN
c) MACRO
Answer: c
Explanation: The beginning of the macro is represented as macroname followed by the directive
MACRO.
SYNTAX: macroname MACRO
EXAMPLE: STRINGS MACRO.
To practice all areas of Microprocessors, here is complete set of 1000+ Multiple Choice
Questions and Answers .
MCQs
1. If ‘n’ denotes the number of clock cycles and ‘T’ denotes period of the clock at which the
microprocessor is running, then the duration of execution of loop once can be denoted by
a) n+T
b) n-T
c) n*T
d) n/T
Answer: c
Explanation: The duration of execution of the loop is the product of number of clock cycles and
the period of the clock cycle at which microprocessor is running.
a) stack
b) loop count
c) program counter
d) time duration
Answer: b
Explanation: As the microprocessor executes each instruction corresponding loop counter value
decreases and the microprocessor executes the instructions till the loop counter becomes zero.
3. In case of subroutines, the actual number of instructions executed by the processor depends
on
a) loop count
c) length of procedure
d) none
Answer: c
Explanation: In case of subroutines or interrupt service routines, the number of instructions
executed by the processor depends on the length of procedure
orsubroutine
or length of interrupt service routine along with the main calling program.
Answer: d
Explanation: The delays can be generated step wise.
Answer: a
Explanation: The count N can be defined as the required time delay by the duration for
execution of the loop once.
Count, N = required delay
Td
/duration for execution of the loop once
n∗T
.
if the zeroth condition is satisfied then, for execution, the JNZ instruction takes
a) 1 clock cycle
b) 2 clock cycles
c) 3 clock cycles
d) 4 clock cycles
Answer: d
Explanation: The JNZ instruction takes only 4 clock cycles if the zeroth condition is satisfied.
7. In the instruction set,
if the zeroth condition is not satisfied, then the JNZ instruction takes
a) 2 clock cycles
b) 8 clock cycles
c) 16 clock cycles
d) 64 clock cycles
Answer: c
Explanation: The JNZ instruction takes 16 clock cycles if the zeroth condition is not satisfied.
a) memory usage
Answer: d
Explanation: The maximum count value of 16-bit count register is FFFFH. This may put the
limitation on the maximum delay that can be generated using the instructions.
Answer: a
Explanation: One or more count registers can be used to serve large delays.
To practice all areas of Microprocessors, here is complete set of 1000+ Multiple Choice
Questions and Answers .
MCQs
a) one dimensional
b) two dimensional
c) three dimensional
d) none
Answer: b
Explanation: The semiconductor memories are organised as two dimensions of an array which
consists of rows and columns.
2. If a location is selected, then all the bits in it are accessible using a group of conductors called
a) control bus
b) address bus
c) data bus
Answer: c
Explanation: The bits in a selected location are accessible using data bus.
3. To address a memory location out of N memory locations, the number of address lines
required is
a) log N
tothebase2
b) log N
tothebase10
c) log N
tothebasee
d) log
2N
tothebasee
Answer: a
Explanation: For n memory locations, log n
tothebaseof2
address lines are required. For addressing 4K bytes of memory, 12 address lines are required
since log
4KB
=log
4∗1024
=log(2 12 )=12.
4. If the microprocessor has 10 address lines, then the number of memory locations it is able to
address is
a) 512
b) 1024
c) 2048
d) none
Answer: b
Explanation: Since for n address lines, the number of memory locations able to address is 2^n.
5. In static memory, the upper 8-bit bank of an available 16-bit memory chip is called
Answer: d
Explanation: In static memory, the upper 8-bit bank is called odd address memory bank.
6. In static memory, the lower 8-bit bank of an available 16-bit memory chip is called
Answer: b
Explanation: In static memory, the lower 8-bit bank is called even address memory bank.
7. In most of the cases, the method used for decoding that may be used to minimise the
required hardware is
a) absolute decoding
b) non-linear decoding
c) linear decoding
d) none
Answer: c
Explanation: In general, linear decoding is used to minimise the required hardware.
8. To obtain 16-bit data bus width, the two 4K*8 chips of RAM and ROM are arranged in
a) parallel
b) serial
c) both serial and parallel
Answer: a
Explanation: The two 4K*8 chips of RAM and ROM are arranged in parallel.
9. If
addressline
Answer: c
Explanation: If Ao=0 then address is even and is in RAM. If Ao=1 then, address is odd and is in
RAM.
activelow
selected will be
a) RAM
b) ROM
d) ONLY RAM
Answer: c
Explanation: If at a time Ao and BHE
activelow
both are zero, then both RAM and ROM are selected.
To practice all areas of Microprocessors, here is complete set of 1000+ Multiple Choice
Questions and Answers .
MCQs
b) low cost
Answer: d
Explanation: The dynamic RAM is advantageous than the static RAM as it has a higher packing
density, lower cost and less power consumption.
a) Static RAM
b) Dynamic RAM
d) ROM
Answer: b
Explanation: Dynamic RAM is preferred for large memory.
3. If a typical static RAM cell requires 6 transistors then corresponding dynamic RAM requires
Answer: a
Explanation: The hardware complexity of dynamic RAM is lesser than that of static RAM.
4. To store the charge as a representation of data, the basic dynamic RAM cell uses
a) resistor
b) capacitor
c) diode
d) transistor
Answer: c
Explanation: The basic dynamic RAM cell uses capacitance to store the charge as a
representation of data. This capacitor is manufactured as a diode that is reverse biased so that
the storage capacitance is obtained.
5. The process of refreshing the data in the RAM to reduce the possibility of data loss is known
as
a) data cycle
b) regain cycle
c) retain cycle
d) refresh cycle
Answer: d
Explanation: The data storage in RAM which is capacitance
reverse−biaseddiode
may have a leakage current that tends to discharge the capacitor giving rise to possibility of
data loss. To avoid this, the data must be refreshed after a fixed time interval regularly.
6. The field in which dynamic RAM is more complicated than static RAM is
a) complexity
b) interfacing circuit
c) execution unit
d) cost
Answer: b
Explanation: The refresh mechanism and the additional hardware required makes the
interfacing circuit of dynamic RAM more complicated than that of static RAM.
7. Memory refresh activity is
a) initialised by processor
Answer: c
Explanation: The refresh operation is independent regular activity that is initialised and carried
out by the refresh mechanism.
8. The number of memory chips that are enabled at a time for refresh activity is
a) 2
b) 4
c) 8
d) more than 1
Answer: d
Explanation: More than one memory chip can be enabled at a time to refresh activity to reduce
the number of total memory refresh cycles.
9. A timer that derives pulse for refreshing action or time for which a dynamic RAM cell can hold
data charge level practically constant is
a) constant timer
c) refresh timer
d) qualitative timer
Answer: c
Explanation: Refresh timer derives a pulse for refreshing action after each refresh interval which
can be qualitatively defined as the time for which a dynamic RAM cell can hold data charge
level practically constant.
10. If ‘n’ denotes the number of rows that are to be refreshed in a single refresh interval, ‘td’
denotes the range of time it may take then, refresh time
tr
can be defined as
a) n*td
b) td/n
c) n/td
d) td n
Answer: b
Explanation: Refresh time is the ratio of time duration taken for refreshing to the number of rows
that are refreshed. Refresh frequency is the reciprocal of refresh time.
To practice all areas of Microprocessors, here is complete set of 1000+ Multiple Choice
Questions and Answers .
MCQs
1. The device that enables the microprocessor to read data from the external devices is
a) printer
b) joystick
c) display
d) reader
Answer: b
Explanation: Since joystick is an input device, it reads data from the external devices.
a) CRT display
b) 7-segment display
c) Printer
Answer: d
Explanation: The output device transfers data from the microprocessor to the external devices.
3. The input and output operations are respectively similar to the operations,
a) read, read
b) write, write
c) read, write
d) write, read
Answer: c
Explanation: The input activity is similar to read operation and the output activity is similar to
write operation.
activelow
performs
Answer: b
Explanation: IOWR
activelow
operation means writing data to an output device and not an input device.
Answer: c
Explanation: If the output port is to source large currents, the port lines must be buffered. So,
the latch is used as it acts as a good output port.
6. While performing read operation, one must take care that much current should not be
Answer: c
Explanation: More current should not be sourced or sinked from data lines while reading to
avoid loading.
a) latch
b) flipflop
c) buffer
d) tristate buffer
Answer: d
Explanation: A tristate buffer is used as an input device to overcome loading.
a) bidirectional buffer
Answer: d
Explanation: The chip 74LS245 is a bidirectional buffer that contains 8 buffers and may be used
as an 8-bit input port. But while using as an input device, only one direction is useful.
a) inputs to outputs
b) outputs to inputs
c) source to sink
d) sink to source
Answer: a
Explanation: If DIR is 1, then the direction is from A
inputs
to B
outputs
.
b) memory locations
Answer: b
Explanation: In memory-mapped scheme, the devices are viewed as memory locations and are
addressed likewise.
To practice all areas of Microprocessors, here is complete set of 1000+ Multiple Choice
Questions and Answers .
MCQs
ProgrammableInput–OutputPort
”.
Answer: b
Explanation: The parallel input-output port chip 8255 is also known as programmable peripheral
input-output port.
a) input port
b) output port
Answer: c
Explanation: Port C can function independently either as input or as output ports.
3. All the functions of the ports of 8255 are achieved by programming the bits of an internal
register called
Answer: c
Explanation: By programming the bits of control word register, the operations of the ports are
specified.
c) data bus
Answer: b
Explanation: The data bus buffer is controlled by read/write control logic.
b) A1
c) WR
ACTIVELOW
Answer: d
Explanation: RD
ACTIVELOW
, WR
ACTIVELOW
, A1, A0, RESET are the inputs provided by the microprocessor to the read/write control logic of
8255.
6. The device that receives or transmits data upon the execution of input or output instructions
by the microprocessor is
Answer: c
Explanation: 3-state bidirectional buffer is used to receives or transmits data upon the execution
of input or output instructions by the microprocessor.
7. The port that is used for the generation of handshake lines in mode 1 or mode 2 is
a) port A
b) port B
c) port C Lower
d) port C Upper
Answer: d
Explanation: Port C upper is used for the generation of handshake lines in mode 1 or mode 2.
8. If A1=0, A0=1 then the input read cycle is performed from
Answer: b
Explanation: If A1=0, A0=1 then the input read cycle is performed from port B to data bus.
a) CS
activelow
=1
b) CS
activelow
=0
c) CS
activelow
= 0, RD
activelow
= 1, WR
activelow
=1
d) CS
activelow
= 1 OR CS
activelow
= 0, RD
activelow
= 1, WR
activelow
=1
Answer: d
Explanation: The data bus is tristated when chip select pin=1 or chip select pin=0 and read and
write signals are high i.e 1.
10. The pin that clears the control word register of 8255 when enabled is
a) CLEAR
b) SET
c) RESET
d) CLK
Answer: c
Explanation: If reset pin is enabled then the control word register is cleared.
To practice all areas of Microprocessors, here is complete set of 1000+ Multiple Choice
Questions and Answers .
MCQs
a) reset pins
b) set pins
Answer: c
Explanation: In BSR
BitSet−Reset
Mode, port C can be used to set and reset its individual port bits.
Answer: d
Explanation: In mode 0, any port can be used as input or output and output ports are latched.
a) mode 0
b) mode 1
c) mode 2
d) none
Answer: b
Explanation: In this mode, the handshaking signals control the input or output action of the
specified port.
Answer: a
Explanation: If the value of the pin STB
StrobeInput
falls to low level, the input port is loaded into input latches.
6. The signal, SLCT in the direction of signal flow, OUT, indicates the selection of
b) CPU
c) Printer
d) Ports
Answer: c
Explanation: This signal indicates that the printer is selected.
7. The pulse width of the signal INIT at the receiving terminal must be more than
a) 10 microseconds
b) 20 microseconds
c) 40 microseconds
d) 50 microseconds
Answer: d
Explanation: The pulse width of the signal must be more than 50microseconds at the receiving
terminal.
activelow
becomes ‘low’ when the printer is in
b) Offline state
c) Error state
Answer: d
Explanation: The level of the signal ERROR
activelow
becomes ‘low’ when the printer is in the Paper end state, Offline state and Error state.
9. The signals that are provided to maintain proper data flow and synchronization between the
data transmitter and receiver are
a) handshaking signals
b) control signals
c) input signals
d) none
Answer: a
Explanation: Handshaking signals maintain proper data flow and synchronization.
Answer: d
Explanation: In mode 2 of 8255, a single 8-bit port is available i.e group A.
To practice all areas of Microprocessors, here is complete set of 1000+ Multiple Choice
Questions and Answers .
This set of Microprocessors Puzzles focuses on “Interfacing Analog to Digital Data Converters”.
1. The time taken by the ADC from the active edge of SOC
startofconversion
endofconversion
signal is called
a) edge time
b) conversion time
c) conversion delay
d) time delay
Answer: c
Explanation: Broadly speaking, the time taken by the converter to calculate the equivalent digital
data output from the moment of the start of conversion is called conversion delay.
a) successive approximation
d) none
Answer: c
Explanation: Successive approximation and dual slope integration are the most popular
techniques that are used in the integrated ADC chips.
Answer: d
Explanation: The general algorithm for interfacing ADC contains ensuring the stability of analog
input, issuing start of conversion pulse to ADC, reading end of conversion signal to mark the
end of a conversion process, reading digital data output of ADC as equivalent digital output.
a) AD 7523
b) 74373
c) 74245
d) ICL7109
Answer: d
Explanation: AD 7523 is a DAC
Digitaltoanalogconverter
, 74373 is a latch, 74245 is transceiver and ICL7109 is an ADC.
a) 100 milliseconds
b) 100 microseconds
c) 50 milliseconds
d) 50 milliseconds
Answer: b
Explanation: The conversion delay is 100microseconds which is low as compared to other
converters.
6. The number of inputs that can be connected at a time to an ADC that is integrated with
successive approximation is
a) 4
b) 2
c) 8
d) 16
Answer: c
Explanation: As these converters internally have 3:8 analog multiplexer, at a time 8 different
analog inputs can be connected to the chip.
7. ADC 7109 integrated by Dual slope integration technique is used for
c) low complexity
Answer: d
Explanation: Compared to other 12-bit ADCs, it is of very low cost and useful for slow practical
applications.
8. Which of the following is not one of the phases of the total conversion cycle?
a) autozero phase
b) conversion phase
d) disintegrate phase
Answer: b
Explanation: Autozero phase, signal integrate phase and disintegrate phase are the three
phases of total conversion cycle.
a) autozero phase
c) disintegrate phase
d) none
Answer: a
Explanation: A feedback loop is closed around the system to charge the autozero capacitor to
compensate for the offset voltages in the buffer amplifier, integrator and comparator.
10. In the signal integrate phase, the differential input voltage between IN LO
inputlow
and IN HI
inputhigh
Answer: c
Explanation: The internal integrator needs 2048 clock cycles to integrate voltage difference
between input low and input high.
To practice all Puzzles on Microprocessors, here is complete set of 1000+ Multiple Choice
Questions and Answers .
This set of Microprocessors Questions and Answers for Experienced people focuses on
“Interfacing Digital to Analog Converters, Stepper Motor Interfacing and Control of High Power
Devices Using 8255”.
1. DAC
DigitaltoAnalogConverter
finds application in
Answer: d
Explanation: DAC is used in digitally controlled gains, motor speed controls and programmable
gain amplifiers.
2. To save the DAC from negative transients the device connected between OUT1 and OUT2 of
AD 7523 is
b) Zener
c) FET
d) BJT
BipolarJunctiontransistor
Answer: b
Explanation: Zener is connected between OUT1 and OUT2 pins of AD7523 to save from
negative transients.
c) as current-to-voltage converter
Answer: d
Explanation: An operational amplifier is used as a current-to-voltage converter to convert the
current output to output voltage and also provides additional driving capability to the DAC.
a) 100 milliseconds
b) 100 microseconds
c) 50 milliseconds
d) 50 microseconds
Answer: a
Explanation: DAC 0800 has a settling time of 100 milliseconds.
5. The device that is used to obtain an accurate position control of rotating shafts in terms of
steps is
a) DC motor
b) AC motor
c) Stepper motor
d) Servo motor
Answer: c
Explanation: Stepper motor employs rotation of its shaft in terms of steps, rather than
continuous rotation as in case of AC or DC motors.
a) 1 winding
b) 2 windings
c) 3 windings
d) 4 windings
Answer: d
Explanation: The internal schematic of a typical stepper motor has 4 windings.
7. The number of pulses required for one complete rotation of the shaft of the stepper motor is
equal to the
Answer: a
Explanation: The number of pulses required for one complete rotation of the shaft of the stepper
motor is equal to the number of internal teeth on its rotor.
a) rotating scheme
b) shaft scheme
c) wave scheme
d) none
Answer: c
Explanation: In this scheme, the windings are applied with the required voltage pulses, in a
cyclic fashion.
9. The firing angles of thyristors are controlled by
b) relaxation oscillators
c) microprocessor
Answer: d
Explanation: In early days, the firing angles were controlled by a pulse generating circuits like
relaxation oscillators and now, they are accurately fired using a microprocessor.
b) isolation
d) none
Answer: c
Explanation: Any switching component of a high power circuit may be sufficient to damage the
microprocessor system. So, to protect the low power circuit isolation transformers are used.
They are also used if isolation is necessary.
To practice all areas of Microprocessors for Experienced people, here is complete set of 1000+
Multiple Choice Questions and Answers .
MCQs
1. The number of counters that are present in the programmable timer device 8254 is
a) 1
b) 2
c) 3
d) 4
Answer: c
Explanation: There are three counters that can be used as either counters or delay generators.
a) read operation
b) write operation
d) none
Answer: b
Explanation: The control word register can only be written and cannot be read.
3. The mode that is used to interrupt the processor by setting a suitable terminal count is
a) mode 0
b) mode 1
c) mode 2
d) mode 3
Answer: a
Explanation: Mode 0 is also called as an interrupt on the terminal count.
N−1
a) 1 clockcycle
b) 2 clockcycles
c) 3 clockcycles
d) 4 clockcycles
Answer: a
Explanation: After
N−1
cycles, the output becomes low for only 1 clockcycle. If the count N is reloaded and again the
output becomes high and remains so for
N−1
clock pulses.
a) mode 1
b) mode 2
c) mode 3
d) mode 4
Answer: c
Explanation: When the count N loaded is even, then for half of the count, the output remains
high and for the remaining half it remains low. If the count loaded is odd, the first clock pulse
decrements it by 1 resulting in an even count value.
6. In control word register, if SC1=0 and SC0=1, then the counter selected is
a) counter 0
b) counter 1
c) counter 2
d) none
Answer: b
Explanation: SC denotes select counter.
Answer: c
Explanation: To access 16 bit, first LSB is loaded first, and then MSB.
a) decimal count
b) hexadecimal count
c) binary count
d) octal count
Answer: b
Explanation: If BCD=0 then hexadecimal count. If BCD=1, then the operation is BCD count.
Answer: b
Explanation: If the GATE signal is enabled, then the counter starts counting.
b) selection of counters
Answer: d
Explanation: The control word register contents are used for
i) initializing the operating modes
mode0−mode4
a) 1
b) 3
c) 5
d) 7
Answer: c
Explanation: The processor 8085 has five hardware interrupt pins. Out of these five, four pins
were alloted fixed vector addresses but the pin INTR was not alloted by vector address, rather
an external device was supposed to hand over the type of the interrupt to the microprocessor.
2. The register that stores all the interrupt requests in it in order to serve them one by one on a
priority basis is
b) In-Service Register
c) Priority resolver
Answer: a
Explanation: The interrupts at IRQ input lines are handled by Interrupt Request Register
internally.
3. The register that stores the bits required to mask the interrupt inputs is
a) In-service register
b) Priority resolver
d) None
Answer: c
Explanation: Also, Interrupt Mask Register operates on IRR
InterruptRequestRegister
at the direction of the Priority Resolver.
a) manages interrupts
Answer: d
Explanation: The interrupt control logic performs all the operations that are involved within the
interrupts like accepting and managing interrupt acknowledge signals, interrupts.
a) 4
b) 8
c) 16
d) 64
Answer: d
Explanation: A single 8259A provides 8 vectored interrupts. In cascade mode, 64 vectored
interrupts can be provided.
6. When the PS
activelow
/EN
activelow
b) buffer enable
c) buffer disable
d) none
Answer: b
Explanation: When the pin is used in buffered mode, then it can be used as a buffer enable to
control buffer transreceivers. If it is not used in buffered mode, then the pin is used as input to
designate whether the chip is used as a master or a slave.
b) IMR is cleared
Answer: d
Explanation: The initialization procedure involves
i) edge sense circuit is reset.
ii) IMR is cleared.
iii) IR7 input is assigned the lowest priority.
iv) slave mode address is set to 7
v) special mask mode is cleared and the status read is set to IRR.
Answer: b
Explanation: When non-specific EOI command is issued to 8259A it will automatically reset the
highest ISR.
9. In the application where all the interrupting devices are of equal priority, the mode used is
a) Automatic rotation
c) Specific rotation
d) EOI
Answer: a
Explanation: The automatic rotation is used in the applications where all the interrupting devices
are of equal priority.
To practice all areas of Microprocessors, here is complete set of 1000+ Multiple Choice
Questions and Answers .
MCQs
1. The registers that store the keyboard and display modes and operations programmed by
CPU are
c) Return buffers
Answer: b
Explanation: The control and timing register to store the keyboard and display modes and other
operations programmed by CPU.
a) keyboard mode
Answer: c
Explanation: In this mode, each key code of the pressed key is entered in the order of the entry,
and in the meantime, read by the CPU, till the RAM becomes empty.
3. The registers that hold the address of the word currently being written by the CPU from the
display RAM are
Answer: d
Explanation: The display address registers holds the address of the word currently being written
or read by the CPU to or from the display RAM.
Answer: c
Explanation: In scanned keyboard mode with 2 key lockout mode of operation, when a key is
pressed, a debounce logic comes into operation. During the next two scans, other keys are
checked for closure and if no other key is pressed then the first pressed key is identified.
5. The mode that is programmed using “end interrupt/error mode set command” is
Answer: a
Explanation: The scanned keyboard special error mode is programmed using end interrupt/error
mode set command. This mode is valid only under the N-key rollover mode.
6. When a key is pressed, the debounce circuit waits for 2 keyboard scans and then checks
whether the key is still depressed in
7. The data that is entered from the left side of the display unit is of
d) none
Answer: a
Explanation: The data that is entered from the left side of the display unit is of left entry mode,
as in a type-writer the first character typed appears at the left-most position, while the
subsequent characters appear successively to the right of the first one.
a) keyboard mode
Answer: c
Explanation: Overrun error occurs when an already full FIFO has attempted an entry. Underrun
error occurs when an empty FIFO read is attempted.
9. The flag that increments automatically after each read or write operation to the display RAM
is
a) IF
b) RF
c) AI
d) WF
Answer: c
Explanation: AI refers to auto increment flag.
10. If any change in sensor value is detected at the end of a sensor matrix scan, then the IRQ
line
a) goes low
b) goes high
c) remains unchanged
d) none
Answer: b
Explanation: In sensor matrix mode, the IRQ line goes high, if any change in sensor value is
detected at the end of a sensor matrix scan or the sensor RAM has a previous entry to be read
by the CPU.
To practice all areas of Microprocessors, here is complete set of 1000+ Multiple Choice
Questions and Answers .
MCQs
a) simplex
b) duplex
c) semi duplex
d) half duplex
Answer: c
Explanation: Basically, there are three modes of data transmission. simplex, duplex and half
duplex.
2. If the data is transmitted only in one direction over a single communication channel, then it is
of
a) simplex mode
b) duplex mode
Answer: a
Explanation: In simplex mode, the data transmission is unidirectional. For example, a CPU may
transmit data for a CRT display unit in this mode.
3. If the data transmission takes place in either direction, but at a time data may be transmitted
only in one direction then, it is of
a) simplex mode
b) duplex mode
Answer: d
Explanation: In half duplex mode, data transmission is bidirectional but not at a time. For
example, Walkie-Talkie.
4. In 8251A, the pin that controls the rate at which the character is to be transmitted is
a) TXC
activelow
b) TXC
activehigh
c) TXD
activelow
d) RXC
activelow
Answer: a
Explanation: Transmitter Clock Input
TXC(activelow
) is a pin that controls the rate at which the character is to be transmitted.
5. TXD
TransmittedDataOutput
pin carries serial stream of the transmitted data bits along with
a) start bit
b) stop bit
c) parity bit
Answer: d
Explanation: Transmitted Data Output pin carries a serial stream of the transmitted data bits
along with other information like start bits, stop bits and parity bits etc.
6. The signal that may be used either to interrupt the CPU or polled by the CPU is
a) TXRDY
Transmitterready
b) RXRDY
Receiverreadyoutput
c) DSR
activelow
d) DTR
activelow
Answer: b
Explanation: RXRDY
Receiverreadyoutput
may be used either to interrupt the CPU or polled by the CPU.
Answer: d
Explanation: RS232C has been used for long and has a few disadvantages like limited speed of
communication, high-voltage level signaling and big-size communication adapters.
Answer: d
Explanation: The USB standards support the signaling rates. Also, USB signaling is
implemented in a differential in low- and full-speed options.
9. The bit packet that commands the device either to receive data or transmit data in
transmission of USB asynchronous communication is
a) Handshake packet
b) Token packet
c) PRE packet
d) Data packet
Answer: b
Explanation: The token packet is the second type of packet which commands the device either
to receive data or transmit data.
a) Handshake packet
b) Token packet
c) PRE packet
d) Data packet
Answer: c
Explanation: PRE packets are only of importance to low-speed USB devices.
To practice all areas of Microprocessors, here is complete set of 1000+ Multiple Choice
Questions and Answers .
MCQs
a) directly
b) indirectly
Answer: a
Explanation: In direct memory access mode, the data may transfer directly without the
interference from the CPU.
2. In 8257
DMA
Answer: b
Explanation: The DMA supports four channels, and each of the channels has a pair of two 16-bit
registers, namely DMA address register and a terminal count register.
Answer: c
Explanation: The two common registers for all the four channels of DMA are mode set register
and status register.
4. In 8257 register format, the selected channel is disabled after the terminal count condition is
reached when
Answer: d
Explanation: If the TC STOP bit is set, the selected channel is disabled after the terminal count
condition is reached, and it further prevents any DMA cycle on the channel.
5. The IOR
activelow
b) master mode
Answer: b
Explanation: The IOR
activelow
is an active low bidirectional tristate input line, that acts as input in the slave mode, and acts as
output in the master mode. In master mode, this signal is used to read data from a peripheral
during a memory write cycle.
6. The IOW
activelow
Answer: d
Explanation: In its slave mode, the IOW
activelow
loads the contents of a data bus to 8-bit mode register, upper/lower byte of 16-bit DMA address
register or terminal count register.
7. The pin that disables all the DMA channels by clearing the mode registers is
a) MARK
b) CLEAR
c) RESET
d) READY
Answer: c
Explanation: The RESET pin which is asynchronous input disables all the DMA channels by
clearing the mode registers, and tristate all the control lines.
a) HLDA
b) HRQ
c) ADSTB
Answer: b
Explanation: The hold request output requests the access of the system bus.
9. The pin that is used to write data to the addressed memory location, during DMA write
operation is
a) MEMR
activelow
b) AEN
c) MEMW
activelow
d) IOW
activelow
Answer: c
Explanation: The MEMW
activelow
is used to write data to the addressed memory location, during DMA write operation.
10. The pin that strobes the higher byte of the memory address, generated by the DMA
controller into the latches is
a) AEN
b) ADSTB
c) TC
Answer: b
Explanation: The pin ADSTB strobes the higher byte of the memory address, generated by the
DMA controller into the latches.
To practice all areas of Microprocessors, here is complete set of 1000+ Multiple Choice
Questions and Answers .
MCQs
b) write operation
c) read operation
Answer: d
Explanation: The 8257 can accomplish three types of operations and they are
i) verify DMA operation
ii) write operation
iii) read operation.
2. The bus is available when the DMA controller receives the signal
a) HRQ
b) HLDA
c) DACK
Answer: b
Explanation: If the HLDA signal is received by the DMA controller, it indicates that the bus is
available.
3. To indicate the I/O device that its request for the DMA transfer has been honored by the CPU,
the DMA controller pulls
a) HLDA signal
b) HRQ signal
c) DACK
activelow
d) DACK
activehigh
Answer: c
Explanation: The DACK
activelow
line of the used channel is pulled down by the DMA controller to indicate the I/O device that its
request for the DMA transfer has been honored by the CPU.
4. If more than one channel requests service simultaneously, the transfer will occur as
a) multi transfer
b) simultaneous transfer
c) burst transfer
Answer: c
Explanation: If more than one channel requests service simultaneously, then the transfer occurs
as a burst or continuous transfer.
5. The continuous transfer may be interrupted by an external device by pulling down the signal
a) HRQ
b) DACK
activelow
c) DACK
activehigh
d) HLDA
Answer: d
Explanation: The burst or continuous transfer may be interrupted by an external device by
pulling down the HLDA line.
a) 2
b) 4
c) 8
Answer: b
Explanation: The 8257 uses four clock cycles to complete a transfer.
7. In 8257, if each device connected to a channel is assigned to a fixed priority then it is said to
be in
Answer: b
Explanation: In this scheme, the DRQ3 has the lowest priority followed by DRQ2 and DRQ1.
The DRQ0 has the highest priority.
Answer: a
Explanation: In this scheme, the priorities assigned to the channels are not fixed.
d) Status register
Answer: c
Explanation: The selected register may be read or written depending on the instruction executed
by the CPU. But only write operation can be performed on the mode set register.
a) write operation
b) read operation
Answer: b
Explanation: The status register can only be read.
To practice all areas of Microprocessors, here is complete set of 1000+ Multiple Choice
Questions and Answers .
MCQs
1. The block of 8237 that decodes the various commands given to the 8237 by the CPU is
c) priority block
Answer: b
Explanation: The program control block decodes various commands given to the 8237 by the
CPU before servicing a DMA request.
2. The priority between the DMA channels requesting the services can be resolved by
c) priority block
Answer: c
Explanation: The priority encoder block resolves the priority between the DMA channels
requesting the services.
d) command register
Answer: b
Explanation: The current address register holds the current memory address. The current
address register is accessed during the DMA transfer.
4. The register that holds the data byte transfers to be carried out is
d) command register
Answer: a
Explanation: The current word register is a 16-bit register that holds the data transfers. The
word count is decremented after each transfer, and the new value is stored again in the register.
5. When the count becomes zero in the current word register then
c) EOP
endofprocess
is generated
Answer: c
Explanation: When the count becomes zero, the EOP signal is generated. This can be written in
successive bytes by the CPU, in program mode.
a) bit-wise
b) byte-wise
Answer: b
Explanation: The current address register is byte-wise programmed by the CPU, i.e. lower byte
first and the higher byte later.
internally
Answer: c
Explanation: The contents of base address register cannot be read by the CPU. These contents
are used internally for auto-initialization.
8. The register that maintains an original copy of the respective initial current address register
and current word register is
a) mode register
c) command register
d) mask register
Answer: b
Explanation: The base address register maintains an original copy of the current address
register and current word register, before incrementing or decrementing.
9. The register that can be automatically incremented or decremented, after each DMA transfer
is
a) mask register
b) mode register
c) command register
Answer: d
Explanation: The address is automatically incremented or decremented after each DMA
transfer, and the resulting address value is again stored in the current address register.
a) memory read
b) memory write
c) verify transfer
Answer: d
Explanation: Memory read, memory write and verify transfer are the three types of DMA
transfer.
To practice all areas of Microprocessors, here is complete set of 1000+ Multiple Choice
Questions and Answers .
This set of Microprocessors Question Paper focuses on “Programmable DMA Interface 8237
-2”.
b) generation of TC
Answer: d
Explanation: In the request register, each bit is set or reset under program control or is cleared
upon generation of a TC or an external EOP.
2. The register that holds the data during memory to memory data transfer is
a) mode register
b) temporary register
c) command register
d) mask register
Answer: b
Explanation: The temporary register holds the data during memory to memory data transfers.
After the completion of the transfer operation, the last word transferred remains in the temporary
register, until it is cleared by a reset operation.
3. The register that keeps track of all the DMA channel pending requests and status of their
terminal counts is
a) mask register
b) request register
c) status register
d) count register
Answer: c
Explanation: The status register keeps track of all the DMA channel pending requests, and
status of their terminal counts. These are cleared upon reset.
4. The pin that clears the command, request and temporary registers, and internal first/last
flipflop when it is set is
a) CLEAR
b) SET
c) HLDA
d) RESET
Answer: d
Explanation: A high on the reset pin clears the command, status, request and temporary
registers, and also clears the internal first/last flipflop.
5. The DMA request input pin that has the highest priority is
a) DREQ0
b) DREQ1
c) DREQ2
d) DREQ3
Answer: a
Explanation: DREQ0 has the highest priority while DREQ3 has the lowest one. The priorities of
the DREQ lines is programmable.
6. When interface 8237 does not have any valid pending DMA request then it is said to be in
a) active state
b) passive state
c) idle state
Answer: c
Explanation: If 8237 is in idle state, then CPU may program it in this state.
Answer: c
Explanation: A memory to memory transfer is a two cycle operation and requires a read from
and write-to memory cycle, to complete each DMA transfer.
8. In demand transfer mode of 8237, the device stops data transfer when
a) a TC
terminalcount
is reached
b) an external EOP
activelow
is detected
Answer: d
Explanation: In demand transfer mode, the device continues transfers till a TC is reached or an
external EOP is detected or the DREQ signal goes inactive.
9. The mode of 8237 in which the device transfers only one byte per request is
d) cascade mode
Answer: b
Explanation: In single mode, the device transfers only one byte per request. For each transfer,
the DREQ must be active until the DACK is activated.
10. The transfer of a block of data from one set of memory address to another takes place in
d) cascade mode
Answer: c
Explanation: To perform the transfer of a block of data from one set of a memory address to
another one, this transfer mode is used.
11. Which of the following command is used to make all the internal registers of 8237 clear?
Answer: b
Explanation: Using master clear command, all the internal registers of 8237 are cleared, while
all the bits of the mask register are set.
To practice all questions papers on Microprocessors, here is complete set of 1000+ Multiple
Choice Questions and Answers .
MCQs
Answer: c
Explanation: Whatever their physical sizes and storage formats, all the floppies incorporate the
basic principles of magnetic data recording and reading.
2. In floppy disk, the small hole that enables the drive to identify the beginning of a track and its
first sector is
a) inner hole
b) key hole
c) index hole
d) start hole
Answer: c
Explanation: The small hole called index hole, enables the drive to identify the beginning of a
track and its first sector.
a) 200 RPM
b) 300 RPM
c) 150 RPM
d) 50 RPM
Answer: b
Explanation: The floppy media is rotated at the speed of 300 RPM
RevolutionPerMinute
inside its jacket.
4. The Double Density Double Sided disks on each side are organized with
a) 20 tracks
b) 30 tracks
c) 40 tracks
d) 50 tracks
Answer: c
Explanation: The Double Density Double Sided
DDDS
disks are organized with 40 tracks on each side of the disk.
5. The magnetic recording technique used for storing data onto the disks
floppydisks
is called
a) return to zero
b) non-return to zero
Answer: b
Explanation: In this technique, the magnetic flux on the disk surface never returns to zero, i.e.
no erase operation is carried out.
a) blue laser
b) white laser
c) red laser
d) green laser
Answer: c
Explanation: A DVD is an optical disk that uses a red laser for reading the disks.
Answer: c
Explanation: The blue ray disk uses a high frequency blue laser with a small wavelength to read
the disk.
8. A blue ray disk can store data upto _________ per layer.
a) 25 KB
b) 25 MB
c) 25 TB
d) 25 GB
Answer: d
Explanation: A blue ray disk can store data upto 25 GB per layer and is popularly used for
storing long duration videos like movies.
9. DVDRW is for
a) read-write DVD
b) rewriteable DVD
c) recordable DVD
Answer: b
Explanation: DVDRW is for rewriteable DVD and DVDR is for recordable DVD.
a) hard disk
b) hard drive
c) fixed disk
Answer: d
Explanation: The Hard Disk Drive is also called as a hard disk, hard drive, fixed drive, fixed disk
or fixed disk drive.
To practice all areas of Microprocessors, here is complete set of 1000+ Multiple Choice
Questions and Answers .
MCQs
Answer: d
Explanation: The memory serves the microprocessor in the same way, whether it is a single
microprocessor or a multi microprocessor.
a) one processor
b) two processors
Answer: a
Explanation: In a shared bus architecture, only one processor performs bus cycle to fetch
instructions or data from the memory.
are
a) 1
b) 2
c) 3
d) many
Answer: b
Explanation: The processors P1 and P2 address a multiport memory, which can be accessed at
a time by both the processors.
b) memory technique
d) mapping technique
Answer: c
Explanation: The bus window technique is the correct method of interconnection between the
processors.
Answer: d
Explanation: The disadvantage of bus window technique is that both processors must know
implicitly about the existence of a bus window, its size and the address map. It also results in
loss of effective local memory space.
b) crossbar switching
c) linked input/output
d) shared bus
Answer: b
Explanation: In crossbar switching type of interconnection topology, several parallel data paths
are possible. Each node of the crossbar represents a bus switch.
7. Which of the following is not a type of configuration that is based on physical interconnections
between the processors?
a) star configuration
b) loop configuration
c) regular topologies
d) incomplete interconnection
Answer: d
Explanation: Based on the physical interconnections between the processors, the configurations
are
i) star configuration
ii) loop or ring configuration
iii) complete interconnection
iv) regular topologies
v) irregular topologies.
8. The configuration, in which all the processing elements are connected to a central switching
element, that may be independent processor via dedicated paths is
a) star
b) loop
c) complete
d) irregular
Answer: a
Explanation: The switching element controls the interconnections between the processing
elements.
a) star
b) loop
c) complete
d) regular
Answer: c
Explanation: For a large number of processors, the complete interconnection is impractical due
to a large number of interconnection paths.
a) star
b) loop
c) complete
d) regular
Answer: d
Explanation: In array processor architecture, the processing elements are arranged in a regular
fashion.
To practice all areas of Microprocessors, here is complete set of 1000+ Multiple Choice
Questions and Answers .
MCQs
a) control unit
b) microprocessor
c) processing unit
Answer: d
Explanation: The microprocessors or processing unit is used as a node in interconnection
topologies. They may also work as stand-alone processors or subprocessing units, under the
control of other microprocessors or processing units.
a) task dependent
Answer: d
Explanation: The main feature of multi-microprocessor is that it is task dependent. If it is
designed for a specific task, then it may not be useful for other tasks.
a) greater throughput
Answer: c
Explanation: Greater throughput and enhanced fault tolerance are the main objectives of the
multi-microprocessor system. These systems incorporate a multiplicity of hardware and
software, for the purpose.
4. An interface between the user or an application program, and the system resources are
a) microprocessor
b) microcontroller
c) multi-microprocessor
d) operating system
Answer: d
Explanation: The operating system acts as an interface, and is an important program that
resides in the computer memory.
b) input/output management
c) memory management
Answer: d
Explanation: An operating system provides a means of hardware and software resource
management including input/output and memory management.
6. Distributed systems are designed to run
a) serial process
b) parallel process
Answer: d
Explanation: Distributed systems are designed to run a parallel process. It is essential that a
proper environment exists for concurrent processes to communicate and cooperate, in order to
complete the allotted task.
a) intraprocessor communication
d) interprocessor communication
Answer: c
Explanation: A distributed operating system must provide a mechanism for interprocess and
interprocessor communication.
Answer: d
Explanation: A multiprocessor operating system should have a mechanism to split a task,
optimise system performance, and should handle structural changes.
Answer: d
Explanation: An operating system must have process-processor allocation strategies, a
mechanism to collect results of subtasks and software to improve overall performance.
d) data protection
Answer: b
Explanation: A multiprocessor operating system must take care of unauthorized data access
and data protection.
To practice all areas of Microprocessors, here is complete set of 1000+ Multiple Choice
Questions and Answers .
MCQs
1. The unit that executes all the numeric processor instructions in 8087 is
a) Control unit
b) ALU
Answer: c
Explanation: The 8087 is divided into two sections namely control unit and numeric extension
unit in which the numeric extension unit executes all the numeric processor instructions.
a) Control unit
b) ALU
Answer: a
Explanation: The control unit receives, decodes the instructions, and executes the 8087 control
instructions.
Answer: d
Explanation: The control unit is used for establishing communication between CPU and memory
and coordinating the internal coprocessor execution.
NEU
a) BUSY
activehigh
b) BUSY
activelow
c) READY
activelow
d) RESET
activehigh
Answer: a
Explanation: When NEU begins its execution, the BUSY signal is pulled up. Also, this output
signal when high, indicates to the CPU that it is busy with the execution of an allotted
instruction.
5. The register that allows the register programmer to select the required processing options is
a) significant
b) exponent
Answer: c
Explanation: The control word register allows the register programmer to select the required
processing options out of available ones. It is used to control the operation of 8087.
a) stack overflow
b) stack underflow
Answer: d
Explanation: Invalid operation is generated due to stack overflow, stack underflow,
indeterminate form as result, or non-number
NAN
as operand.
7. The exception generated for a too big result to fit in the format is
a) invalid operation
b) overflow
c) denormalized operand
d) result overflow
Answer: b
Explanation: A too big result to fit in the format generates this exception. The condition code bits
indicate that the result is prohibitively large.
a) overflow
b) invalid operation
c) denormalized operand
d) zero divide
Answer: d
Explanation: If any non-zero finite operand is divided by zero, the zero divide exception is
generated. The resulting condition code bits indicate that the result is infinity, even if the
exception is masked.
activelow
is
b) connected to ground
c) left unconnected
Answer: b
Explanation: The 8087 can operate in a maximum mode, only when the MN/MX
activelow
pin of the CPU is grounded. In maximum mode, all the control signals are derived using a
sequence chip known as a bus controller.
10. If the result is rounded according to the rounding control bits, then the exception generated
is
a) denormalized operand
b) underflow
c) inexact result
d) invalid operation
Answer: c
Explanation: If it is impossible to fit the actual result in the specified format, the result is rounded
according to the rounding control bits, and an exception is generated. This sets the precision
exception flag.
11. The instruction that stores a copy of top of the stack into the memory, and pops the top of
the stack is
a) FST
b) FSTP
c) FIST
d) FLD
Answer: b
Explanation: FSTP
storefloatingpointnumberandpop
stores a copy of top of the stack into memory or any coprocessor register, and then pops the
top of the stack.
12. The instruction that multiplies the content of the stack top by 2n is
a) FMUL
b) FPREM
c) FSCAL
d) FCSH
Answer: c
Explanation: FSCAL instruction multiplies the content of the stack top by 2n, where n is an
integral part of stack and stores the result in stack.
13. If the opcode bit is D=1, then the source and destination operands are
a) incremented
b) decremented
c) cleared
d) interchanged
Answer: d
Explanation: If D=1, then it interchanges the source and destination operands.
To practice all areas of Microprocessors, here is complete set of 1000+ Multiple Choice
Questions and Answers .
MCQs
1. The 8089 shares the system bus and memory with the host CPU in
Answer: a
Explanation: In a tightly coupled configuration, the 8089 shares the system bus and memory
with the host CPU using its RQ
activelow
or GT
activelow
pins.
2. The 8089 communicates with the host CPU using bus arbiter and controller in
Answer: b
Explanation: In a loosely coupled configuration, the 8089 has its own local bus and
communicates with the host CPU using bus arbiter and controller.
3. The number of address lines used by the I/O processor in 8089 is
a) 20
b) 12
c) 16
d) 8
Answer: c
Explanation: The 8089 I/O processor uses only 16 address lines, and thus it can address only
64KB of IO space.
a) 16-bit IO
b) 8-bit IO
c) 64-bit IO
Answer: d
Explanation: The 8089 handled IO devices need not have the same data bus width as that of
8089. This enables even 8-bit IO devices to be interfaced easily with 8089.
5. In the 8089 architecture, the address of memory table for channel-2 is calculated by
Answer: b
Explanation: The address of the memory table for channel-2 is calculated by adding 8 to the
contents of CCP or by adding memory table address for channel-1 to the contents of CCP.
a) GA
b) BC
c) CX
d) MC
Answer: c
Explanation: The registers GA, GB, GC, BC, IX and MC can be used as general purpose
registers.
7. The registers that are used as source and destination pointers during DMA operations are
a) GB, GC
b) GC, BC
c) GC, GA
d) GA, GB
Answer: d
Explanation: GA register is used as source and GB as destination pointers during DMA
operations.
8. The pin that is used for data transfer control and operation termination signals is
a) SINTR
b) EXT
d) RQ
activelow
or GT
activelow
Answer: c
Explanation: The DRQ and EXT are used for data transfer control and operation termination
signals during DMA operations.
9. The pin that is used to inform the CPU that the previous operation is completed is
a) RQ
activelow
b) GT
activelow
c) DRQ
d) SINTR
Answer: d
Explanation: The SINTR pins are used by the channels either to inform the CPU that the
previous operation is over or to ask for its attention or interference if required, before the
completion of the task.
Answer: d
Explanation: The program status word contains the current channel status, which contains
source and destination address widths, channel activity, interrupt control and servicing, bus load
limit and priority information.
To practice all areas of Microprocessors, here is complete set of 1000+ Multiple Choice
Questions and Answers .
MCQs
c) priority resolving
Answer: d
Explanation: To resolve the various bus contention and interprocessor communication problems,
different hardware strategies and algorithms are worked out. These incorporated functions like
bus allotment and control, bus arbitration and priority resolving into them.
2. The device that deals with the bus access control functions and bus handshake activities is
b) bus arbiter
c) priority resolver
Answer: b
Explanation: The bus arbiter or 8289 takes care of bus access control functions and bus
handshake activities.
3. The clock generator delays the READY signal until the signal _________ goes low
a) DEN
activehigh
b) DEN
activelow
c) AEN
activelow
d) AEN
activehigh
Answer: c
Explanation: If AEN
activelow
is high, the clock generator delays the READY signal till the AEN
activelow
goes low.
a) READY
activelow
b) LOCK
activehigh
c) CBRQ
activelow
d) BPRO
activehigh
Answer: b
Explanation: The bus controller does not relinquish
releaseitscontrolon
the bus, till the LOCK
activelow
input is low.
5. The signals that are used by the bus arbitration in the independent request method is
a) BREQ
activelow
b) BPRN
activelow
c) CBRQ
activelow
Answer: d
Explanation: The four active low signals, bus request
BREQ
, bus priority in
BPRN
, common bus request
CBRQ
and bus priority out
BPRO
are used for bus arbitration.
6. The signal that is used to drive a priority resolving network that actually accepts the bus
request inputs is
a) BREQ
activelow
b) BPRN
activelow
c) CBRQ
activelow
d) BPRO
activelow
Answer: a
Explanation: The BREQ
activelow
is used to drive a priority resolving network that actually accepts the bus request inputs from all
the masters and derives the priority outputs which further drive the BPRN
activelow
inputs of all the masters.
7. Which of the following is the simplest and cheapest method of bus arbitration?
a) daisy chaining
b) independent request
c) polling
Answer: a
Explanation: The daisy chaining method is the simplest one, as it has less hardware complexity.
8. The method of bus arbitration that does not contain priority resolving network in it is
a) daisy chaining
b) independent request
c) polling
d) none
Answer: a
Explanation: The daisy chaining method does not contain any priority resolving network, rather
the priorities of all the devices are essentially assumed to be in sequence.
9. Which of the following is the fastest method of bus arbitration?
a) daisy chaining
b) independent request
c) polling
Answer: b
Explanation: The independent request scheme is quite fast because each of the masters can
independently communicate with the controller.
a) daisy chaining
b) independent request
c) polling
Answer: c
Explanation: In a polling scheme, a set of address lines is driven by the controller to address
each of the masters in sequence.
To practice all areas of Microprocessors, here is complete set of 1000+ Multiple Choice
Questions and Answers .
MCQs
a) coprocessors
b) independent processors
Answer: c
Explanation: The processors used in the multi-microprocessor are either coprocessors or
independent processors.
2. The processor that executes the instructions fetched for it by the host processor is
a) microprocessor
b) coprocessor
c) independent processor
Answer: b
Explanation: The coprocessor executes the instructions fetched for it by the host processor.
3. The processor that asks for bus access or may itself fetch the instructions and execute them
is
a) microprocessor
b) coprocessor
c) independent processor
Answer: c
Explanation: The independent processor may ask for bus access, may fetch the instructions
itself, and execute them independently.
a) common clock
Answer: c
Explanation: The microprocessors share a common clock and bus control logic, in a tightly
coupled system.
5. Communication between processors using a common system bus and common memory
takes place in
a) loosely coupled system
Answer: b
Explanation: In tightly coupled systems, the two processors may communicate using a common
system bus or common memory.
Answer: a
Explanation: In a loosely coupled multiprocessor system, each CPU may have its own bus
control logic. The bus arbitration is handled by an external circuit, common to all the processors.
Answer: d
Explanation: The loosely coupled system is advantageous than the tightly coupled system as it
has advantages of more number of CPUs can be added to improve the system performance. A
fault in a single module does not lead to a complete system breakdown.
8. In a tightly coupled system, when a processor is using the bus then the local bus of other
processors is in
a) hold state
Answer: b
Explanation: When a processor is using the bus then the other processors maintain their local
buses in high impedance state.
b) less portable
c) more expensive
Answer: d
Explanation: The loosely coupled systems are more complicated due to the required additional
communication hardware. They are less portable and more expensive due to additional
hardware.
tightly
d) clock pulse
Answer: c
Explanation: The microprocessor in a closely coupled system either uses a status bit in memory
or interrupts the host to inform it about the completion of task allotted to it.
To practice all areas of Microprocessors, here is complete set of 1000+ Multiple Choice
Questions and Answers .
MCQs
focuses on “Design of a PC Based Multimicroprocessor System”.
1. The files that reside in the current drive and directory of the hard disk is
a) OBJ files
b) EXE files
c) SRC files
d) DEST files
Answer: b
Explanation: The files that reside in the current drive and directory of the hard disk is EXE files.
2. The master processor stores the result buffers on to the hard disk with the filename as
a) .EXE file
b) .OBJ file
Answer: c
Explanation: The master processor stores the result buffers on to the hard disk with the filename
as .EXE file with extension .RES.
a) ALE
b) DEN
c) DT/R
activelow
Answer: d
Explanation: The latches are enabled by ALE signal and data will be enabled by DEN signal.
The ALE, DEN and DT/R
activelow
signals are derived by a separate 8288 bus controller chip.
a) 30 KB
b) 50 KB
c) 60 KB
d) 40 KB
Answer: c
Explanation: The EXE files should not be more than 60 KB size.
5. A part of memory that can be addressed by more than one processor for communication is
known as
a) memory module
b) bus window
c) ram
Answer: b
Explanation: There are two slave processors and thus there are two bus windows.
6. When a subprocessor wants to communicate with the bus window, it informs the main
processor to
b) storage buffer
Answer: c
Explanation: An 8255 IO card is used to control the tristate buffers that provide isolation. When
a subprocessor wants to communicate with the bus window, it informs the main processor to
disable tristate buffer.
7. When the subprocessor completes its execution, then the status on the status lines shows
a) hold status
b) halt status
c) high status
d) low status
Answer: b
Explanation: When the subprocessor completes its execution, then the status on the status lines
shows halt status.
8. For MEMR
activelow
and MEMWR
activelow
Answer: c
Explanation: During MEMR
activelow
the data flow from memory to CPU so isolation buffer should be in receiver mode and data
flows from CPU to memory during MEMWR
activelow
operation and so buffer should be in transmit mode.
9. If the DIR pin of the isolation chip is high, then it enters into
a) receiver mode
d) transmit mode
Answer: d
Explanation: If the DIR pin of the isolation chip is high, then it enters into transmit mode and if it
is 0 then the isolation chip enters into receiver mode.
a) main program
Answer: d
Explanation: System software of the complete system consists of three parts. the first part main
control program controls the total operation of the system, and the remaining two parts are the
small local initialization programs for each of the subprocessors.
To practice all areas of Microprocessors, here is complete set of 1000+ Multiple Choice
Questions and Answers .
MCQs
a) 8 MB
b) 16 MB
c) 24 MB
d) 64 MB
Answer: b
Explanation: The 80286 with its 24-bit address bus is able to address 16 Mbytes of physical
memory.
a) 12.5 MHz
b) 10 MHz
c) 8 MHz
d) all of the mentioned
Answer: d
Explanation: Various versions of 80286 are available that run on 12.5 MHz, 10 MHz and 8 MHz
clock frequencies.
3. The management of the memory system required to ensure the smooth execution of the
running process is done by
a) control unit
b) memory
Answer: c
Explanation: The memory management which is an important task of the operating system is
now supported by a hardware unit called a memory management unit.
4. The fetching of the program from secondary memory to place it in physical memory, during
the execution of CPU is called
a) mapping
b) swapping in
c) swapping out
d) pipelining
Answer: b
Explanation: Whenever the portion of a program is required for execution by the CPU, it is
fetched from the secondary memory and placed in the physical memory. This is called swapping
in of the program.
5. The process of making the physical memory free by storing the portion of program and partial
results in the secondary storage called
a) mapping
b) swapping in
c) swapping out
d) pipelining
Answer: c
Explanation: In swapping out, a portion of the program or important partial results required for
further execution, may be saved back on secondary storage to make the physical memory free,
for further execution of another required portion of the program.
6. The memory that is considered as a large logical memory space, that is not available
physically is
a) logical memory
b) auxiliary memory
c) imaginary memory
d) virtual memory
Answer: d
Explanation: To the user, there exists a very large logical memory space, which is actually not
available called virtual memory. This does not exist physically in a system. It is however,
possible to map a large virtual memory space onto the real physical memory.
a) data protection
c) segmented memory
Answer: d
Explanation: The important aspects of memory management are data protection, unauthorized
access prevention, and segmented memory.
8. The memory management and protection mechanisms are disabled when the 80286 is
operated in
a) normal mode
Answer: b
Explanation: In real address mode of 80286, all the memory management and protection
mechanisms are disabled.
9. The memory management and protection mechanisms are enabled with advanced instruction
set when 80286 is operated in
a) normal mode
Answer: c
Explanation: In virtual address mode, 80286 works with all of its memory management and
protection capabilities, with the advanced instruction set.
10. The 80286 is an upward object code compatible with 8086 or 8088 when operated in
a) normal mode
Answer: d
Explanation: The 80286 is operated in two modes, namely real address mode and virtual
address mode. In both the modes, the 80286 is compatible with 8086/8088.
To practice all areas of Microprocessors, here is complete set of 1000+ Multiple Choice
Questions and Answers .
MCQs
Answer: d
Explanation: The CPU of 80286 contains the same set of registers as in 8086.
2. The bits that are modified according to the result of the execution of logical and arithmetic
instructions are called
Answer: c
Explanation: The flag register bits, D0, D2, D4, D6, D7 and D11 are modified according to the
result of the execution of logical and arithmetic instructions. These are called as status flag bits.
3. The flags that are used for controlling machine operation are called
a) status flags
b) control flags
Answer: b
Explanation: The flags such as trap flag
TF
and Interrupt flag
IF
bits are used for controlling the machine operation, and thus they are called control flags.
c) protection enable
a) address unit
b) bus unit
c) instruction unit
d) control unit
Answer: d
Explanation: The CPU may be viewed to contain four functional parts and they are
i) Address Unit
ii) Bus Unit
iii) Instruction Unit
iv) Execution Unit.
6. The unit that is responsible for calculating the address of instructions, and data that the CPU
wants to access is
a) bus unit
b) address unit
c) instruction unit
d) control unit
Answer: b
Explanation: The address unit is responsible for calculating the address of instructions, and data
that the CPU wants to access. Also, the address lines derived by this unit may be used to
address different peripherals.
7. The process of fetching the instructions in advance, and storing in the queue is called
a) mapping
b) swapping
c) instruction pipelining
d) storing
Answer: c
Explanation: The instructions are fetched in advance and stored in a queue to enable faster
execution of the instructions. This concept is known as instruction pipelining.
8. The CPU must flush out the prefetched instructions immediately following the branch
instruction in
a) conditional branch
b) unconditional branch
Answer: b
Explanation: In case of unconditional branch, the CPU will have to flush out the prefetched
instructions, immediately following the branch instruction.
9. The device that interfaces and control the internal data bus with the system bus is
a) data interface
b) controller interface
d) data transreceiver
Answer: d
Explanation: The data transreceivers interface and control the internal data bus with the system
bus.
b) scratch pad
Answer: d
Explanation: The execution unit contains the register bank, used for storing the data as scratch
pad, or used as special purpose registers.
c) INT instruction
Answer: d
Explanation: The interrupts generated by 80286 may be divided into 3 categories as external or
hardware interrupts, INT instruction or software interrupts and interrupts generated by
exceptions.
12. For which of the following instruction does the return address point to instruction causing an
exception?
Answer: d
Explanation: For the instructions, divide error, bound range exceeded and invalid opcode
exceptions, the return address points to the instruction causing exception.
13. The instruction that comes into action, if the trap flag is set is
a) maskable interrupt
b) non-maskable interrupt
d) breakpoint interrupt
Answer: c
Explanation: Single step interrupt is an internal interrupt that comes into action if the trap flag
TF
is set.
14. The interrupt that has the highest priority among the following is
a) Single step
b) NMI
non−maskableinterrupt
c) INTR
d) Instruction exception
Answer: d
Explanation: The instruction exception has the highest priority followed by single step, NMI and
INTR instrution.
15. The interrupt that has the lowest priority among the following is
b) INTR
c) INT instruction
d) NMI
Answer: c
Explanation: The INT instruction has the lowest priority. The order of priority of interrupts from
high to low is
1) instruction exception
2) single step
3) NMI
4) processor extension segment overrun
5) INTR
6) INT instruction.
To practice all areas of Microprocessors, here is complete set of 1000+ Multiple Choice
Questions and Answers .
MCQs
a) 68-pin PLCC
plasticleadedchipcarrier
b) 68-pin LCC
leadlesschipcarrier
c) 68-pin PGA
pingridarray
Answer: d
Explanation: The 80286 is available in 68-pin PLCC
plasticleadedchipcarrier
, 68-pin LCC
leadlesschipcarrier
and 68-pin PGA
pingridarray
packages.
a) 2
b) 4
c) 8
d) 1
Answer: a
Explanation: The clock frequency is divided by two internally, and is used for deriving
fundamental timings for basic operations of the circuit.
a) memory transfer
b) address transfer
Answer: d
Explanation: The address lines, A23-A16 are zero during I/O transfers.
4. The signals S1
activelow
, S2
activelow
are
a) output signals
activelow
Answer: d
Explanation: The signals S1
activelow
, S2
activelow
are active low status output signals, which indicate initiation of a bus cycle, and with M/IO
activelow
and COD/INTA
activelow
, they define the type of the bus cycle.
5. If M/IO
activelow
a) I/O cycle
b) Memory cycle
Answer: c
Explanation: If M/IO
activelow
signal is ‘0’ then it indicates that an I/O cycle or INTA cycle is in the process, and if it is ‘1’, it
indicates that a memory or a HALT cycle is in progress.
6. The LOCK
activelow
a) XCHG signal
b) Interrupt acknowledge
Answer: d
Explanation: The lock pin is used to prevent the other masters from gaining the control of the
bus, for the current and the following bus cycles. This pin is activated by a “LOCK” instruction
prefix, or automatically by hardware during XCHG, interrupt acknowledge or descriptor table
access.
a) WAIT
b) BHE
activelow
c) READY
activelow
d) WAIT
activelow
Answer: c
Explanation: The active low READY pin is used to insert wait states in a bus cycle, for
interfacing low speed peripherals. This signal is neglected during HLDA cycle.
8. The minimum number of clock cycles required in an input pulse width of the RESET pin is
a) 4
b) 2
c) 8
d) 16
Answer: d
Explanation: The active high RESET input clears the internal logic of 80286, and re-initializes it.
The reset input pulse width should be at least 16 clock cycles.
9. To filter the output, a 0.047microfarads, 12V capacitor is connected between the pins
Answer: a
Explanation: A 0.047microfarads, 12V capacitor is connected between the CAP pin and ground,
to filter the output of the internal substrate bias generator.
10. The signal that causes the 80286 to perform the processor extension interrupt while
executing the WAIT and ESC instructions are
a) BUSY
activelow
b) PEACK
activelow
c) PEREQ
d) ERROR
activelow
Answer: d
Explanation: An active ERROR
activelow
signal causes the 80286 to perform the processor extension interrupt while executing the WAIT
and ESC instructions.
To practice all areas of Microprocessors, here is complete set of 1000+ Multiple Choice
Questions and Answers .
MCQs
1. The 80286 CPU acts just like that of 8086 when operated in
Answer: a
Explanation: In the real addressing mode of operation of 80286, it just acts as a fast 8086.
a) 16 MB
b) 8 MB
c) 2 MB
d) 1 MB
Answer: d
Explanation: In real addressing mode, the 80286 addresses a physical memory of 1 Mbytes
using A0-A19. The lines A20-A23 are not used by the internal circuit of 80286 in this mode.
Answer: a
Explanation: Because of extra pipelining and other circuit level improvements, in real address
mode also, the 80286 operates at a much faster rate than 8086.
4. In physical memory, if the segment size limit is exceeded by the instruction or data then
b) exception is generated
Answer: b
Explanation: An exception is generated if the segment size limit is exceeded by the instruction
or the data.
a) system initialization
Answer: c
Explanation: The 80286 reserves two fixed areas of physical memory for system initialization
and interrupt vector table.
6. In the real mode, the memory that is reserved for interrupt vector table is
a) first 2 KB of memory
b) first 1 KB of memory
c) last 2 KB of memory
d) last 1 KB of memory
Answer: b
Explanation: In the real mode, the first 1 Kbyte of memory starting from the address 00000H to
003FFH, is reserved for interrupt vector table.
7. In the real mode, the memory that is reserved for system initialization is
Answer: c
Explanation: The addresses from FFFF0H to FFFFFH are reserved for system initialization, in
real addressing mode.
Answer: b
Explanation: When 80286 is reset, it always starts its execution in real addressing mode.
a) initialization of IP
b) enables interrupts
Answer: d
Explanation: The 80286 in real addressing mode performs the following functions: it initializes IP
and other registers of 80286, initializes the peripheral, enables interrupts, sets up descriptor
tables, and then prepares it for entering the protected virtual address mode.
10. In real address mode, while addressing the physical memory, the 80286 uses the signal
a) HLDA
b) BHE
activelow
c) CAP
d) HOLD
Answer: b
Explanation: In real address mode, while addressing the physical memory, the 80286 uses BHE
activelow
along with A0-A19.
To practice all areas of Microprocessors, here is complete set of 1000+ Multiple Choice
Questions and Answers .
MCQs
PVAM
-1”.
1. The procedure of fetching the chosen program segments or data from the secondary storage
into the physical memory is
a) mapping
b) swapping
c) unswapping
d) pipelining
Answer: b
Explanation: Swapping is the procedure of fetching the chosen program segments or data from
the secondary storage into the physical memory.
2. The procedure of storing back the partial results on to the secondary storage is called
a) mapping
b) swapping
c) unswapping
d) pipelining
Answer: c
Explanation: The procedure of storing back the partial results or data back on to the secondary
storage is called unswapping.
a) 1MB
b) 1GB
c) 1TB
Answer: b
Explanation: The 80286 is able to address 1Gbyte of virtual memory per task.
a) swapping mechanism
b) unswapping mechanism
c) operating system
Answer: d
Explanation: The handling of branch instructions like JUMP and CALL is taken care of, by the
swapping and unswapping mechanism, and operating system.
a) program segment
b) page
Answer: d
Explanation: The segments or pages have been associated with a data structure known as a
descriptor. The descriptor contains information on the page, and also carry relevant information
regarding a segment, and its access rights.
6. The descriptors that are used for subroutines and interrupt service routines are
b) gate descriptors
Answer: b
Explanation: For data segment, the corresponding descriptor may be data segment descriptor
and for code segment, there may be code segment descriptor. For subroutines and interrupt
service routines there are gate descriptors.
7. A segment with low privilege level is not allowed to access another segment of
Answer: b
Explanation: A segment with low privilege level is not allowed to access another segment with
high privilege level.
b) task switching
Answer: d
Explanation: A descriptor is used to carry out additional functions like transfer of control and
task switching.
9. The descriptor that is used for special system data segments and control transfer operations
is
b) gate descriptors
Answer: d
Explanation: The 80286 has system segment descriptor, that is used for special system data
segments, and control transfer operations.
Answer: d
Explanation: A code or data segment descriptor contains 16-bit segment limit, 24-bit segment
base address, 8-bit access rights byte and the remaining 16-bits are reserved by Intel for
upward compatibility.
Present
b) virtual memory
Answer: a
Explanation: If P=1, then the segment is mapped into physical memory.
12. In access rights byte, to select system segment descriptor, the condition is
a) S=1
b) S=0
Answer: b
Explanation: If S
segmentdescriptor
=0, then system segment descriptor or gate descriptor is selected.
13. If S
segmentdescriptor
Answer: d
Explanation: If S=1, then code or data
includingstack
segment descriptors are selected.
b) 4 bits
c) 8 bits
d) 16 bits
Answer: d
Explanation: The limit field, which is the maximum allowed offset address, is of 16 bits.
To practice all areas of Microprocessors, here is complete set of 1000+ Multiple Choice
Questions and Answers .
This set of Advanced Microprocessors Questions and Answers focuses on “Protected Virtual
Address Mode
PVAM
-2”.
a) system descriptor
b) gate descriptor
Answer: c
Explanation: The system segment descriptors are of seven types. The types 1 to 3 are called
system descriptors and the types 4 to 7 are called gate descriptors.
a) call gate
b) task gate
c) interrupt gate
Answer: d
Explanation: The gate descriptors are of four types namely, call gate, task gate, interrupt gate
and trap gate.
3. The gate descriptor contains the information of
b) stack manipulations
c) privilege level
Answer: d
Explanation: The gate descriptor contains the information regarding the destination of control
transfer, required stack manipulations, privilege level and its type.
a) call gate
b) task gate
c) interrupt gate
d) trap gate
Answer: a
Explanation: Call gates are used to alter the privilege levels.
Answer: c
Explanation: Interrupt gates and trap gates are used to specify corresponding service routines.
a) trap gate
b) task gate
Answer: b
Explanation: Task gate is used to switch from one task to another.
a) trap gate
b) task gate
c) interrupt gate
d) call gate
Answer: d
Explanation: The word count field is only used by a call gate descriptor, to indicate the number
of bytes to be transferred from the stack of the calling routine to the stack of the called routine.
8. The memory that maintains the most frequently required data for execution, in a high speed
memory is called
a) virtual memory
b) physical memory
c) cache memory
d) ROM
readonlymemory
Answer: c
Explanation: To minimize the time required for fetching the frequently required descriptor
information, from the main memory, cache memory is used in which the most frequently
required data for execution is stored.
RPL
b) table indicator
c) index
Answer: d
Explanation: In the protected mode, the contents of the segment registers are known as
selectors. The selector field consists of three fields namely, RPL, table indicator
TI
and index.
Answer: b
Explanation: The type of descriptor table is global if TI=0 and local if TI=1.
is
a) LDT
c) GDT
Answer: b
Explanation: The LGDT and LLDT instructions are privileged, and may be executed only at
privilege level 0.
12. The instruction that loads a selector which refers to a local descriptor table, containing the
base address and limit for LDT is
a) LGT
b) GDT
c) LGDT
d) LLDT
Answer: d
Explanation: The LLDT instruction loads a selector, which refers to a local descriptor table,
containing the base address, and limit for LDT.
13. The descriptor that is used to store task gates, interrupt gates and trap gates is
Answer: c
Explanation: The 80286 has a third type of descriptor table known as interrupt descriptor table,
which is used to store task gates, interrupt gates and trap gates.
14. The number of interrupt descriptors that the interrupt descriptor table
IDT
handles is
a) 16
b) 64
c) 128
d) 256
Answer: d
Explanation: The IDT is able to handle upto 256 interrupt descriptors.
a) 2
b) 4
c) 6
d) 8
Answer: c
Explanation: Six bytes are required for each interrupt in an interrupt descriptor table.
To practice advanced questions and answers on all areas of Microprocessors, here is complete
set of 1000+ Multiple Choice Questions and Answers .
MCQs
focuses on “Privilege”.
a) operating system
b) interrupt handlers
c) system software
Answer: d
Explanation: The operating system, interrupt handlers and other system softwares can be
protected from unauthorized accesses in virtual address space of each task using the privilege
mechanism.
DPL
CPL
EPL
d) None of the mentioned
Answer: b
Explanation: Any one of the four privilege levels may be used to execute a task. The task
privilege level at that instant is called the Current Privilege Level
CPL
.
a) hold
Answer: c
Explanation: Once the CPL is selected, it cannot be changed during the execution normally in a
single code segment. It can only be changed by transferring the control, using gate descriptors,
to a new segment.
globaldescriptortable
localdescriptortable
a) privilege level 0
b) privilege level 1
c) privilege level 2
d) privilege level 3
Answer: a
Explanation: A task executing at level 0, the most privileged level, can access all the data
segments defined in GDT and the LDT of the task.
5. A task with privilege level 0, doesn’t refer to all the lower level privilege descriptors in
a) GDT
globaldescriptortable
b) LDT
localdescriptortable
c) IDT
interruptdescriptortable
Answer: b
Explanation: The task with privilege level 0, refers to all the lower level privilege descriptors
which apply to all the descriptors except the LDT descriptors.
6. The selector RPL that uses a less trusted privilege than the current privilege level for further
use is known as
Answer: c
Explanation: A selector RPL uses a less trusted privilege than the current privilege level for
further use. This is known as the Effective Privilege Level of the task.
Answer: c
Explanation: The effective privilege level is minimum in numeric and maximum in the privilege of
RPL and CPL.
8. The task requesting an access to a descriptor is allowed to access after checking the
a) type of descriptor
b) privilege level
d) corresponding segment
Answer: c
Explanation: The task requesting an access to a descriptor is allowed to access to it and to the
corresponding segment, only after checking the type of the descriptor and privilege level
CPL,RPL,DPL
.
Answer: b
Explanation: A CALL or JUMP instruction can reference only a code segment descriptor with
DPL equal to CPL of the task or a segment with a DPL of equal or greater privilege than CPL.
10. The RPL of a selector that referred to the code descriptor must have
Answer: c
Explanation: The RPL of a selector that referred to the code descriptor must have the same
privilege as CPL.
11. The instruction that refers to only code segment descriptors with DPL equal to or less than
the task CPL is
a) CALL
b) IRET
c) ESC
Answer: d
Explanation: The RET and IRET instructions are to refer to only code segment descriptors with
DPL equal to or less than the task CPL.
TSS
Answer: c
Explanation: When a CALL or JUMP instruction references a Task State Segment
TSS
descriptor, then DPL must be less or equally privileged than CPL.
a) loading DS
b) loading ES
c) loading SS
Answer: d
Explanation: If the privilege test is negative or an improper segment is referenced then an
exception 13 is generated. If the referenced segment is not present in physical memory, an
exception 11 is generated.
To practice all areas of Microprocessors, here is complete set of 1000+ Multiple Choice
Questions and Answers .
MCQs
focuses on “Protection”.
1. The mechanism to provide protection, that is accomplished with the help of read/write
privileges is
c) privileged instructions
d) privileged operations
Answer: a
Explanation: The restricted use of segments is accomplished with the help of read/write
privileges.
LDT
are present in
Answer: c
Explanation: In restricted use of segments i.e. segment load check, the segment usages are
restricted by classifying the corresponding descriptors, under LDT and GDT.
3. The mechanism that is accomplished using descriptor usages limitations and rules of
privilege check is
Answer: b
Explanation: Restricted accesses to segment, also called, operation reference check, is
accomplished using descriptor usages limitations, and rules of privilege check.
CurrentPrivilegeLevel
IOPL
is
Answer: c
Explanation: The privileged instructions or operations, also called, privileged instruction check,
is executed at certain privilege levels, determined by CPL and I/O privilege level
IOPL
, as defined by the flag register.
5. If CPL is not of the required privilege level, then the instructions that get affected is
a) IRET
b) POPF
Answer: c
Explanation: The IRET and POPF instructions do not perform any of their functions, if CPL is
not of the required privilege level.
6. If CPL is greater than zero, then the instruction that remains unaffected is
a) IRET
b) POPF
c) IF
Answer: c
Explanation: IF remains unaffected if CPL is greater than zero. No exception is generated for
this condition.
7. The condition, “CPL not equals to zero” satisfies when executing the instruction
a) LIDT
b) LGDT
c) LTR
Answer: d
Explanation: The condition, “CPL not equals to zero” satisfies, when executing the instructions,
LIDT, LGDT, LTR, LMSW, CTS and HLT.
a) CPL = 0
Answer: c
Explanation: The condition CPL>IOPL exists, when executing the instructions, INs, IN, OUTS,
OUT, STI, CLI and LOCK.
9. The instruction at which the exception is generated, but the processor extension registers
contain the address of failing instruction is
a) LTR
b) INS
c) CTS
d) ESC
Answer: d
Explanation: At the ESC instruction, the exception is generated, but the processor extension
registers contain the address of failing instruction.
Answer: b
Explanation: The processor extension segment overrun has no error code on the stack.
Answer: d
Explanation: Double exception detected, invalid task state segment, stack segment overrun,
processor extension segment overrun, are the protected mode exceptions.
To practice all areas of Microprocessors, here is complete set of 1000+ Multiple Choice
Questions and Answers .
MCQs
b) halt
c) processor reset
Answer: d
Explanation: The 80286 carries out six operations. They are:
1. processor reset and initialization
2. task switch operation
3. pointer testing instructions
4. protected mode initialization
5. how to enter protected mode?
6. halt.
2. After completion of the first cycle, the first task is again scheduled for the next cycle. This
process is known as
a) repetition
c) processor initiation
3. The operation that is provided by the internal architecture, to save the execution state of a
task is
a) processor reset
b) processor initialization
d) halt
Answer: c
Explanation: The 80286 internal architecture provides a task switch operation, to save the
execution state of a task, and to load a new task to be executed.
4. The instruction that can be used to carry out task switch operation is
b) exception
c) external interrupt
Answer: d
Explanation: A software interrupt instruction, exception or external interrupt, can also be used to
carry out task switch operation.
5. The IRET instruction gets back the execution state of the previous task, if
a) NT
nestedtaskflag
=1
b) NT
nestedtaskflag
=0
c) IF
interruptflag
=1
d) IF
interruptflag
=0
Answer: a
Explanation: If NT = 1, the IRET instruction gets back the execution state of the previous task.
Otherwise, the IRET instruction lets the current task continue, after popping the required values
from the stack.
a) CALL
b) INT
Answer: c
Explanation: The NT flag is set by CALL or INT initiated task switch operations.
b) protected mode
Answer: b
Explanation: To enter into protected mode, 80286 executes LMSW instruction, that sets PE flag.
8. The instruction that sets the zero flag, if the segment referred to, by the selector can be read
is
a) VERW
b) VERR
c) LSL
d) LAR
Answer: b
Explanation: The VERR
VERifytoRead
instruction sets the zero flag, if the segment referred to, by the selector, can be read.
9. The instruction that sets the zero flag, if the segment referred to by the selector, can be
written as
a) VERW
b) APRL
c) LSL
d) LAR
Answer: a
Explanation: The VERW
VERifytoWrite
instruction sets the zero flag, if the segment referred to, by the selector can be written.
10. The instruction that reads the descriptor access rights byte into the register is
a) VERW
b) APRL
c) LSL
d) LAR
Answer: d
Explanation: The LAR
LoadAccessRights
instruction reads the descriptor access rights byte into the register, if privilege rules allow.
11. The instruction that reads the segment limit into the register, if privilege rules and descriptor
type allow is
a) VERW
b) APRL
c) LSL
d) LAR
Answer: c
Explanation: The LSL
LoadSegmentLimit
instruction reads the segment limit into the register, if privilege rules, and descriptor type allow.
RequestedPrivilegeLevel
a) LAR
b) VERR
c) LSL
d) APRL
Answer: d
Explanation: The APRL
AdjustRequestedPrivilegeLevel
adjusts the RPL
RequestedPrivilegeLevel
of the selector to the numeric maximum of current selector RPL value, and the RPL value in the
register.
To practice all areas of Microprocessors, here is complete set of 1000+ Multiple Choice
Questions and Answers .
This set of Microprocessors Interview Questions and Answers for Experienced people focuses
on “80286 Minimum System Configuration, Interfacing Memory and I/O Devices With 80286”.
a) interrupt controller
b) clock generator
c) bus controller
d) all of the mentioned
Answer: d
Explanation: The interrupt controller 8259A, clock generator 82C284, and bus controller 82C288
are the unavoidable members of the family, of supporting chips of 80286.
Answer: d
Explanation: In a minimum mode, the 80286 carries out all the data transfers to/from memory or
I/O, controls the data transfer, and instruction execution of 80287.
3. The signal that is applied to the decoding logic, to differentiate between interrupt, code fetch
and data bus cycles is
a) COD
b) INTA
activelow
c) M/IO
activelow
Answer: d
Explanation: The COD, INTA
activelow
, M/IO
activelow
signals are applied to the decoding logic, to differentiate between interrupt, I/O, code fetch, and
data bus cycles.
4. By adding which of the following, the minimum mode of 80286 gives the multibus interface of
80286?
a) bus controller
b) bus arbiter
c) interrupt controller
Answer: b
Explanation: The addition of single chip 82C289 known as bus arbiter, to the configuration of
80286 minimum mode, gives the multibus structure of 80286.
5. The number of bus controllers that are used for interfacing of memory and I/O devices is
a) 1
b) 2
c) 3
Answer: b
Explanation: The interfacing of memory and I/O devices, uses two 82288 bus controllers, one
each for local, and system bus.
6. If the 80286 need to use system bus, then the signal that is to be active is
a) SRDY
b) SRDYEN
c) ARDYEN
d) ARDY
Answer: c
Explanation: The ARDYEN pin is to be activated if the 80286 is to use the system bus. The
SRDYEN pin is to be grounded.
a) AEN
b) CEN
c) AEN and CEN
Answer: a
Explanation: The MBYTES input selects the function of AEN/CEN pin. If MBYTES is high, the
pin serves as AEN, else it serves as CEN. The CEN pin is used for selecting one of the
available 82288s.
Answer: d
Explanation: The address and data lines are not multiplexed, hence no latches are required in
80286 system. Rather the addresses of the next bus cycle are displayed in advance, hence the
latches are required for latching the address, and decode the signals.
9. The I/O port addresses, that are not used, while designing practical systems around 80286
are
a) 0000H to 00FFH
b) 00FFH to FFFFH
c) 00F8H to 00FFH
d) 0000H to FFFFH
Answer: c
Explanation: The I/O port addresses 00F8H to 00FFH are reserved by Intel, hence these should
not be used while designing practical systems around 80286.
To practice all areas of Microprocessors for Interviews, here is complete set of 1000+ Multiple
Choice Questions and Answers .
This set of Microprocessors test focuses on “Priority of Bus Use By 80286, Bus Hold and HLDA
Sequence, Interrupt Acknowledge Sequence”.
c) hold request
Answer: d
Explanation: The second byte transfer of 2-byte transfer at an odd address, is the highest
priority usage among the given usages.
activelow
signal
b) hold request
executionunit
Answer: a
Explanation: The transfer with LOCK
activelow
signal is the highest priority usage than any other usage.
a) hold request
Answer: c
Explanation: The order of priority usages, starting from the highest one to the lowest one, is
given as
1. transfer with LOCK
activelow
signal
2. second byte transfer of 2-byte transfer at an odd address
3. second or third transfer cycle of a processor extension data transfer
4. HOLD request
5. processor extension data transfer
6. data transfer performed by EU
executionunit
4. As a response to the valid bus hold request, the bus is pushed into
a) TH
hold
state
b) Ts
status
state
c) Tc
command
state
d) Ti
idle
state
Answer: a
Explanation: 80286 local bus is relinquished for another bus master if a valid bus hold request is
received at the HOLD input pin. As a response to a valid bus hold request, the bus is pushed
into TH state.
a) Address
b) M/IO
activelow
c) COD/INTA
activelow
Answer: d
Explanation: The address, M/IO
activelow
and COD/INTA
activelow
are relinquished by bus arbiter.
a) 34 clockcycles
Answer: d
Explanation: Only after 34 clockcycles, after the 80286 is reset, a valid HOLD request should be
ascertained.
7. The master PIC 8259A decides which of its slave interrupt controllers is to return the vector
address, as a response of
a) first INTA
activelow
b) second INTA
activelow
pulse from 80286
c) third INTA
activelow
Answer: a
Explanation: In response to the first INTA
activelow
pulse from 80286, the master PIC 8259A decides, which of its slave interrupt controllers is to
return the vector address.
8. The slave
whichisselected
a) first INTA
activelow
b) second INTA
activelow
c) third INTA
activelow
Answer: b
Explanation: The interrupt acknowledge sequence consists of two INTA
activelow
pulses. After the second pulse, the selected slave sends the vector on D0-D7 data lines, and
80286 reads it.
9. The signal of 82C288, that enables the cascade address drivers, during INTA cycles is
a) DEN
b) DT/R
activelow
c) MCE
d) MB
Answer: c
Explanation: The MCE
MasterCascadeEnable
signal of 82C288 enables the cascade address drivers during INTA cycles, to select the slave
using the local address bus.
activelow
Answer: b
Explanation: The LOCK
activelow
signal is activated during Ts of first INTA cycle.
Ti
, that is allowed between two INTA cycles, to meet the 8259A speed and cascade address
output delay is
a) 1
b) 2
c) 3
d) 4
Answer: c
Explanation: The 80286 allows three idle states
Ti
between the two INTA cycles, to meet the 8259A speed and cascade address output delay.
To practice all areas of Microprocessors for tests, here is complete set of 1000+ Multiple Choice
Questions and Answers .
MCQs
1. In which of these modes, the immediate operand is included in the instruction itself?
Answer: b
Explanation: In immediate operand mode, the immediate operand is included in the instruction
itself.
c) si or di
Answer: d
Explanation: In register address mode, the operand is stored either in one of the 8-bit or 16-bit
general purpose registers or in SI, DI, BX or BP.
3. In which of the following addressing mode, the offset is obtained by adding displacement and
contents of one of the base registers?
a) direct mode
b) register mode
c) based mode
d) indexed mode
Answer: c
Explanation: In a based mode, the offset is obtained by adding displacement and contents of
one of the base registers, either BX or BP.
4. In which of the following addressing mode, the offset is obtained by adding displacement, with
the contents of SI?
a) direct mode
b) register mode
c) based mode
d) indexed mode
Answer: d
Explanation: In an indexed mode, the offset is obtained by adding displacement, with contents
of an index register, either SI or DI.
5. The address of a location of the operand is calculated by adding the contents of any of the
base registers, with the contents of any of index registers in
c) based mode
d) indexed mode
Answer: b
Explanation: In a based indexed mode, the operand is stored at a location, whose address is
calculated by adding the contents of any of the base registers, with the contents of any of the
index registers.
b) ASCII
c) Packed BCD
Answer: d
Explanation: The 80286 supports seven data types. They are
1. integer
2. Ordinal
unsigned
3. pointer
4. string
5. ASCII
6. BCD
7. Packed BCD.
7. The representation of 8-bit or 16-bit signed binary operands using 2’s complement is a data
type of
a) Ordinal
b) ASCII
c) Packed BCD
d) integer
Answer: d
Explanation: In integer data type, 8-bit or 16-bit signed binary operands are represented using
2’s complement.
8. The instruction that pushes the general purpose registers, pointer and index registers on to
the stack is
a) POPF
b) PUSH Imd
c) PUSH*A
d) PUSHF
Answer: c
Explanation: The PUSH*A instruction, pushes the general purpose registers, AX, CX, DX and
BX, pointer and index registers, SP, BP, SI, DI, on to the stack.
a) 1 bit
b) 2 bits
c) 4 bits
d) 16 bits
Answer: b
Explanation: The stack pointer is decremented by 16
eight2−byteregisters
.
Answer: d
Explanation: The POP*A instruction, pops all the contents of the registers DI, SI, BP, SP, BX,
DX, CX and AX from the stack in this sequence, that is exactly opposite to that of pushing.
11. The instruction that multiplies the content of AL with a signed immediate operand is
a) MUL
b) SMUL
c) IMUL
Answer: c
Explanation: The IMUL instruction multiplies the content of AL with a signed immediate operand,
and the signed 16-bit result is stored in AX.
b) RCR
c) ROR
Answer: d
Explanation: The rotate source, count is a group of four instructions containing RCL, RCR, ROL,
ROR.
To practice all areas of Microprocessors, here is complete set of 1000+ Multiple Choice
Questions and Answers .
source
then
a) TF is cleared
b) OF is cleared
c) TF is set
d) OF is set
Answer: b
Explanation: If CF is equal to MSB of operand
source
, the overflow flag is cleared, otherwise, it is set to 1.
a) IMUL
b) INSW
c) INSB
d) POP*A
Answer: a
Explanation: No flags are affected by the instructions, INSW, INSB and POP*A.
3. A general protection exception is generated, if the value of
Answer: c
Explanation: When the value of CPL is greater than that of IOPL, a general protection exception
is generated.
a) 1
b) 2
c) 3
d) 4
Answer: b
Explanation: The SI is automatically incremented by 1 for byte
OUTSB
and 2 for word
OUTSW
operations.
a) QUIT
b) STOP
c) LEAVE
d) EXIT
Answer: c
Explanation: The instruction, LEAVE, is generally used with high level languages, to exit a
procedure.
6. The instruction that determines the number of bytes, to be copied into the new stack frame,
from the previous stack is
a) ENTER
b) BOUND
c) CLTS
d) LEAVE
Answer: a
Explanation: The ENTER instruction prepares a stack structure for parameters of a procedure to
be executed further. This instruction determines the number of bytes to be copied, into the new
stack frame, from the previous stack.
7. The instruction that is used to check whether a signed array offset is within the limit, defined
for it by the starting and ending index is
a) ENTER
b) BOUND
c) CLTS
d) LEAVE
Answer: b
Explanation: The BOUND instruction is used to check whether a signed array offset is within the
limit defined for it, by the starting and ending index.
8. The CLTS
ClearTaskSwitchFlag
instruction records every execution of WAIT and ESC and is trapped if the flag
a) PE
ProtectionEnable
and TS
taskswitch
Answer: c
Explanation: The CLTS
ClearTaskSwitchFlag
instruction records every execution of WAIT and ESC, and is trapped, if the MP flag and task
switched flag is set.
9. The instruction that determines whether the segment pointed to, by a 16-bit register, can be
accessed from the current privilege level is
a) RPL
b) CPL
c) ARPL
d) VERR
Answer: d
Explanation: The VERR/VERW instructions determine whether the segment pointed to, by a
16-bit register, can be accessed from the current privilege level.
10. The instruction that loads 6 bytes from a memory block, pointed to by the effective address
of the operand, into global descriptor table register is
a) LLDT
b) SGDT
c) LGDT
Answer: c
Explanation: The LGDT
loadglobaldescriptortableregister
loads 6 bytes from a memory block, pointed to by the effective address of the operand, into
global descriptor table register.
11. In LGDT instruction, while loading 6 bytes, the first word is loaded into the field of
a) LIMIT field
b) BASE field
Answer: a
Explanation: While loading the 6 bytes, the first word is loaded into the LIMIT field of the
descriptor table register. The next three bytes are loaded into the BASE field of the register, and
the remaining byte is ignored.
To practice all areas of Microprocessors for Quizzes, here is complete set of 1000+ Multiple
Choice Questions and Answers .
MCQs
Answer: d
Explanation: The three blocks of an internal architecture of 80287 are:
1. bus control logic
2. data interface and control unit
3. floating point unit.
2. The unit that provides and controls the interface, between the internal 80287 bus and 80286
bus via data buffer is
Answer: a
Explanation: The bus control logic provides and controls the interface, between the internal
80287 bus and 80286 bus via data buffer.
c) instruction decoders
Answer: d
Explanation: The data interface and control unit contains status and controls words, TAG words
and error pointers.
4. The word that optimizes the NDP performance, by maintaining a record of empty and
non-empty register locations is
b) TAG words
c) Error pointers
Answer: b
Explanation: The TAG word optimizes the NDP performance by maintaining a record of empty
and non-empty register locations. It helps the exception handler to identify special values in the
contents of the stack locations.
5. The part of the data interface and control unit, that points to the source of exception
generated is
b) TAG words
c) Error pointers
Answer: c
Explanation: The error pointers point to the source of exception
addressoftheinstructionthatgeneratedtheexception
generated.
a) 16 bits
b) 32 bits
c) 64 bits
d) 84 bits
Answer: d
Explanation: The data bus in a floating point unit is of 84-bits. Out of this 84-bits, the lower 68
bits are significant
mantissa
data bit, the next 16 bits are used for the exponent.
7. The arrangement of data that is to be shifted successively, whenever required for the
execution, is done by
a) error pointer
b) data buffer
c) barrel shifter
Answer: c
Explanation: The barrel shifter arranges and presents the data to be shifted successively,
whenever required for the execution.
8. The word that is used to select one of the processing options, among the provided ones is
a) status word
b) control word
Answer: b
Explanation: The control word is used to select one of the processing options, among the ones
provided by 80287.
9. After reset of 80287, the control bit that is initialized to zero is
a) masking bits
Answer: d
Explanation: The infinity control bit is initialized to zero after reset.
10. The bits that are modified depending upon the result of the execution of arithmetic
instructions are
a) masking bits
Answer: c
Explanation: The condition code bits are similar to the flags of a CPU. These are modified
depending upon the result of the execution of arithmetic instructions.
To practice all areas of Microprocessors, here is complete set of 1000+ Multiple Choice
Questions and Answers .
1. If the stack flag is set, and condition code bit C1=1, then the stack is
a) full
b) overflown
c) underflown
d) empty
Answer: b
Explanation: If the stack flag is set, and condition code bit C1=1, then the stack has overflown.
2. If the stack flag is set, and condition code bit C1=0, then the stack is
a) full
b) overflown
c) underflown
d) empty
Answer: c
Explanation: If the stack flag is set, and condition code bit C1=0, then the stack has underflown.
3. The bits that affect the result of arithmetic operations like ADD, SUB, MUL, DIV are
c) masking bits
Answer: d
Explanation: The precision control bits affect ADD, SUB, MUL, DIV and SQRT results.
a) opcode
Answer: c
Explanation: For other than the arithmetic instructions
likeADD,SUB,MUL,DIVandSQRT
, the precision is decided by opcode or extended precision format.
NPWR
a) memory to processor
b) 80287 to 80286
c) 80286 to 80287
d) 8086 to 80287
Answer: c
Explanation: If Numeric Processor Write
NPWR
active-low input pin is activated, then it enables a data transfer from 80286 to 80287.
NPRD
a) memory to processor
b) 80287 to 80286
c) 80286 to 80287
d) 8086 to 80287
Answer: b
Explanation: If Numeric Processor Read
NPRD
active-low input pin is activated, then it enables a data transfer from 80287 to 80286.
indicate that the CPU is performing an escape operation, and enables 80287 to execute the
next instruction?
a) NPWR
activelow
and NPRD
activelow
activelow
c) NPS1
activelow
and NPS2
Answer: c
Explanation: The Numeric Processor select input lines, NPS1
activelow
and NPS2, indicate that the CPU is performing an escape operation, and enables 80287 to
execute the next instruction.
8. For which pin of 80286 is the active low pin, BUSY of 80287, connected?
a) ERROR
activelow
b) BUSY
activelow
c) HLDA
d) TEST
activelow
Answer: d
Explanation: The BUSY
activelow
is connected to the TEST
activelow
pin of 80286.
9. If Clock Mode
CM
a) 1
b) 2
c) 3
d) 4
Answer: b
Explanation: If Clock Mode
CM
input pin is held high, then the CLK input is directly used for deriving the internal timings. Else,
it is divided by 2.
10. Which of the following pin is not involved in the interface of 80287 with 80286?
a) PEREQ
b) ERROR#
c) RESET
Answer: c
Explanation: The 10 pins, PEREQ, PEACK#, BUSY#, ERROR#, NPRD
activelow
#, NPWR
activelow
#, NPS1
activelow
#, NPS2#, CMD0 and CMD1.
activelow
a) PEREQ
b) ERROR#
c) RESET
Answer: a
Explanation: When the data transfer is over, the CPU activates PEACK
activelow
# pin, which results in deactivating the PEREQ pin by 80287.
To practice MCQs on all areas of Microprocessors, here is complete set of 1000+ Multiple
Choice Questions and Answers .
MCQs
Answer: d
Explanation: The 80386DX is a 32-bit processor that supports, 8-bit/16-bit/32-bit data operands.
a) 8 address lines
b) 16 address lines
c) 32 address lines
d) 64 address lines
Answer: c
Explanation: The 80386, with its 32-bit address bus, can address up to 4 GB of physical
memory.
3. The number of debug registers that are available in 80386, for hardware debugging and
control is
a) 2
b) 4
c) 8
d) 16
Answer: c
Explanation: The 80386 offers a set of total eight debug registers DR0-DR7, for hardware
debugging and control.
a) virtual memory
b) paging
Answer: d
Explanation: The memory management section of 80386 supports the virtual memory, paging
and four levels of protection, maintaining full compatibility with 80286.
5. The 80386 enables itself to organize the available physical memory into pages, which is
known as
a) segmentation
b) paging
c) memory division
Answer: b
Explanation: The concept of paging which is introduced in 80386, enables it to organize the
available physical memory into pages of size 4 KB each, under the segmented memory.
Answer: d
Explanation: The 80386 has on-chip address translation cache, and the instruction set is
upward compatible with all its predecessors.
a) 64 pin
b) 128 pin
c) 132 pin
d) 142 pin
Answer: c
Explanation: The 80386DX is available in a 132-pin grid array package.
Answer: b
Explanation: The operating frequency of 80386DX is 20MHz and 33 MHz.
9. The 80386 in its protected mode, in its virtual mode of operation, can run the applications of
a) 8086
b) 80286
c) 80287
d) 80387
Answer: a
Explanation: The 80386 can run the applications under protected mode, in its virtual 8086 mode
of operation.
10. The 80386 in protected mode, supports all software written for
a) 8086 and 80287
Answer: d
Explanation: The 80386 in protected mode, supports all software written for 8086 and 80286
tobeexecutedunderthecontrolofmemorymanagementandprotectionabilitiesof80386
.
To practice all areas of Microprocessors, here is complete set of 1000+ Multiple Choice
Questions and Answers .
MCQs
Answer: d
Explanation: The internal architecture of 80386 is divided into three sections namely, central
processing unit, memory management unit and bus interface unit.
Answer: c
Explanation: The central processing unit is further divided into the execution unit and instruction
unit.
3. The unit that is used for handling data, and calculates offset address is
b) execution unit
c) instruction unit
Answer: b
Explanation: The execution unit has eight general purpose and eight special purpose registers,
which are either used for handling the data or calculating the offset addresses.
4. The unit that decodes the opcode bytes, received from the 16-byte instruction code queue is
b) execution unit
c) instruction unit
d) barrel shifter
Answer: c
Explanation: The instruction unit decodes the opcode bytes, received from the 16-byte
instruction code queue, after decoding them so as to pass it to the control section, for deriving
the necessary control signals.
5. The unit that increases the speed of all shift and rotate operations is
b) execution unit
c) instruction unit
d) barrel shifter
Answer: d
Explanation: The barrel shifter speeds up all shift and rotate operations.
a) segmentation unit
b) paging unit
Answer: c
Explanation: The memory management unit consists of a segmentation unit and a paging unit.
Answer: d
Explanation: The segmentation unit allows the use of two address components. They are:
segment and offset for relocation and sharing of code and data.
8. The unit that organizes the physical memory, in terms of pages of 4KB size each is
a) segmentation unit
b) execution unit
c) paging unit
d) instruction unit
Answer: c
Explanation: The paging unit organizes the physical memory, in terms of pages of 4KB size
each.
b) segmentation unit
c) execution unit
d) instruction unit
Answer: b
Explanation: The paging unit works under the control of the segmentation unit; i.e. each
segment is further divided into pages.
10. The unit that provides a four level protection mechanism, for system’s code and data against
application program is
b) segmentation unit
Answer: b
Explanation: The segmentation unit provides a four level protection mechanism, for protecting
and isolating the system’s code and data, from those of the application program.
11. The unit that has a prioritizer to resolve the priority of the various bus requests is
b) data buffer
d) execution unit
Answer: c
Explanation: The bus control unit has a prioritizer to resolve the priority of the various bus
requests.
12. The unit that interfaces the internal data bus with the system bus is
b) data buffer
d) execution unit
Answer: b
Explanation: The data buffer interfaces the internal data bus with the system bus.
13. The unit that drives the bus enable and address signals A0-A31 is
c) address driver
d) bus driver
Answer: c
Explanation: The address driver drives the bus enable and address signals A0-A31.
14. Which of the following pin when activated, allows address pipelining?
a) ADS
b) NA
c) AP
Answer: b
Explanation: The Next Address
NA
input pin, if activated, allows address pipelining, during 80386 bus cycles.
15. The signal that is used to insert WAIT states in a bus cycle in 80386 is
a) HOLD
b) HLDA
c) READY
d) PEREQ
Answer: c
Explanation: READY signal is used to insert WAIT states in a bus cycle, and is useful for
interfacing of slow devices with the CPU.
16. The signal which indicates to the CPU, to fetch a data word for the coprocessor is
a) READY
b) NMI
c) HLDA
d) PEREQ
Answer: d
Explanation: The Processor Extension Request
PEREQ
output signal indicates to the CPU to fetch a data word for the coprocessor.
a) data signals
b) address signals
c) control signals
Answer: c
Explanation: The pipeline and dynamic bus sizing units handle the related control signals.
To practice all areas of Microprocessors, here is complete set of 1000+ Multiple Choice
Questions and Answers .
MCQs
1. The 16-bit registers are available with their extended size of 32 bits, by adding the registers
with a prefix of
a) X
b) E
c) 32
d) XX
Answer: b
Explanation: A 32 bit register, known as an extended register, is represented by the register
name with a prefix of E.
2. In a 32-bit register, ESP, the lower 16-bits of the register can be represented by
a) LSP
b) FSP
c) SP
Answer: c
Explanation: Though the extended size of 32 bits are named as EBP, ESP, ESI and EDI, the
names BP, SP, SI and DI represent the lower 16-bits.
a) ES
b) FS
c) GS
Answer: d
Explanation: The six segment registers available in 80386 are CS, SS, DS, ES, FS and GS, out
of which DS, ES, FS and GS are the four data segment registers.
a) 8 bits
b) 16 bits
c) 32 bits
Answer: d
Explanation: The 32-bit addressing modes may use all the register widths, i.e. 8, 16 or 32 bits.
5. The flag that is additional in flag register of 80386, compared to that of 80286 is
a) VM flag
b) RF flag
c) VM and RF flag
Answer: c
Explanation: The VM and RF flags are added to the 80286 flag register, to derive the flag
register of 80386.
6. The VM
virtualmode
a) virtual mode
b) protected mode
Answer: b
Explanation: If VM flag is set, the 80386 enters the virtual 8086 mode within the protected
mode. This is to be set only when the 80386 is in protected mode.
a) IRET instruction
Answer: c
Explanation: The VM flag can be set using the IRET instruction or any task switch operation,
only in the protected mode.
8. During the instruction cycle of 80386, any debug fault can be ignored if
a) VM flag is set
b) VM flag is cleared
c) RF is cleared
d) RF is set
Answer: d
Explanation: If RF
resumeflag
is set, any debug fault is ignored during the instruction cycle.
9. The RF is not automatically reset after the execution of
a) IRET
b) POPA
Answer: c
Explanation: The RF is automatically reset after the execution of every instruction, except for the
IRET and POPF instructions. Also, it is not cleared automatically after the successful execution
of JMP, CALL and INT instructions causing a task switch.
a) attributes
Answer: d
Explanation: The segment descriptor register is used to store the descriptor information like
attributes, limit and base addresses of segments.
To practice all areas of Microprocessors, here is complete set of 1000+ Multiple Choice
Questions and Answers .
This set of Microprocessors Multiple Choice Questions & Answers focuses on “Register
Organisation of 80386 -2”.
1. The 32-bit control register, that is used to hold global machine status, independent of the
executed task is
a) CR0
b) CR2
c) CR3
Answer: d
Explanation: The 80386 has three 32-bit control registers CR0, CR2 and CR3, to hold global
machine status, independent of the executed task.
a) GDT
Globaldescriptortable
b) IDT
Interruptdescriptortable
c) LDT
Localdescriptortable
Answer: d
Explanation: The 80386 supports four types of descriptor tables. They are, GDT, IDT, LDT and
TSS.
3. The registers that are together, known as system address registers are
c) TR and GDTR
d) LDTR and TR
Answer: a
Explanation: The GDTR and IDTR are known as system address registers.
a) GDTR
b) LDTR
c) IDTR
Answer: b
Explanation: The LDTR and TR are known as system segment registers.
Answer: c
Explanation: Two test registers are provided by 80386 for page caching, namely test control and
test status registers.
6. Among eight debug registers, DR0-DR7, the registers that are reserved by Intel are
b) DR4, DR5
c) DR1, DR4
Answer: b
Explanation: Out of the eight debug registers, the two registers DR4 and DR5 are Intel reserved.
7. The registers that are used to store four program controllable break point addresses are
a) DR5-DR7
b) DR0-DR1
c) DR6-DR7
d) DR0-DR3
Answer: d
Explanation: The initial four registers, DR0-DR3 store four program controllable break point
addresses.
Answer: a
Explanation: The registers DR6 and DR7 respectively hold break point status and break point
control information.
9. The flag bits that indicate the privilege level of current IO operations are
Answer: b
Explanation: The IOPL flag bits indicate the privilege level of current IO operations.
10. The registers that are not available for programmers are
b) instruction pointers
d) flag registers
Answer: c
Explanation: The segment descriptor registers of 80386 are not available for programmers,
rather, they are internally used to store the descriptor information.
To practice all areas of Microprocessors, here is complete set of 1000+ Multiple Choice
Questions and Answers .
a) 2
b) 4
c) 6
d) 8
Answer: c
Explanation: In case of the scaled the modes, any of the index register values can be multiplied
by a valid scale factor to obtain the displacement. The valid scale factors are 1, 2, 4 and 8.
2. Contents of an index register are multiplied by a scale factor that may be added further to get
the operand offset in
c) indexed mode
Answer: b
Explanation: In scaled indexed mode, contents of an index register are multiplied by a scale
factor that may be added further to get the operand offset.
3. Contents of an index register are multiplied by a scale factor and then added to base register
to get the operand offset in
c) indexed mode
Answer: a
Explanation: In base scaled indexed mode, contents of an index register are multiplied by a
scale factor and then added to base register to get the operand offset.
4. In the based scaled indexed mode with displacement mode, the contents of an index register
are multiplied by a scale factor and are added to
a) base register
b) displacement
Answer: c
Explanation: Contents of an index register are multiplied by a scale factor and the result is
added to a base register and a displacement to get the offset of an operand.
c) indexed mode
Answer: a
Explanation: Since in base scaled indexed mode, contents of an index register are multiplied by
a scale factor and then added to base register to get the operand offset.
c) indexed mode
Answer: b
Explanation: Since in scaled indexed mode, contents of an index register are multiplied by a
scale factor that may be added further to get the operand offset.
7. Bit field can be defined as a group of
a) 8 bits
b) 16 bits
c) 32 bits
d) 64 bits
Answer: c
Explanation: A group of at the most 32 bits
4bytes
is defined as a bit field.
a) 2 MB
b) 4 MB
c) 2 GB
d) 4 GB
Answer: d
Explanation: Bit string is a string of contiguous bits of maximum 4Gbytes in length.
Answer: c
Explanation: The integer word is the signed 16-bit data.
10. A 16-bit displacement that references a memory location using any of the addressing modes
is
a) Pointer
b) Character
c) BCD
d) Offset
Answer: d
Explanation: Offset is a 16-bit or 32-bit displacement that references a memory location using
any of the addressing modes.
a) unsigned integer
b) signed integer
c) unpacked BCD
d) packed BCD
Answer: c
Explanation: Decimal digits from 0-9 are represented by unpacked bytes.
To practice all areas of Microprocessors, here is complete set of 1000+ Multiple Choice
Questions and Answers .
MCQs
1. The instructions available in the 80386 that are not available in its real address mode is
a) addressing techniques
Answer: b
Explanation: All the instructions of 80386 are available in this mode except for those designed to
work with or for protected address mode.
Answer: c
Explanation: The paging unit is disabled in real address mode.
Answer: d
Explanation: To form a physical memory address, appropriate segment register contents are
shifted by left by 4 positions and then added to 16-bit offset address formed using one of
addressing modes, in same way as in the 80386 real address mode.
a) overlapped
b) non-overlapped
Answer: c
Explanation: The segments in 80386 real mode are may be overlapped or non-overlapped.
a) read
b) write
c) execute
Answer: d
Explanation: The segments in 80386 real mode can be read, written or executed, i.e. no
protection is available.
6. The selectors contain the segment’s
a) segment limit
b) base address
Answer: d
Explanation: In protected mode, the contents of segment registers are used as selectors to
address descriptors which contain the segment limit, base address and access rights byte of the
segment.
Answer: a
Explanation: The effective address
offset
is added with segment base address to calculate linear address.
a) effective address
b) physical address
Answer: b
Explanation: The paging unit when enabled, it converts a linear address into physical address.
a) effective address
b) physical address
c) segment base address
Answer: b
Explanation: The linear address is used as a physical address if the paging unit is disabled.
a) virtual mode
b) addressing mode
c) protected mode
Answer: c
Explanation: The paging unit is enabled only in protected mode.
11. For a single task in protected mode, the 80386 can address the virtual memory of
a) 32 GB
b) 64 MB
c) 32 TB
d) 64 TB
Answer: d
Explanation: In protected mode, the 80386 can address 4 GB of physical memory and 64 TB of
virtual memory per task.
To practice all areas of Microprocessors, here is complete set of 1000+ Multiple Choice
Questions and Answers .
MCQs
focuses on “Segmentation”.
1. The bit that indicates whether the segment has been accessed by the CPU or not is
a) base address
b) attribute bit
c) present bit
d) granular bit
Answer: b
Explanation: The accessed bit or attribute bit
A
indicates whether the segment has been accessed by the CPU or not.
a) descriptor type
b) segment type
d) none
Answer: c
Explanation: The type field decides the descriptor type and hence the segment type.
c) system descriptor
Answer: c
Explanation: If S=0, then system descriptor. If S=1, then code or data segment descriptor.
a) base address
b) attribute bit
c) present bit
d) granularity bit
Answer: d
Explanation: The granularity bit indicates whether the segment is page addressable.
5. If the Default operation size bit, D=1, the code segment operation size selected is
a) 8-bit
b) 16-bit
c) 32-bit
d) 64-bit
Answer: c
Explanation: If D=1, the segment selected is 32-bit operand segment, else, it is a 16-bit operand
segment.
a) access rights
b) limit
c) base address
Answer: d
Explanation: The segment descriptors are 8-byte quantities containing access right or attribute
bits along with the base and limit of the segments.
a) system descriptors
b) local descriptors
c) gate descriptors
d) none
Answer: d
Explanation: The five types of segment descriptors of 80386 are:
1. Code or data segment descriptors
2. System descriptors
3. Local descriptors
4. TSS
taskstatesegment
descriptors
5. Gate descriptors.
8. The limit field of the descriptor is of
a) 10 bits
b) 8 bits
c) 16 bits
d) 20 bits
Answer: d
Explanation: The limit field of the descriptor is of 20 bits.
a) physical memory
b) segment descriptors
c) operating system
d) base address
Answer: c
Explanation: The base address that marks the starting address of the segment in physical
memory is decided by the operating system and is of 32 bits.
a) 2K
b) 8K
c) 4K
d) 16K
Answer: d
Explanation: 80386 can handle total 16K descriptors and hence segments.
To practice all areas of Microprocessors, here is complete set of 1000+ Multiple Choice
Questions and Answers .
MCQs
focuses on “Paging”.
1. The advantage of pages in paging is
Answer: d
Explanation: The advantage of paging scheme is that the complete segment of a task need not
be in the physical memory at any time. Only a few pages of the segments, which are required
currently for the execution, need to be available in the physical memory.
a) variable
b) fixed
d) none
Answer: b
Explanation: The paging divides the memory into fixed size pages.
3. To convert linear addresses into physical addresses, the mechanism that the paging unit uses
is
Answer: d
Explanation: The paging unit of 80386 uses a two level table mechanism, to convert the linear
addresses provided by the segmentation unit, into physical addresses.
4. The control register that stores the 32-bit linear address, at which the previous page fault is
detected is
a) CR0
b) CR1
c) CR2
d) CR3
Answer: c
Explanation: The control register, CR2, is used to store the 32-bit linear address, at which the
previous page fault is detected.
a) page directory
c) page table
d) page
Answer: b
Explanation: The paging unit handles every task in terms of three components namely page
directory, page table and the page itself.
6. The control register that is used as page directory physical base address register is
a) CR0
b) CR1
c) CR2
d) CR3
Answer: d
Explanation: The control register, CR3, is used as page directory physical base address
register, to store the physical starting address of the page directory.
a) higher 4 bits
b) lower 8 bits
c) higher 10 bits
d) lower 12 bits
Answer: d
Explanation: The lower 12 bits of CR3 are always zero to ensure the page size aligned with the
directory.
a) 2 bytes
b) 4 bytes
c) 8 bytes
d) 16 bytes
Answer: b
Explanation: Each directory entry is of 4 bytes, thus a total of 1024 entries are allowed in a
directory.
a) 2 Kbytes
b) 2 bytes
c) 4 Kbytes
d) 4 bytes
Answer: c
Explanation: Each page table is of 4 Kbytes in size, and may contain a maximum of 1024
entries.
a) write
b) read
c) initialization
Answer: a
Explanation: The dirty bit
D
is set before a write operation to the page is carried out.
a) P-bit
b) A-bit
c) D-bit
Answer: c
Explanation: The D-bit is undefined for page directory entries.
a) User/Supervisor bit
b) Read bit
c) Write bit
Answer: d
Explanation: The User/Supervisor
U/S
bit and Read/Write
R/W
bit are used to provide protection.
13. The storage of 32 recently accessed page table entries to optimize the time, is known as
a) page table
Answer: c
Explanation: To optimize the considerable time taken for conversion, a page table cache is
provided, which stores the 32 recently accessed page table entries.
14. The page table cache is also known as
b) storage buffer
Answer: c
Explanation: The page table cache is also known as translation look aside buffer.
To practice all areas of Microprocessors, here is complete set of 1000+ Multiple Choice
Questions and Answers .
MCQs
1. If the 80386 enters the protected mode from the real address mode, then it returns back to
the real mode, by performing the operation of
a) read
b) write
c) terminate
d) reset
Answer: d
Explanation: If the 80386 enters the protected mode from the real address mode, then it cannot
return back to the real mode without a reset operation.
2. The unit that is needed for virtual mode 80386, only to run the 8086 programs, which require
more than 1 Mbyte of memory for memory management functions, is
a) execution unit
c) paging unit
d) segmentation unit
Answer: c
Explanation: Paging unit is not necessarily enabled in the virtual mode, but may be needed to
run the 8086 programs, which require more than 1 Mbyte of memory, for memory management
functions.
3. The number of pages that the paging unit allows, in the virtual mode of 80386 is
a) 64
b) 128
c) 256
d) 512
Answer: c
Explanation: In virtual mode, the paging unit allows only 256 pages, each of 4Kbytes size. Each
of the pages may be located anywhere within the maximum 4Gbytes physical memory.
4. The privilege level at which the real mode programs are executed is
a) level 0
b) level 1
c) level 2
d) level 3
Answer: a
Explanation: The real mode programs are executed at the highest privilege level i.e. level 0.
5. The instructions to prepare the processor for protected mode can only be executed at the
privilege level
a) level 0
b) level 1
c) level 2
d) level 3
Answer: a
Explanation: The instructions to prepare the processor for protected mode can only be executed
at the level 0.
bit is
a) PUSHF
b) IRET
c) POPF
Answer: d
Explanation: The PUSHF and POPF instructions are unable to set or read the VM
VirtualMode
bit, as they do not access it. The virtual mode can be entered by using IRET instruction.
b) protected mode
c) synchronous mode
d) asynchronous mode
Answer: c
Explanation: If the CKM pin of 80387 is high, then 80387 is operated in synchronous mode. If it
is low, then 80387 is operated in asynchronous mode.
8. The unit that handles the data and directs it to either FIFO or instruction decoder depending
on the bus control logic directive is
a) paging unit
c) segmentation unit
Answer: d
Explanation: The data interface and control unit handles the data, and direct it to either FIFO or
instruction decoder, depending on the bus control logic directive.
9. The unit that is responsible for carrying out all the floating point calculations, allotted to the
coprocessor by 80386, is
b) ALU
c) FPU
Answer: c
Explanation: The FPU
floatingpointunit
is responsible for carrying out all the floating point calculations, allotted to the coprocessor by
80386.
10. The sizes of instruction and data pointer registers of 80387 respectively are
a) 32-bit, 32-bit
b) 48-bit, 32-bit
c) 32-bit, 48-bit
d) 48-bit, 48-bit
Answer: d
Explanation: 80387 consists of two 48-bit registers, known as instruction and data pointer
registers.
11. To inform 80387 that the CPU wants to communicate with NPS1, the NPS1 line is directly
connected to
a) A31
b) A30
c) M/IO
d) D31
Answer: c
Explanation: The NPS1 and NPS2 lines are directly connected with M/IO and A31 respectively,
to inform 80387 that the CPU wants to communicate with it
NPS1
, and it is using one of the reserved I/O addresses for 80387
NPS2
.
To practice all areas of Microprocessors, here is complete set of 1000+ Multiple Choice
Questions and Answers .
MCQs
1. Which of the following is not a newly added instruction of 80386, that are not present in
80286?
Answer: d
Explanation: The newly added instructions of 80386 are categorized into
1. bit scan instructions
2. bit test instructions
3. conditional set byte instructions
4. shift double instructions
5. control transfer via gates instructions.
2. The BSF
bitscanforward
Answer: b
Explanation: The BSF
bitscanforward
instruction scans the operand from right to left.
3. The BSR
bitscanreverse
Answer: a
Explanation: The BSR
bitscanreverse
instruction scans the operand from left to right.
c) VM flag is set
d) RF flag is reset
Answer: b
Explanation: The BSF instruction scans the operand from right to left. If a ‘1’ is encountered
during the scan, zero flag is set, and the bit position of ‘1’ is stored into the destination operand.
c) VM flag is reset
d) RF flag is set
Answer: a
Explanation: The BSR instruction scans the operand from left to right. If a ‘1’ is not encountered
during the scan, zero flag is reset whether the scan is BSF or BSR.
a) BTC
b) BTS
c) BSF
d) BTR
Answer: c
Explanation: The instruction, BSF, is a bit scan instruction. The four bit test instructions are:
BT
TestaBit
, BTC
TestaBitandComplement
, BTR
TestandResetaBit
and BTS
TestandSetabit
.
7. In case of BT instruction, if the bit position in the destination operand specified by the source
operand, is ‘1’, then
c) VM flag is set
d) RF flag is reset
Answer: b
Explanation: In case of BT instruction, if the bit position in the destination operand specified by
the source operand, is ‘1’, the carry flag is set, otherwise it is cleared.
a) SETNP
b) SETO
c) SETNAE
d) SHRD
Answer: d
Explanation: The SHRD
ShiftRightDouble
is a shift double instruction.
9. The instruction that shifts the specified number of bits in the instruction, from the upper side
of the source operand into the lower side of the destination operand is
a) SHRD
b) SHLD
c) SETNS
Answer: b
Explanation: The SHLD instruction shifts the specified number of bits in the instruction, from the
upper side
i.e.MSB
of the source operand into the lower side
i.e.LSB
of the destination operand.
10. The instruction that shifts 8 LSB bits of ECX into the MSB positions of EAX, one by one
starting from LSB of ECX is
a) SHLD ECX,EAX,8
b) SHLD EAX,ECX,8
c) SHRD ECX,EAX,8
d) SHRD EAX,ECX,8
Answer: d
Explanation: The SHRD instruction shifts the specified number of bits in the instruction, from the
lower side
i.e.LSB
of the source operand into the upper side
i.e.MSB
of the destination operand.
To practice all areas of Microprocessors, here is complete set of 1000+ Multiple Choice
Questions and Answers .
MCQs
a) 80386
b) 80486
c) 80286
d) 8086
Answer: b
Explanation: The 32-bit CPU 80486 from Intel is the first processor with an inbuilt floating point
unit. 80486DX is the first CPU with an on chip floating point unit.
2. Which of the following signal is handled by bus control and request sequencer?
a) ADS#
b) PWT
c) RDY#
Answer: d
Explanation: The bus control and request sequencer handle the signals like ADS#, PWT, RDY#,
W/R#, INTR, NMI, LOCK#, HOLD, HLDA, RESET and M/IO# which basically controls the bus
access and operations.
3. The unit that subjects the processor operation to boundary scan tests is
b) prefetcher unit
d) segmentation unit
Answer: c
Explanation: The boundary scan and control unit subjects the processor operation to boundary
scan tests to ensure the correct operation of various components of the mother board.
4. The management of the virtual memory of the system and adequate protection to data or
codes in the physical memory is provided by
a) segmentation unit
b) paging unit
c) attribute PLA
Answer: d
Explanation: The segmentation unit, paging unit, attribute PLA, descriptor registers, translation
look aside buffer and limit work together to manage the virtual memory of the system and
provide the adequate protection to the codes or data in the physical memory.
5. The flag that is added to 80486 in additional to the flags similar to 80386 is
c) conditional flag
Answer: a
Explanation: The register set of 80486 is similar to that of the 80386 but only a flag called as
alignment check flag is added to the flag register of 80386 to obtain the flag register of 80486.
a) low speed
Answer: b
Explanation: The major limitation of 80386-387 system is that the 80386 sends instruction or
data to 80387 using an I/O handshake technique. To perform this handshaking and to carry
additional house keeping tasks, 80386 requires 15 clock cycles or more.
b) ASCII
c) Floating point
d) None
Answer: d
Explanation: The datatypes that 80486 supports are
1. Signed
2. Unsigned
3. Floating point
4. BCD
5. String
6. ASCII.
a) MSB is stored at lower memory address and LSB at higher memory address
b) LSB is stored at lower memory address and MSB at higher memory address
Answer: b
Explanation: In Little Endian data format, for a data of size bigger than 1 byte, the LSB is stored
at lower memory address and MSB at higher memory address.
a) addresses of data
a) Cache disable
CD
b) No write through
NW
Answer: c
Explanation: Cache disable
CD
and No write through
NW
bits of control register CR0. To completely disable cache, the CD and NW bits must be 11.
11. The on-chip cache can be flushed using external hardware using
a) FLUSH pin
b) TERMINATE pin
c) FLOW pin
Answer: d
Explanation: The on-chip cache can be flushed using external hardware using pin FLUSH# or
using the software. The flushing operation clears all the valid bits for all the cache lines.
To practice all areas of Microprocessors and Micro-controllers, here is complete set of 1000+
Multiple Choice Questions and Answers .
a) superscalar architecture
b) superpipelined architecture
Answer: c
Explanation: The salient feature of Pentium is its superscalar, superpipelined architecture.
a) 2
b) 4
c) 3
d) 6
Answer: b
Explanation: The Pentium has two integer pipelines, U and V, where each one is a 4-stage
pipeline.
a) data cache
c) instruction cache
Answer: b
Explanation: The Pentium has two separate caches. They are data cache and instruction cache.
c) 4-stage pipelines
Answer: c
Explanation: The Pentium has two integer pipelines, U and V, where each one is a 4-stage
pipeline. This enhances the speed of integer arithmetic of Pentium to a large extent.
5. For enhancement of processor performance, beyond one instruction per cycle, the computer
architects employ the technique of
Answer: b
Explanation: For enhancement of processor performance, beyond one instruction per cycle, the
computer architects employ the technique of multiple instruction issue.
multipleinstructionissue
Answer: d
Explanation: The MII architecture may again be classified into two categories:
1. Very long instruction word architecture
2. Superscalar architecture.
7. The compiler reorders the sequential stream of code that is coming from memory into a fixed
size instruction group in
a) super pipelined architecture
Answer: c
Explanation: In VLIW processors, the compiler reorders the sequential stream of code that is
coming from memory into a fixed size instruction group, and issues them in parallel for
execution.
8. The architecture in which the hardware decides which instructions are to be issued
concurrently at run time is
d) superscalar architecture
Answer: d
Explanation: In the superscalar architecture, the hardware decides which instructions are to be
issued concurrently at run time.
9. The CPU has to wait until the execution stage to determine whether the condition is met in
a) unconditional branch
b) conditional branch
Answer: b
Explanation: In conditional branch, the CPU has to wait until the execution stage to determine
whether the condition is met or not. When the condition satisfies, a branch is to be taken.
10. The memory device that holds branch target addresses for previously executed branches is
a) Tristate buffer
b) RAM
c) ROM
Answer: d
Explanation: The branch target buffer in Pentium CPU holds branch target addresses for
previously executed branches.
Answer: d
Explanation: The branch target buffer is a four-way set-associative memory. Whenever a branch
is taken, the CPU enters the branch instruction address, and also the destination address in the
branch target buffer.
To practice all areas of Microprocessors for online tests, here is complete set of 1000+ Multiple
Choice Questions and Answers .
MCQs
1. The stage in which the CPU fetches the instructions from the instruction cache in superscalar
organization is
a) Prefetch stage
b) D1
firstdecode
stage
c) D2
seconddecode
stage
d) Final stage
Answer: a
Explanation: In the prefetch stage of pipeline, the CPU fetches the instructions from the
instruction cache, which stores the instructions to be executed. In this stage, CPU also aligns
the codes appropriately.
a) Prefetch stage
b) D1
firstdecode
stage
c) D2
seconddecode
stage
d) Final stage
Answer: b
Explanation: In D1 stage, the CPU decodes the instructions and generates control words. For
simple RISC instructions, only single control word is enough for starting the execution.
Answer: c
Explanation: The fifth stage or final stage of pipeline is also known as “Write back
WB
stage”.
Answer: d
Explanation: In the execution stage, known as E-stage, the CPU accesses data cache,
executes arithmetic/logic computations, and floating point operations in execution unit.
5. The stage in which the CPU generates an address for data memory references in this stage
is
a) prefetch stage
b) D1
firstdecode
stage
c) D2
seconddecode
stage
d) execution stage
Answer: c
Explanation: In the D2
seconddecode
stage, CPU generates an address for data memory references in this stage. This stage is
required where the control word from D1 stage is again decoded for final execution.
b) high bandwidth
Answer: d
Explanation: The separated caches have low hit ratio compared to a unified cache, but have the
advantage of supporting the superscalar organization and high bandwidth.
FloatingPointUnit
b) instruction cache
Answer: c
Explanation: In the operand fetch stage, the FPU
FloatingPointUnit
fetches the operands from either floating point register file or data cache.
8. The FPU
FloatingPointUnit
a) X1 execution state
b) X2 execution state
Answer: c
Explanation: In the two execution stages of X1 and X2, the floating point unit reads the data
from the data cache and executes the floating point computation. In the “write back stage” of
pipeline, the FPU
FloatingPointUnit
writes the results to the floating point register file.
a) single precision
b) double precision
c) extended precision
Answer: d
Explanation: The floating point multiplier segment performs floating point multiplication in single
precision, double precision and extended precision.
10. The instruction or segment that executes the floating point square root instructions is
Answer: c
Explanation: The floating point divider segment executes the floating point division and square
root instructions.
11. The floating point rounder segment performs rounding off operation at
Answer: b
Explanation: The results of floating point addition or division process may be required to be
rounded off, before write back stage to the floating point registers.
12. Which of the following is a floating point exception that is generated in case of integer
arithmetic?
a) divide by zero
b) overflow
c) denormal operand
13. The mechanism that determines whether a floating point operation will be executed without
creating any exception is
Answer: c
Explanation: A mechanism known as Safe Exception Recognition
SER
had been employed in Pentium which determines whether a floating point operation will be
executed without creating any exception.
To practice all areas of Microprocessors, here is complete set of 1000+ Multiple Choice
Questions and Answers .
This set of Tricky Microprocessors Questions and Answers focuses on “Enhanced Instruction
Set of Pentium, Intel MMX Architecture”.
a) FSIN
b) FCOS
c) FMUL
d) FPTAN
Answer: c
Explanation: The FMUL instruction is a float point multiplication, which is not a transcendental
instruction.
b) FSNE
c) FSINFCOS
d) FSINCOS
Answer: d
Explanation: The instruction, FSINCOS, supports to compute sine and cosine.
is
a) FTAN
b) FTNGNT
c) FPTAN
d) FXTAN
Answer: c
Explanation: The instruction, FPTAN, computes tan
x
.
is
a) FTAN
b) FACTN
c) FARCTAN
d) FPATAN
Answer: d
Explanation: The instruction, FPATAN, computes arctan
x
which is arc tangent of x.
a) 2X
b) 2X-1
c) 2X+1
d) 2X+2
Answer: b
Explanation: The instruction, F2XMI, is used to compute 2X-1.
a) Y*logX
b) Y*log2X
c) Y*log
2X+1
d) Y*log2
X+1
Answer: d
Explanation: The instruction, FYL2XP, supports to compute the expression Y*log2
X+1
.
7. The size of a general purpose floating point register of floating point unit is
a) 4 bytes
b) 40 bytes
c) 8 bytes
d) 80 bits
Answer: d
Explanation: There are eight general purpose floating point registers in the floating point unit.
Each of these eight registers are of 80-bits width.
8. For floating point operations, the bits used by mantissa in a floating point register is
a) 32
b) 64
c) 72
d) 79
Answer: b
Explanation: For floating point operations, 64 bits are used for the mantissa, and the rest 16 bits
for exponent.
Answer: c
Explanation: Most of the multimedia applications mainly require the architecture of single
instruction stream multiple data stream.
MultimediaExtension
register is
a) 32 bits
b) 64 bits
c) 128 bits
d) 256 bits
Answer: b
Explanation: The MMX registers use only the 64-bit mantissa portion of the general purpose
floating point registers, to store MMX operands. Thus, the MMX programmers virtually get eight
new MMX registers, each of 64 bits.
11. After a sequence of MMX instructions is executed, the MMX registers should be cleared by
an instruction,
a) CLEAR
b) RESET
c) EMM
d) EMMS
Answer: d
Explanation: After a sequence of MMX instructions is executed, the MMX registers should be
cleared by an instruction, EMMS, which implies Empty the MMX Stack.
12. The number of pixels that can be manipulated in a single register by the CPU using MMX
architecture is
a) 4
b) 6
c) 8
d) 10
Answer: c
Explanation: Any CPU can manipulate only one pixel at a time. But by using MMX architecture,
we can manipulate eight such pixels, packed in a single 64-bit register.
13. After executing the floating point instructions, the floating point registers should be cleared
by an instruction,
a) CLEAR
b) EFPR
c) EMMF
d) EMMS
Answer: d
Explanation: After executing the floating point instructions, the floating point registers should be
cleared by an instruction, EMMS.
To practice tricky questions and answers on all areas of Microprocessors, here is complete set
of 1000+ Multiple Choice Questions and Answers .
This set of Microprocessors online quiz focuses on “MMX Data Types, Wrap-around and
Saturation Arithmetic, Multimedia Application Programming, Pentium III
P−III
CPU”.
1. In the data type, packed byte, the number of bytes that can be packed into one 64-bit quantity
is
a) 2
b) 4
c) 8
d) 16
Answer: c
Explanation: In packed byte data type, eight bytes can be packed into one 64-bit quantity.
2. Four words can be packed into 64-bit by using the data type,
a) unpacked word
b) packed word
Answer: b
Explanation: By using the packed word data type, four words can be packed into 64-bits.
3. The number of double words that can be packed into 64-bit register using packed double
word is
a) 2
b) 4
c) 6
d) 8
Answer: a
Explanation: Using packed double word, two double words can be packed into 64-bit.
4. The data type, “one quad word” packs __________ into 64-bit.
Answer: d
Explanation: The data type, “one quad word” packs one single 64-bit quantity into 64-bit register.
exceededthan16bits
or underflowed then, only the lower 16-bits of the result are stored in the register and this effect
is known as
a) overflow/underflow effect
b) wrap-around effect
d) none
Answer: b
Explanation: If the result of an operation is overflowed
exceededthan16bits
or underflowed then, only the lower 16-bits of the result are stored in the register, and this effect
is known as wrap-around effect.
6. In a multitasking operating system environment, each task should return to its own processor
state which is
Answer: d
Explanation: In a multitasking operating system environment, each task should return to its own
processor state, which should be saved when the task switching occurs. The processor state
here means the contents of the registers, both integer and floating point or MMX register.
7. Which of the following exception generated by MMX is the same type of memory access
exception as the X86 instructions?
a) page fault
c) limit violation
Answer: d
Explanation: The MMX instruction set generates the same type of memory access exception as
the X86 instructions namely; page fault, segment does not present and limit violation.
8. When an MMX instruction is getting executed, the floating-point tag word is marked
a) 11
b) 10
c) 00
d) 01
Answer: c
Explanation: When an MMX instruction is getting executed, the floating-point tag word is marked
valid i.e. 00.
9. In a preemptive multitasking O.S., the saving and restoring of FP and MMX states are
performed by
a) Control unit
b) O.S.
c) MMX instructions
d) MMX registers
Answer: b
Explanation: In a preemptive multitasking O.S., the application does not know when it is
preemptied. It is the job of the O.S. to save and restore the FP and MMX states, when
performing a context switch. Thus the user need not save or restore the state.
10. The instruction of MMX that is essential when a floating-point routine calls an MMX routine
or viceversa is
a) MOV
b) PADD
c) EMMS
Answer: c
Explanation: The EMMS instruction is imperative when a floating point routine calls an MMX
routine or vice-versa. If we do not use EMMS at the end of MMX routine, subsequent
floating-point instructions will produce erratic results.
11. Pentium III is used in computers which run on the operating system of
a) windows NT
b) windows 98
c) unix
Answer: d
Explanation: Pentium III is the best option to use in computers from high performance desktop
to workstations and servers, running on operating systems like Windows NT, Windows 98 and
UNIX.
a) multimedia
b) image processing
c) speech processing
Answer: d
Explanation: The architecture of CPU of Pentium III is suitable for applications like imaging,
image processing, speech processing, multimedia and internet applications.
a) 300MHz,350MHz,400MHz
b) 400MHz,450MHz,500MHz
c) 350MHz,400MHz,450MHz
d) 450MHz,500MHz,550MHz
Answer: d
Explanation: The Pentium III has three versions operating at frequencies, 450MHz, 500MHz and
550MHz, which are all commercially available.
Answer: d
Explanation: The Pentium III has dual independent bus architecture that increases the
bandwidth. It has a 512 Kbyte unified, non-blocking level2 cache and eight 64-wide Intel MMX
registers.
To practice all areas of Microprocessors for online Quizzes, here is complete set of 1000+
Multiple Choice Questions and Answers .
MCQs
1. The additional instructions that are designed especially for performing multimedia tasks are
known as
Answer: c
Explanation: The MMX technology adds 57 new instructions to the instruction set of processors.
These instructions are known as enhanced MMX instructions and are designed specifically for
performing multimedia tasks.
a) source operand
b) destination operand
Answer: d
Explanation: The instruction, EMMS, does not have any operand.
a) Memory
b) RAM
d) MMX register
Answer: d
Explanation: In all the MMX instructions, the source operand is found either in an MMX register
or in memory, and the destination operand resides in MMX register.
4. For the MMX instructions, the prefix, P, is used to represent the mode of
b) virtual mode
c) packed mode
d) programmable mode
Answer: c
Explanation: In the MMX instructions, if the operands are in the packed mode, the prefix, P, is
used to indicate packed data.
a) status
b) saturation
c) signed saturation
d) unsigned saturation
Answer: c
Explanation: For the MMX instructions, the suffix “S” indicates signed saturation, and “US”
indicates unsigned saturation, while executing arithmetic computation in saturation mode.
a) PADD
b) PCMPEQ
c) PAND
Answer: d
Explanation: The instructions, PADD, PCMPEQ and PAND are used for packed byte, word and
double word.
a) packed word
b) packed byte
d) unpacked word
Answer: b
Explanation: The instruction, PSUBB, performs subtraction in a packed byte.
8. The instruction, PCMPGT, is used to compare two data types and check
a) equal to condition
b) less than condition
Answer: c
Explanation: The instruction, PCMPGT, compares to check the greater than condition in packed
bytes, packed words and packed double words.
a) MOV
b) PSLL
c) PSRA
Answer: c
Explanation: The instruction, PSRA, performs arithmetic shift, right in a single cycle. It supports
only the shifting of packed word and double word data types.
10. When the instruction, PMULLW, is performed, then the lower order 16-bits of the 32 bit
products are stored in
a) source operand
b) destination operand
Answer: b
Explanation: In the instruction, PMULLW, four 16 X 16 multiplications are performed, and the
lower order 16 bits of the 32-bit products are stored in destination.
11. When the instruction, PMULHW, is performed, then the higher order 16-bits of the 32 bit
products are stored in
a) source operand
b) destination operand
Answer: b
Explanation: In the instruction, PMULHW, four 16 X 16 multiplications are performed, and the
higher order 16 bits of the 32-bit products are stored in destination.
12. The instruction in which both multiplication and addition are performed is
a) PAND
b) PMULHW
c) PADD
d) PMADDWD
Answer: d
Explanation: PMADDWD is an important multimedia instruction, which multiplies the four signed
words of the destination operand, with four signed words of source operand. This results in
32-bit double words which are added, and the result is stored in the higher double word of the
destination operand.
13. If the result of PCMPEQ, which is a comparison of two packed data types, is a success, then
the mask generated is
a) mask 0s
b) mask 1s
c) mask 2s
d) mask 3s
Answer: b
Explanation: If the result of PCMPEQ, which is a comparison of two packed data types is a
success, then the mask 1s is generated, otherwise a mask of 0s is generated, in the destination
operand.
To practice all areas of Microprocessors, here is complete set of 1000+ Multiple Choice
Questions and Answers .
MCQs
a) sequential instruction
Answer: c
Explanation: The linear instruction sequencing is the one in which the instructions that pass
through the fetch, decode and execution stages sequentially.
a) control unit
c) execution unit
d) cpu
Answer: b
Explanation: During the execution of instructions, only after the bus interface unit of CPU reads
the data from the main memory and returns it to the register, the next instruction execution will
commence.
3. Because of Pentium’s superscalar architecture, the number of instructions that are executed
per clock cycle is
a) 1
b) 2
c) 3
d) 4
Answer: b
Explanation: Pentium’s superscalar architecture employs five stage pipeline with U and V pipes.
Thus it can execute two instructions per clock.
4. The type of execution which means that the CPU should speculate which of the next
instructions can be executed earlier is
a) speculative execution
Answer: a
Explanation: The speculative execution is an execution which means that the CPU should
speculate which of the next instructions can be executed earlier.
5. The execution in which the consecutive instruction execution in a sequential flow is hampered
is
a) speculative execution
Answer: b
Explanation: In the out of turn execution, the consecutive instruction execution in a sequential
flow is hampered and the CPU should be able to execute out of turn instructions.
c) High throughput
Answer: d
Explanation: A dual independent bus architecture is incorporated by Pentium-Pro to get an
enhanced system bandwidth and it also yields high throughput. It has the CPU which can
access both main memory and the cache simultaneously.
7. The unit that is used to implement the multiple branch prediction in Pentium-Pro is
a) control unit
b) bus interface unit
Answer: c
Explanation: The processor uses an associative memory called branch target buffer for
implementing the algorithm, multiple branch prediction.
a) fetch-decode unit
b) dispatch-execute unit
c) control-execute unit
d) retire unit
Answer: c
Explanation: Pentium-Pro incorporates three independent engines, 1. Fetch-decode unit 2.
Dispatch-execute unit 3. Retire unit.
9. The unit that accepts the sequence of instructions from the instruction cache as input is
a) fetch-decode unit
b) dispatch-execute unit
c) retire unit
d) none
Answer: a
Explanation: The fetch-decode unit accepts the sequence of instructions from the instruction
cache as input and then decodes them.
10. In fetch-decode unit, the number of parallel decoders that accept the stream of fetched
instructions and decode them is
a) 1
b) 2
c) 3
d) 4
Answer: c
Explanation: A set of three parallel decoders accepts the stream of fetched instructions and
decode them.
To practice all areas of Microprocessors, here is complete set of 1000+ Multiple Choice
Questions and Answers .
This set of Microprocessors Question Bank focuses on “Pro and Pentium-II -2”.
a) executable statements
c) MMX instructions
d) micro operations
Answer: d
Explanation: The decoder unit converts the fetched instructions into micro operations.
a) 2,2
b) 1,3
c) 3,1
d) 3,2
Answer: c
Explanation: Each microoperation contains two logical sources and one logical destination.
a) decoder register
b) dispatch-execute unit
c) retire unit
Answer: d
Explanation: The microoperations are sent to the register alias table
RAT
. The RAT translates the logical register references to the physical register set actually available
in the CPU.
4. The pool of instructions that are fetched is stored in an addressable memory called
a) tristate buffer
c) reorder buffer
d) order buffer
Answer: c
Explanation: The pool of instructions that are fetched is stored in an array of content
addressable memory called reorder buffer.
5. The unit that performs scheduling of instructions by determining the data dependencies is
a) fetch-decode unit
b) dispatch-execute unit
c) retire unit
d) none
Answer: b
Explanation: The dispatch-execute unit performs scheduling of instructions by determining the
data dependencies after which the microoperations of the scheduled instructions are executed
in the execution unit.
6. The unit that reads the instruction pool and removes the microoperations which have been
executed instruction pool is
a) fetch-decode unit
b) dispatch-execute unit
c) retire unit
d) decoding unit
Answer: c
Explanation: The retire unit reads the instruction pool containing the instructions and removes
the microoperations which have been executed instruction pool.
a) equal
b) twice
c) thrice
d) two-third
Answer: b
Explanation: The features incorporated in Pentium-Pro enhances the speed of Pentium-Pro and
is twice as that of Pentium.
c) speculative execution
d) none
Answer: b
Explanation: The Pentium-Pro does not support the MMX instruction set.
a) high cache
Answer: d
Explanation: The Pentium II has a higher cache and it can operate at 2.8 volts, thereby reducing
power consumption. The most important change of Pentium II is that it can support Intel’s MMX
instructions.
10. The results of speculative instruction execution is stored in
b) permanent memory
c) temporary memory
d) none
Answer: c
Explanation: The results of speculative instruction execution should not be stored in CPU
registers and are temporarily stored, since they may have to be discarded, in case if there is a
branch instruction before these speculative instruction executions.
To practice Microprocessors Question Bank, here is complete set of 1000+ Multiple Choice
Questions and Answers .
MCQs
Answer: d
Explanation: Pentium 4 is based on NetBurst microarchitecture. Clock speed varies from
1.4GHz to 1.7GHz. It has hyper-pipelined technology.
b) execution module
c) control module
d) none
Answer: c
Explanation: Pentium 4 architecture may be viewed having four basic modules.
1. Front end module
2. Out of order execution engine
3. Execution module
4. Memory subsystem module.
a) trace cache
b) microcode ROM
Answer: d
Explanation: The front module of Pentium 4 contains
1. IA 32 Instruction decoder
2. Trace cache
3. Microcode ROM
4. Front end branch predictor.
4. The unit that decodes the instructions concurrently and translate them into micro-operations
is
a) trace cache
b) instruction decoder
c) execution module
Answer: b
Explanation: The role of instruction decoder is to decode the instructions concurrently and
translate them into micro-operations known as micro-ops.
5. In complex instructions, when the instruction needs to be translated into more than 4
micro-operations, then the decoder transfers the task to
a) trace cache
c) microcode ROM
d) none
Answer: c
Explanation: In case of complex instructions, when the instruction needs to be translated into
more than 4 micro-operations, then the decoder transfers the task to microcode ROM.
6. The unit that does not store the instructions, but the decoded stream of instructions is
a) trace cache
c) microcode ROM
d) none
Answer: a
Explanation: The trace cache is a special instruction cache because it does not store the
instructions, but the decoded stream of instructions.
a) 6 K decoded micro-ops
b) 8 K decoded micro-ops
c) 10 K decoded micro-ops
d) 12 K decoded micro-ops
Answer: d
Explanation: Trace cache can store upto 12K micro-ops. The cache assembles the decoded
micro-ops into ordered sequence of micro-ops called traces.
8. The unit that predicts the locations from where the next instruction bytes are fetched is
a) trace cache
c) execution module
d) instruction decoder
Answer: b
Explanation: The front end branch predictor predicts the locations from where the next
instruction bytes are fetched.
9. If complex instructions like interrupt handling, string manipulation appear, then the control
from trace cache transfers to
a) microcode ROM
c) execution module
d) instruction decoder
Answer: a
Explanation: When some complex instructions like interrupt handling, string manipulation
appear, then the control from trace cache transfers to microcode ROM.
10. After the micro-ops are issued by the microcode ROM, the control goes to
a) trace cache
c) execution module
d) instruction decoder
Answer: a
Explanation: After the micro-ops are issued by the microcode ROM, the control goes to Trace
cache once again. The micro-ops delivered by the trace cache and the microcode ROM are
buffered in a queue in an orderly fashion.
To practice all areas of Microprocessors, here is complete set of 1000+ Multiple Choice
Questions and Answers .
This set of Microprocessors Questions and Answers for Entrance exams focuses on “Netburst
Microarchitecture For Pentium4 -2, Instruction Translation Lookaside Buffer
ITLB
1. If the logical processors want to execute complex IA-32 instructions simultaneously then the
number of microcode instruction pointers required is
a) 1
b) 2
c) 3
d) 4
Answer: b
Explanation: If both the logical processors want to execute complex IA-32 instructions
simultaneously then two microcode instruction pointers are required, which will access the
microcode ROM.
a) static prediction
b) dynamic prediction
d) none
Answer: c
Explanation: There are two types of branch prediction namely static prediction and dynamic
prediction.
3. The prediction that is based on a statistical assumption that the majority of backward
branches occur in repetitive loops is
a) static prediction
b) dynamic prediction
c) branch prediction
d) none
Answer: a
Explanation: The static prediction is based on a statistical assumption that the majority of
backward branches occur in the context of repetitive loops.
Answer: d
Explanation: The static prediction is simple and fast. It does not require table lookups or
calculations. In case if a program contains a number of loops, static prediction performs without
much degradation.
BHT
BTB
d) None
Answer: c
Explanation: The dynamic branch prediction algorithms use two types of tables, namely Branch
History Table
BHT
and Branch Target Buffer
BTB
.
BTB
BHT
c) Static prediction
d) Dynamic prediction
Answer: b
Explanation: The Branch History Table
BHT
preserves the history of each conditional branch that the speculative branch prediction unit
encounters during the last several cycles.
7. The BHT keeps a record that indicates the likelihood of the branches grouped as
a) strongly taken
b) taken
c) not taken
Answer: d
Explanation: The BHT keeps a record that indicates the likelihood that the branch will be taken
based on its past history. The branches may be grouped as ‘strongly taken’, ‘taken’, ‘not taken’
and ‘strongly not taken’.
Answer: c
Explanation: Each logic processor has its own set of two 64-byte streaming buffers, which store
the instruction bytes and subsequently they are dispatched to the instruction decode stage.
9. If there is a trace cache miss, then the instruction bytes are required to be fetched from the
a) instruction decoder
b) Level2 cache
c) execution module
Answer: b
Explanation: If there is a trace cache miss, then the instruction bytes are required to be fetched
from the Level2 cache.
ITLB
is present in
a) trace cache
b) instruction decoder
c) logical processors
Answer: c
Explanation: Since there are two logical processors, there are two ITLBs. Thus each logical
processor has its own ITLB and its own instruction pointer to track the progress of instruction
fetch for each of them.
To practice all areas of Microprocessors for Entrance exams, here is complete set of 1000+
Multiple Choice Questions and Answers .
This set of Tough Microprocessors Questions and Answers focuses on “Rapid Execution
Module, Memory Subsystem, Hyperthreading Technology”.
1. The units that are primarily used to resolve indirect mode of memory addressing is called
a) ALU
b) AGU
d) NONE
Answer: b
Explanation: The AGUs
AddressGenerationUnits
are primarily used to resolve indirect mode of memory addressing.
d) none
Answer: b
Explanation: The AGUs run at twice the processor speed.
3. Pentium 4 consists of
a) 4 ALUs
b) 4 AGUs
Answer: c
Explanation: Pentium 4 consists of 2 ALUs and 2 AGUs.
4. The number of instructions that can be executed per clock cycle by the ALU or AGU is
a) 1
b) 2
c) 3
d) 4
Answer: b
Explanation: As the speed of the units, ALU and AGU are doubled, which means that twice the
number of instructions being executed per clock cycle.
Answer: c
Explanation: IA-32 architecture’s paging mechanism includes an extension that support
1. Page address extension to address space greater than 4GB.
2. Page size extension to map linear address to physical address in 4MB.
6. The linear address space is mapped into the processors physical address space either
directly or through paging by
d) none
Answer: c
Explanation: With the flat or segmented memory model, linear address space is mapped into
the processors physical address space either directly or through paging.
Answer: d
Explanation: Threads may be bunched together in a process. Threads are independent, simple
in structure and are lightweight in the sense that they may enhance the speed of operation of an
overall process.
8. The process in which multiple threads correspond to the tracking of each individual object is
known as
Answer: c
Explanation: The mutiple threads correspond to the tracking of each individual object. This kind
of parallelism is known as thread level parallelism
TLP
.
9. Which of the following is not a type of context switching?
a) time-slice multithreading
b) on chip multiprocessing
c) hyperthreading
d) none
Answer: d
Explanation: A single processor can execute multiple threads by switching between them. The
scheme of context switching may be several types. They are
1. Time-slice multithreading
2. On chip multiprocessing
3. Hyperthreading.
Answer: d
Explanation: The thread level parallelism is a process of
1. Saving the context of currently executing process.
2. Flushing the CPU of the same process.
3. Loading the context of new next process is called a context switch.
To practice tough questions and answers on all areas of Microprocessors, here is complete set
of 1000+ Multiple Choice Questions and Answers .
MCQs
1. Which of the following is a resource sharing strategy that had been investigated by the
developers?
a) partitioned resources
b) threshold sharing
c) full sharing
Answer: d
Explanation: Several resource sharing strategies have been investigated by the developers.
Some of these are
1. Partitioned resources
2. Threshold sharing
3. Full sharing.
a) simultaneous multithreading
Answer: d
Explanation: Hyperthreading used the concept of simultaneous multithreading, where multiple
threads can be executed on a single processor without switching.
Answer: d
Explanation: Each logical processor maintains a set of architecture state which consists of
1. Registers including the general purpose registers
2. The control register
3. Advanced programmed interrupt controller
4. Machine state register.
Answer: d
Explanation: A logical processor may be temporarily stalled for a variety of reasons like
including servicing cache misses, handling branch mispredictions and waiting for results of
previous instructions.
d) none
Answer: b
Explanation: The hyperthreading technology automatically involves the increase of die area.
6. The instruction that is used when either of the logical processors is idle is
a) HOLD
b) HLDA
c) HALT
d) NONE
Answer: c
Explanation: An optimization may require the use of HALT instruction, when either of the two
logical processors is idle.
7. The mode that is available when there is only one software thread to execute is
Answer: c
Explanation: When there is only one software thread to execute, there are two modes namely
single task mode and multi task mode.
a) execution unit
b) operating system
c) control unit
d) memory unit
Answer: b
Explanation: The HALT instruction is a privileged instruction that can be only used by operating
system.
9. When the operating system uses HALT instruction on a processor which supports
multithreading, the operation moves from
b) ST1 to ST0
d) None
Answer: c
Explanation: When the operating system uses HALT instruction on a processor which supports
multithreading, the operation moves from multi tasking mode to single tasking mode.
10. The Xeon TM processor on which hyperthreading technology was first implemented consists
of
Answer: b
Explanation: The Xeon TM processor on which hyperthreading technology was first
implemented consists of two logical processor per physical processor.
To practice all areas of Microprocessors, here is complete set of 1000+ Multiple Choice
Questions and Answers .
This set of Basic Microprocessors Questions and Answers focuses on “Extended Instruction Set
In Advanced Pentium Processors, Formal Verification”.
Answer: c
Explanation: The MMX instructions support only integer data type.
2. For single precision floating point numbers, the SSE instructions are
a) MMX instructions
b) SIMD instructions
d) None
Answer: b
Explanation: The SSE instructions are SIMD
SingleInstructionMultipleDataStream
instructions for single precision floating point numbers.
Answer: d
Explanation: The features of SSE
StreamingSIMDextensions
are
1. SSE instructions are SIMD instructions for single precision floating point numbers.
2. They operate on four 32-bit floating points.
3. The register size is of 128 bits
4. No necessity to switch from one mode to other.
4. The new instructions that are added in SSE for floating point operations are of
a) 72
b) 50
c) 25
d) 8
Answer: b
Explanation: The new instructions that are added in SSE for floating point operations are 50.
a) packed data
b) unpacked data
c) dynamic data
Answer: a
Explanation: The SSE instructions can operate on packed data or scalar data.
c) shuffle instructions
Answer: d
Explanation: The SSE instructions can be grouped to many types. Some of them are
1. Data transfer instructions
2. Arithmetic, logic and comparison group of instruction
3. shuffle instructions
4. Cacheability instructions.
7. Which of the following is true about SSE2 instructions in Pentium III and Pentium 4?
Answer: d
Explanation: The SSE new instruction set increases the accuracy of double precision floating
point operations, supports new formats of packed data.
Answer: d
Explanation: The SSE2 instructions support new data types such as double precision floating
points along with single precision floating points.
a) video encoding
c) thread synchronization
Answer: d
Explanation: The SSE3 contains 13 additional SIMD instructions over SSE2. These instructions
comprise five types.
i. floating point to integer conversion
ii. complex arithmetic operation
iii. video encoding
iv. SIMD floating point operations using array of structures format
v. thread synchronization.
10. The unit that may acts as an interface between the Front end and the Out of order execution
engine in the pipeline flow is
a) micro-op queue
b) micro-op stack
c) micro-ops
d) none
Answer: a
Explanation: The micro-op queue acts as an interface between the Front end and the Out of
order execution engine in the pipeline flow.
11. The verification of the logic using formal mathematical tools is called
a) arithmetic verification
b) formal verification
c) mathematical verification
d) logical verification
Answer: b
Explanation: The verification of the logic using formal mathematical tools is called formal
verification.
Answer: d
Explanation: The formal verification is important to develop the tools and methodologies to
handle a large number of proofs using which it will be possible to detect the bugs in the design.
13. By using the techniques of formal verification, one can detect the logical bugs of
a) more than 50
b) less than 50
Answer: c
Explanation: By using the techniques of formal verification, one can detect more than 100
logical bugs.
a) high speed
Answer: d
Explanation: The modern processors are designed to operate at a very high speed and even
with the lower operating voltages, the power consumption is high enough to require expensive
cooling technology.
To practice basic questions and answers on all areas of Microprocessors, here is complete set
of 1000+ Multiple Choice Questions and Answers .
MCQs
focuses on “Hybrid Architecture -RISC and CISC Convergence, Advantages of RISC, Design
Issues of RISC Processors -1”.
c) complex in nature
d) none
Answer: c
Explanation: Some computers are used in preference to CISC design due to its low burden on
compiler developers and wide availability of existing software. But they are complex in nature.
2. The RISC architecture is preferred to CISC because RISC architecture has
a) simplicity
b) efficiency
c) high speed
Answer: d
Explanation: The RISC architecture is preferred to CISC because RISC architecture is simple,
highly efficient and the processors using RISC architecture have high speed.
a) branch prediction
b) pipelining
d) none
Answer: c
Explanation: A RISC core allows performance enhancing features, such as branch prediction
and pipelining. Traditionally, these have only been possible in RISC designs.
Answer: d
Explanation: The CISC-RISC hybrids continue to consume a lot of power and are not best
candidates for mobile and embedded applications.
a) multimedia applications
b) telecommunication encoding
c) image conversion
Answer: d
Explanation: By adding more instructions to the RISC architecture, some applications can be
run much faster like multimedia applications, telecommunication encoding/decoding, image
conversion and video processing.
b) Intel Itanium 64
c) AMD’s X86-64
Answer: d
Explanation: The processors, Intel Pentium III, Intel Itanium 64 and AMD’s X86-64 consists of
hybrid RISC-CISC architecture.
a) macroprogramming
b) hardwire
c) microprogramming
d) none
Answer: c
Explanation: In order to implement complex instructions, CISC architectures use
microprogramming.
Answer: d
Explanation: The advantages of RISC processors are that they can work at high clock
frequency, can be designed, developed and tested more quickly with a high speed.
9. The additional functionality that can be placed on the same chip of RISC is
d) RAM, ROM
Answer: c
Explanation: Several extra functionalities, such as memory management units or floating point
arithmetic units, can also be placed on the same chip of RISC.
10. The number of clockcycles that take to wait until the length of the instruction is known in
order to start decoding is
a) 0
b) 1
c) 2
d) 3
Answer: a
Explanation: The loading and decoding the instructions in a RISC processor is simple and fast.
It is not needed to wait until the length of the instruction is known in order to start the decoding.
To practice all areas of Microprocessors, here is complete set of 1000+ Multiple Choice
Questions and Answers .
This set of Microprocessors Problems focuses on “Hybrid Architecture -RISC and CISC
Convergence, Advantages of RISC, Design Issues of RISC Processors -2”.
ClockPerInstruction
a) 0
b) 1
c) 2
d) 3
Answer: b
Explanation: RISC processors have unity CPI
ClockPerInstruction
, which is due to the optimization of each instruction on the CPU and massive pipelining
embedded in a RISC processor.
c) microcoding is required
Answer: c
Explanation: Unlike the CISC, in RISC architecture, instruction microcoding is not required.
3. The RISC processors that support variable length instructions are from
a) Intel
b) Motorola
c) AMD
Answer: d
Explanation: In RISC, each instruction is of the same length, so that it may be fetched in a
single operation. The traditional microprocessors from Intel or Motorola support variable length
instructions.
a) high speed
Answer: d
Explanation: It is impossible to predict when the register file will overflow or underflow, so
performance is unpredictable. It generates a software fault, which the operating system has to
handle, consuming more cycles.
a) infinite
c) finite
Answer: c
Explanation: The register window only helps us to point the number of physical registers is finite.
Answer: b
Explanation: There are 5 stages in pipelining. They are
1. Fetch instructions from memory
2. Read registers and decode the instructions
3. Execute the instructions or calculate an address
4. Access an operand in data memory
5. Write result into a register.
a) error occurs
Answer: c
Explanation: A data dependency occurs when an instruction depends on the results of the
previous instructions.
9. The instructions that instruct the processor to make a decision about the next instruction to be
executed are
b) branch instructions
d) none
Answer: b
Explanation: The branch instructions are those which instruct the processor to make a decision
about the next instruction to be executed, depending upon whether the condition is satisfied or
not.
10. The reason for which the RISC processor goes to idle state
orstall
is
MCQs
a) Accumulator
b) B register
c) Data register
Answer: d
Explanation: In some instructions, the Accumulator and B register are used to store the
operands.
a) Accumulator
b) B register
c) Data register
Answer: b
Explanation: B register is used to store one of the operands for multiply and divide instructions.
In other instructions, it may just be used as a scratch pad.
a) control registers
b) instruction registers
c) program status word
Answer: c
Explanation: The set of flags of program status word contains the status information and is
considered as one of the special function registers.
4. Which of the processor’s stack does not contain the top-down data structure?
a) 8086
b) 80286
c) 8051
d) 80386
Answer: c
Explanation: The 8051 stack is not a top-down data structure, like other Intel processors.
a) 4 latches
b) 2 timer registers
Answer: d
Explanation: The architecture of 8051 consists of 4 latches and driver pairs are allotted to each
of the four on-chip I/O ports. It contains two 16-bit timer registers.
Answer: b
Explanation: The transmit buffer of serial data buffer is a parallel-in serial-out register.
7. The receive buffer of serial data buffer is a
Answer: a
Explanation: The serial data register has two buffers. The transmit buffer is a parallel-in
serial-out register and receive buffer is a parallel-in serial-out register.
8. The register that provides control and status information about counters is
a) IP
b) TMOD
c) TSCON
d) PCON
Answer: b
Explanation: The registers, TMOD and TCON contain control and status information about
timers/counters.
9. The register that provides control and status information about serial port is
a) IP
b) IE
c) TSCON
Answer: d
Explanation: The registers, PCON and SCON contain control and status information about serial
port.
10. The device that generates the basic timing clock signal for the operation of the circuit using
crystal oscillator is
a) timing unit
d) clock generator
Answer: c
Explanation: The oscillator circuit generates the basic timing clock signal for the operation of the
circuit using crystal oscillator.
11. The registers that are not accessible by the user are
b) IP and IE
c) Instruction registers
Answer: d
Explanation: The arithmetic operations are performed over the operands held by the temporary
registers, TMP1 and TMP2. Users cannot access these temporary registers.
To practice all areas of Microprocessors, here is complete set of 1000+ Multiple Choice
Questions and Answers .
MCQs
a) PSW
ProgramStatusWord
b) TCON
TimerControlRegister
c) Accumulator
a) P1
b) SCON
c) TMOD
d) TCON
Answer: c
Explanation: The registers, TMOD, SP, TH0, TH1, TL0, TL1 are to be addressed as bytes.
a) SBUF
b) PCON
c) TMOD
d) SCON
Answer: d
Explanation: The registers, accumulator, PSW, B, P0, P1, P2, P3, IP, IE, TCON and SCON are
all bit-addressable registers.
4. The higher and lower bytes of a 16-bit register DPTR are represented respectively as
Answer: c
Explanation: The registers, DPH and DPL are the higher and lower bytes of a 16-bit register
DPTR.
a) DPH
b) DPL
c) DPTR
d) NONE
Answer: c
Explanation: The Data Pointer
DPTR
is used for accessing external data memory which means that it includes both DPH and DPL.
6. Among the four groups of register banks, the number of groups that can be accessed at a
time is
a) 1
b) 2
c) 3
Answer: a
Explanation: At a time, only one of the four register banks can be accessed.
a) 2
b) 4
c) 6
d) 8
Answer: d
Explanation: The 32, 8-bit registers are divided into four groups of 8 registers each, called
register banks.
a) register bank 0
b) register bank 1
c) register bank 2
d) register bank 3
Answer: c
Explanation: If RS1=1, RS0=0, then the register bank selected is register bank 2.
a) register bank 0
b) register bank 1
c) register bank 2
d) register bank 3
Answer: d
Explanation: If RS1=1, RS0=1, then the register bank selected is register bank 3. If RS1=0,
RS0=0, then selected bank is register bank 0.
Answer: d
Explanation: The power control register, PCON consists of power down bit and idle bit which
activate the power down mode and idle mode in 80C51BH.
a) power mode
c) idle mode
d) ideal mode
Answer: b
Explanation: In power down mode, the on-chip oscillator is stopped.
a) serial port
b) timer block
c) clock to CPU
Answer: c
Explanation: In idle mode, the oscillator continues to run and the interrupt, serial port and timer
blocks are active but the clock to the CPU is disabled.
a) CLEAR
b) RESET
c) HOLD
d) HLT
Answer: b
Explanation: The only way to terminate the power down mode is hardware reset. The reset
redefines all the SFRs but the RAM contents are left unchanged.
a) PRESET
b) CLEAR
c) Interrupt
d) Interrupt or reset
Answer: d
Explanation: The idle mode can be terminated with a hardware interrupt or hardware reset
signal.
To practice all areas of Microprocessors, here is complete set of 1000+ Multiple Choice
Questions and Answers .
MCQs
activelow
b) INT2
activelow
c) Timer0 interrupt
d) Timer1 interrupt
Answer: a
Explanation: INT0
activelow
and INT1
activelow
are two external interrupt inputs provided by 8051.
activelow
and INT1
activelow
Answer: a
Explanation: The interrupts, INT0
activelow
and INT1
activelow
are processed internally by the flags IE0 and IE1.
3. The flags IE0 and IE1, are automatically cleared after the control is transferred to respective
vector if the interrupt is
a) level-sensitive
b) edge-sensitive
c) in serial port
d) in parallel port
Answer: b
Explanation: If the interrupts are programmed as edge sensitive, the flags IE0 and IE1 are
automatically cleared after the control is transferred to respective vector.
4. If the external interrupt sources control the flags IE0 and IE1, then the interrupt programmed
is
a) level-sensitive
b) edge-sensitive
c) in serial port
d) in parallel port
Answer: a
Explanation: If the interrupts are programmed as level sensitive, then the flags IE0 and IE1 are
controlled by external interrupt sources themselves.
a) timer mode
b) counter mode
c) idle mode
Answer: b
Explanation: In counter mode, the pulses are counted at T0 or T1 pin.
a)
1/8
b)
1/4
c)
1/16
d)
1/32
Answer: d
Explanation: In timer mode, the oscillator clock is divided by a prescalar
1/32
and then given to the timer.
a) RI is set
c) Either RI or TI is set
Answer: c
Explanation: The serial port interrupt is generated if atleast one of the two bits, RI and TI is set.
8. In serial port interrupt, after the control is transferred to the interrupt service routine, the flag
that is cleared is
a) RI
b) TI
c) RI and TI
d) None
Answer: d
Explanation: In serial port interrupt, after the control is transferred to the interrupt service
routine, neither of the flags are cleared.
9. The atleast number of machine cycles for which the external interrupts that are programmed
level-sensitive should remain high is
a) 1
b) 2
c) 3
d) 0
Answer: b
Explanation: The external interrupts, programmed level-sensitive should remain high for atleast
2 machine cycles.
10. If the external interrupts are programmed edge sensitive, then they should remain high for
atleast
a) 0 machine cycle
b) 2 machine cycles
c) 1 machine cycle
d) 3 machine cycles
Answer: c
Explanation: If the external interrupts are programmed edge sensitive, then they should remain
high for atleast one machine cycle and low for atleast one machine cycle, for being sensed.
To practice all areas of Microprocessors, here is complete set of 1000+ Multiple Choice
Questions and Answers .
This set of Microprocessors Assessment Questions and Answers focuses on “Interrupt and
Stack of 8051 – 2”.
a) 00FFH
b) FF00H
c) 0FFFH
d) FFFFH
Answer: d
Explanation: The timer is an up-counter and generates an interrupt when the count has reached
FFFFH.
2. The external interrupt that has the lowest priority among the following is
a) TF0
b) TF1
c) IE1
d) NONE
Answer: c
Explanation: The order of given interrupts from high to low priority is TF0, IE1 and TF1.
3. Among the five interrupts generated by 8051, the lowest priority is given to the interrupt
a) IE0
b) TF1
c) TF0
d) RI
Answer: d
Explanation: The interrupt, RI=TI
serialport
is given the lowest priority among all the interrupts.
4. Among the five interrupts generated by 8051, the highest priority is given to the interrupt
a) IE0
b) TF1
c) TF0
d) IE1
Answer: a
Explanation: The interrupt, IE0
ExternalINT0
is given the highest priority among all the interrupts.
5. All the interrupts are enabled using a special function register called
b) interrupt register
Answer: d
Explanation: All the interrupts are enabled using a special function register called interrupt
enable register
IE
and their priorities are programmed using another special function register called interrupt
priority register
IP
.
6. The number of bytes stored on the stack during one operation of PUSH or POP is
a) 1
b) 2
c) 3
d) 4
Answer: a
Explanation: As 8051 stack operations are 8-bit wide i.e. in an operation using PUSH or POP
instruction, one byte of data is stored on a stack or retrieved from the stack. For implementing
16-bit operations, two 8-bit operations are cascaded.
Answer: c
Explanation: The PUSH instruction follows two steps.
1. Increment stack by 1
2. Store 8-bit content of the 8-bit address specified in the instruction to the address pointed to by
SP.
d) store content of top of stack to address pointed to by SP and then decrement stack by 1
Answer: d
Explanation: The POP instruction follows two steps.
1. Store the contents of top of stack pointed to by SP register to the 8-bit memory specified in
the instruction.
2. Decrement stack by 1.
Answer: d
Explanation: The 8051 stack is opposite to that in 8085 or 8086 i.e. in 8085 it is auto-decrement
while in 8051 it is auto-increment during PUSH operations.
SP
a) internal ROM
b) internal RAM
c) external ROM
d) external RAM
Answer: b
Explanation: The stack pointer
SP
is an 8-bit register and is initialized to internal RAM address 07H after reset.
To practice all areas of Microprocessors Assessment Questions, here is complete set of 1000+
Multiple Choice Questions and Answers .
MCQs
a) register instructions
c) indexed addressing
d) none
Answer: d
Explanation: The six addressing modes of 8051 are
1. Direct addressing
2. Indirect addressing
3. Register instructions
4. Register specific
RegisterImplicit
instructions
5. Immediate mode
6. Indexed addressing.
2. The symbol, ‘addr 16’ represents the 16-bit address which is used by the instructions to
specify the
Answer: c
Explanation: The symbol, ‘addr 16’ represents the 16-bit destination address which is used by
the LCALL or LJMP instruction to specify the call or jump destination address, within 64 Kbytes
program memory.
Answer: c
Explanation: Only internal data RAM and SFRS can be directly addressed in direct addressing
mode.
4. The address register for storing the 16-bit addresses can only be
a) stack pointer
b) data pointer
c) instruction register
d) accumulator
Answer: b
Explanation: The address register for storing the 16-bit addresses can only be data pointer.
c) Stack pointer
Answer: d
Explanation: The registers R0 and R1 of the selected bank of registers or stack pointer can be
used as address registers for storing the 8-bit addresses.
6. The instruction, ADD A, R7 is an example of
a) register instructions
c) indexed addressing
d) none
Answer: a
Explanation: In register instructions addressing mode, operands are stored in the registers
R0-R7 of the selected register bank. One of these registers is specified in the instruction.
7. The addressing mode, in which the instructions has no source and destination operands is
a) register instructions
c) direct addressing
d) indirect addressing
Answer: b
Explanation: In register specific instructions addressing mode, the instructions don’t have
source and destination operands. Some of the instructions always operate only on a specific
register.
Answer: b
Explanation: The instruction, RLA rotates accumulator left.
a) 100
decimal
is added to contents of address register
b) 100
decimal
c) 100
decimal
d) none
Answer: c
Explanation: Immediate data 100
decimal
is added to the contents of the accumulator.
10. In which of these addressing modes, a constant is specified in the instruction, after the
opcode byte?
a) register instructions
c) direct addressing
d) immediate mode
Answer: d
Explanation: In immediate mode, an immediate data, i.e. a constant is specified in the
instruction, after the opcode byte.
11. The only memory which can be accessed using indexed addressing mode is
a) RAM
b) ROM
c) Main memory
d) Program memory
Answer: d
Explanation: Only program memory can be accessed using the indexed addressing mode.
12. The data address of look-up table is found by adding the contents of
Answer: b
Explanation: The look-up table data address is found out by adding the contents of register
accumulator with that of the program counter or data pointer.
To practice all areas of Microprocessors, here is complete set of 1000+ Multiple Choice
Questions and Answers .
MCQs
a) arithmetic instructions
b) boolean instructions
c) logical instructions
d) none
Answer: d
Explanation: The 8051 instructions are categorized as
1. Data transfer instructions
2. Arithmetic instructions
3. Logical instructions
4. Boolean instructions
5. Control transfer instructions.
a) bit data
b) byte data
c) 16-bit data
Answer: d
Explanation: The data transfer instructions implement a bit, byte, 16-bit data transfer operations
between the SRC
source
and DST
destination
operands.
Answer: c
Explanation: In data transfer instructions,
1. Program counter is not accessible.
2. Restricted bit-transfer operations are allowed.
3. Both operands can be direct/indirect register operands.
4. BOth operands can be internal direct data memory operands.
4. The logical instruction that affects the carry flag during its execution is
a) XRL A;
b) ANL A;
c) ORL A;
d) RLC A;
Answer: d
Explanation: The logical instructions that doesn’t affect the carry flag are, ANL, ORL and XRL.
The logical instructions that affect the carry flag during its execution are RL, RLC, RRC and RR.
5. The instruction that is used to complement or invert the bit of a bit addressable SFR is
a) CLR C
b) CPL C
c) CPL Bit
d) ANL Bit
Answer: c
Explanation: The instruction, CPL Bit is used to complement or invert the bit of a bit addressable
SFR or RAM.
a) conditional instructions
b) logical instructions
Answer: c
Explanation: The control transfer instructions transfer the control of execution or change the
sequence of execution conditionally or unconditionally.
Answer: b
Explanation: The control transfer instructions are divided into conditional and unconditional
control transfer instructions.
8. The conditional control transfer instructions check a bit condition which includes any bit of
c) content of accumulator
a) absolute jumps
b) long jumps
c) short jumps
d) none
Answer: c
Explanation: All conditional jumps are short jumps.
a) opcode byte
b) relative address
c) opcode field
d) none
Answer: a
Explanation: The short jump instruction has two byte instruction. The first byte represents
opcode byte and second byte represents an 8-bit relative address.
a) increment operation
b) decrement operation
d) none
Answer: d
Explanation: In logical instructions, the immediate data can’t be an operand for
increment/decrement or any other single operand instruction.
To practice all areas of Microprocessors, here is complete set of 1000+ Multiple Choice
Questions and Answers .
This set of Microprocessors Questions and Answers for Aptitude test focuses on “8051
Instruction Set -2”.
1. If the most significant bit of relative address byte is 1, then the short jump instruction is
a) forward jump
b) back jump
d) none
Answer: b
Explanation: If the most significant bit of relative address byte is 1, then the short jump
instruction is back jump, else it is considered as forward jump.
Answer: d
Explanation: The first byte of an absolute jump instruction consists of 5 LSBs of opcode and 3
MSBs of 11-bit address. The next byte carries the least significant 8 bits of the 11-bit address.
a) opcode
b) 5 LSBs of opcode
Answer: c
Explanation: The third byte of the long jump instruction is a higher byte of jump location or
subroutine.
4. The absolute jump instruction is intended mainly for a jump within a memory space of
a) 2 bytes
b) 2 Kbytes
c) 2 Mbytes
d) none
Answer: b
Explanation: The absolute jump instruction is intended mainly for a jump within a memory space
of 2 Kbytes.
5. The LJMP instruction is very useful in programming in the external code memory space of
a) 32 MB
b) 64 MB
c) 32 KB
d) 64 KB
Answer: d
Explanation: The LJMP instruction is very useful in programming in the external code memory
space of 64 KB.
a) JMP
b) RET
c) JNC
d) CALL
Answer: c
Explanation: The instructions, JMP, RET, RETI, CALL are the unconditional control transfer
instructions.
a) status flags
a) JC
b) JBC
c) JNC
d) NONE
Answer: d
Explanation: The instructions, JC, JBC, JNC, JB and JNB are the conditional control transfer
instructions.
9. The mnemonic used to perform a subtraction of source with an 8-bit data and jumps to
specified relative address if subtraction is non-zero is
a) DJNZ
b) CJNE
c) JZ
d) JNC
Answer: b
Explanation: The CJNE instruction perform a subtraction of source with an 8-bit data and jumps
to specified relative address only if the result of the subtraction is non-zero, else continues to
the next instruction.
10. The mnemonic, JNB is used to jump to the specified relative address only if
a) specified bit=1
b) specified bit=0
d) none
Answer: a
Explanation: The mnemonic, JNB is used to jump to the specified relative address only if
specified bit=1, else continues to the next instruction.
11. The type of operand that is not allowed to use in boolean instructions of 8051 is
c) immediate bit
d) none
Answer: c
Explanation: In boolean instructions, the immediate bit is not allowed as an operand.
12. In boolean instructions, the flag that is the only allowed destination operand for two operand
instructions is
a) overflow flag
b) underflow flag
c) auxiliary flag
d) carry flag
Answer: d
Explanation: Carry flag
C
is the only allowed destination operand for two operand instructions in boolean instructions.
To practice all areas of Microprocessors for Aptitude test, here is complete set of 1000+ Multiple
Choice Questions and Answers .
MCQs
1. Which of the following is not one of the SFR addresses of the ports of 8051?
a) 80H
b) 90H
c) A0H
d) NONE
Answer: d
Explanation: The SFR addresses of the ports P0, P1, P2 and P3 are 80H, 90H, A0H and B0H
respectively.
a) 0.2 mA
b) 0.25 mA
c) 0.5 mA
d) 0.75 mA
Answer: c
Explanation: Each port line of a port can individually source a current of upto 0.5 mA.
a) 2 mA
b) 8 mA
c) 5 mA
d) 1 mA
Answer: b
Explanation: Each port line of a port can individually sink a current of upto 8 mA.
4. The number of TTL inputs that can be sinked by the port 0 when a logic 0 is sent to a port line
as an output port is
a) 2
b) 4
c) 6
d) 8
Answer: d
Explanation: When a logic 0 is sent to a port line as an output port, it can sink 8 LS TTL inputs.
Port 0 is used as data bus during external interfacing whenever required.
inputoroutput
port with internal pullups is
a) Port 0
b) Port 1
c) Port 2
d) Port 3
Answer: a
Explanation: Port 0 is an open drain bidirectional
inputoroutput
port with internal pullups. Port 1, Port 2, Port 3 are 8-bit bidirectional ports.
6. The port that can source or sink 4 LS TTL inputs when being used as an output port on each
of its line is
a) Port 1
b) Port 2
c) Port 3
Answer: d
Explanation: The ports P1, P2 and P3 can source or sink 4 LS TTL inputs when being used as
an output port on each of its line.
7. The port that will source a current of 500 micro amperes when being used as input ports is
a) 0.5 mA
b) 0.25 mA
Answer: d
Explanation: Port 3 pins which are externally pulled low when being used as input pins will
source current of 500 micro amperes.
8. If the EA
activelow
signal is grounded then the execution
Answer: c
Explanation: For interfacing external program memory, EA
activelow
pin must be grounded. If the EA
activelow
signal is grounded then the execution will start directly from the 16-bit address 0000H in
external program memory.
9. When the port lines of a port are to be used as input lines then the value that must be written
to the port address is
a) F0H
b) 0FH
c) FFH
d) 00H
Answer: c
Explanation: When the port lines of a port are to be used as input lines then ‘FF’H must be
written to the port address.
Answer: d
Explanation: Port 1 lines are used as lower byte of 16-bit address bus during programming of
internal EPROM or EEPROM.
11. The configuration in which each LED receives operating current of 8 mA from power supply
while the port lines sink the current on each port line is
Answer: b
Explanation: The common anode configuration is preferred to that of other configurations as in
common anode configuration, each LED receives operating current of 8 mA from power supply
while the port lines sink the current on each port line.
To practice all areas of Microprocessors, here is complete set of 1000+ Multiple Choice
Questions and Answers .
This set of Microprocessors Questions and Answers for Campus interviews focuses on
“Interfacing With 8051 Ports -2”.
1. If EA
activelow
a) internal EPROM
b) flash RAM
d) none
Answer: c
Explanation: If EA
activelow
signal =1, then the execution starts from an internal EPROM or flash RAM address 000H, can
continue upto FFFH address and then for higher addresses it will go into external memory.
a) EA
activelow
b) PSEN
activelow
c) OE
activelow
Answer: a
Explanation: The EA
activelow
pin is grounded for interfacing external EPROM. The PSEN
activelow
is used for interfacing EPROM i.e. it acts as an OE
activelow
input to EPROM.
3. The step that is involved in the procedure of memory interfacing with 8051 is
b) PSEN
activelow
is connected to OE
activelow
of EPROM chips
Answer: d
Explanation: The procedure of memory interfacing with 8051 includes, data bus connection to
data lines of memory chips, PSEN
activelow
connected to OE
activelow
of EPROM chips and writing address map of memory chip in bit form.
a) Logic gates
b) Multiplexers
Answer: d
Explanation: The logic gates and multiplexers are most commonly used for deriving chip select
signals. The advanced circuits like PLAs and EPROMs are also used for deriving chip select
signals.
5. For deriving chip selects of isolated memory or IO devices, the gates that are traditionally
used are
Answer: b
Explanation: For deriving chip selects of isolated memory or IO devices, the NAND and NOT
gates are traditionally used.
a) 6-8 mA
b) 4-6 mA
c) 8-10 mA
d) 10-12 mA
Answer: c
Explanation: For appropriate glow, a LED typically requires 8-10 mA with around 1.6 Volts.
7. The maximum current that can be sinked totally by all the ports of 8051 is
a) 61 mA
b) 81 mA
c) 91 mA
d) 71 mA
Answer: d
Explanation: All the ports together
4ports
should not be made to sink more than 71 mA.
8. The number of LEDs that can be connected to a port of 8051, if all are expected to glow
simultaneously is
a) 6
b) 8
c) 10
d) 12
Answer: b
Explanation: If 8 LEDs are connected to a port of 8051, and if all are expected to glow
simultaneously, the total current sinked by the 8051 port will be 8×8=64 mA
sinceminvoltageforanLEDtoglow=8mA
which is less than the maximum 71 mA.
Answer: c
Explanation: The 7-segment code of a digit is transmitted by the first port and the display is
selected by second port. As soon as the display is selected by the second port, the digit starts
glowing on that display position.
10. After the display is selected by second port, then the digit
LED
a) 5 msec
b) 10 msec
c) 2 msec
d) 6 msec
Answer: a
Explanation: The unit
LED
glows for a duration of 5 msec.
11. The number of scans of the complete 8-digit display that can be carried out in one second is
a) 15
b) 25
c) 35
d) 55
Answer: b
Explanation: Starting from either right most or left most digit, every digit glows for 5 msec one by
one. Thus one scan of the 8 digit display requires 40 msec. Thus in one second, 25 scans of the
complete 8-digit display can be carried out.
12. To convert its current output into a voltage, the DAC 0808 is connected with
a) Transistor
BJT
externally
b) FET externally
c) OPAMP externally
d) OPAMP internally
Answer: c
Explanation: the DAC 0808 is connected with OPAMP externally, to convert its current output
into voltage.
To practice all areas of Microprocessors for Campus Interviews, here is complete set of 1000+
Multiple Choice Questions and Answers .
MCQs
b) Interrupt enable
c) priority register
Answer: d
Explanation: The external interrupts namely INT0
activelow
and INT1
activelow
can be enabled and programmed using the least significant four bits of TCON register and the
Interrupt enable and priority registers.
Answer: c
Explanation: The bits, EX0 and EX1 individually control the external interrupts, INT0
activelow
and INT1
activelow
. If INT0
activelow
and INT1
activelow
interrupts are to be enabled then the bits EX0 and EX1 must be set respectively.
3. EA bit is used to
Answer: c
Explanation: Using EA bit, all the interrupts can be enabled or disabled. Using the individual
respective bit, the respective interrupt can be enabled or disabled.
a) 1
b) 2
c) 3
d) 4
Answer: b
Explanation: Each interrupts level of 8051 can have two levels of priority namely level 0 and
level 1. Level 1 is considered as a higher priority level compared to level 0.
serialinterrupt
interrupt is programmed is
a) level 0
b) level 1
c) level 0 or level 1
d) none
Answer: b
Explanation: SI interrupt is programmed for level 1 priority.
6. The interrupt bit that when set works at level 1, and otherwise at level 0 is
a) PT1
b) PT0
c) PX1
Answer: d
Explanation: The bits, PT1, PT0, PX0 and PX1 when set, work at level 1, otherwise at level 0.
7. All the interrupts at level 1 are polled in the second clock cycle of the
a) forth T state
b) fifth T state
c) third T state
d) none
Answer: b
Explanation: All the interrupts at level 1 are polled or sensed in the second clock cycle of the
fifth T state or 9th clock cycle out of 12 clock cycles. Then all the interrupts at level 0 are also
polled in the same cycle.
8. The minimum duration of the active low interrupt pulse for being sensed without being lost
must be
Answer: b
Explanation: The minimum duration of the active low interrupt pulse should be equal to the
duration of one machine cycle for being sensed, else it will be lost.
9. If two interrupts, of higher priority and lower priority occur simultaneously, then the service
provided is for
a) interrupt of lower priority
Answer: b
Explanation: If two interrupts, occur simultaneously, then the one with higher priority level and
early polling sequence will receive service. The other one with lower priority may get lost there,
as there is no mechanism for storing the interrupt requests.
Answer: c
Explanation: For an interrupt to be guaranteed served it should have duration of two machine
cycles.
11. The service to an interrupt will be delayed if it appears during the execution of
a) RETI instruction
Answer: d
Explanation: The service to an interrupt will be delayed if it appears during the execution of
RETI instruction or the instruction that writes to IE/IP registers.
To practice all areas of Microprocessors, here is complete set of 1000+ Multiple Choice
Questions and Answers .
MCQs
focuses on “Serial Communication Unit”.
a) cheaper communication
Answer: d
Explanation: The serial communication requires less number of conductors and thus it is
cheaper. It is slow as the bits are transmitted one by one along with start, stop and parity bits.
Answer: b
Explanation: Serial communication is more popular for communication over longer distances as
it requires less number of conductors.
Answer: d
Explanation: The mcs 51 architecture supports simultaneous transmission and reception of
binary data byte by byte i.e. full duplex mode of communication. It supports serial transmission
and reception of data using standard serial communication interface and baud rates.
a) transmission rate
b) reception rate
c) transceiver rate
d) baud rate
Answer: d
Explanation: Here, baud rate can be defined as the number of bits transmitted or received per
second.
5. The task of converting the byte into serial form and transmitting it bit by bit along with start,
stop and parity bits is carried out by
a) reception unit
c) transmission unit
Answer: c
Explanation: the serial communication unit consists of transmission unit and reception unit. The
task of converting the byte into serial form and transmitting it bit by bit along with start, stop and
parity bits is carried out by transmission unit.
6. The transmission unit does not require assistance from processor if once a byte for
transmission is written to
a) SCON register
b) SBUF register
c) SFR address
Answer: b
Explanation: once a byte for transmission is written to the serial buffer
SBUF
register, the transmission unit does not require assistance from a processor.
7. The common unit shared by the receiver unit and transmission unit of serial communication
unit is
a) SCON
SerialPortControl
Register
b) SBUF
SerialBuffer
register
Answer: d
Explanation: The transmission unit and receiver unit both are controlled by using a common
SCON
SerialPortControl
Register. Also both units share a common serial buffer
SBUF
register which is a common 8-bit serial data interface.
8. During serial reception, the buffer that receives serial bits and converts to a byte is
a) receive buffer 0
b) receive buffer 1
c) receive buffer 2
d) none
Answer: b
Explanation: During serial reception, the receive buffer 1 receives serial bits and converts to a
byte, it then transfers the received parallel byte in receive buffer 2.
a) 8-bit synchronous
b) 9-bit synchronous
c) 8-bit asynchronous
d) 9-bit asynchronous
Answer: d
Explanation: If SM0=1, SM1=0, then the 9-bit asynchronous transceiver is selected.
a) SM0 is set
b) SM1 is set
c) SM2 is set
d) REN is set
Answer: c
Explanation: The bit, SM2 is set if the microcontroller is expected to communicate in a
multiprocessor system.
a) SMOD bit
b) SCON bit
Answer: d
Explanation: In mode 2, the baud rate depends only on SMOD bit and oscillator clock frequency.
12. The mode that offers the most secured parity enabled data communication at lower baud
rates is
a) mode 2
b) mode 1
c) mode 0
Answer: a
Explanation: The mode 3 offers the most secured parity enabled data communication at lower
baud rates of mode 1.
To practice all areas of Microprocessors, here is complete set of 1000+ Multiple Choice
Questions and Answers .
Answer: d
Explanation: The power control register is used for power saving during idle state of the
microcontroller and eventual power off to the microcontroller chip. It has SMOD bit which is used
to double the baud rate.
a) ALE is high
b) PSEN is high
c) PSEN
activelow
is high
activelow
are high
Answer: d
Explanation: ALE and PSEN
activelow
remain high in Idle mode.
a) SI
serial
b) INT0
c) INT1
Answer: d
Explanation: To come out of idle mode, any external interrupt that is enabled like SI
Serial
, INT0 and INT1.
Answer: c
Explanation: If the PD bit of PCON register is set, it enters power down mode.
a) normal mode
b) idle mode
d) addressing mode
Answer: c
Explanation: In power down mode, the clock signal to all parts of 8051 chip is disabled.
6. During power down to save battery, the supply voltage can be reduced to a value of
a) 4 volts
b) 2 volts
c) 8 volts
d) 1 volt
Answer: b
Explanation: The supply voltage can be reduced to a value of around 2 volts, during power
down to save battery.
8051
a) CLEAR
b) LEAVE
c) RESET
d) EXIT
Answer: c
Explanation: Only Reset signal can pull 8051 out of the power down mode.
a) ALE is high
b) PSEN is low
activelow
are high
activelow
are low
Answer: d
Explanation: ALE and PSEN
activelow
remain low in power down mode of 8051.
Answer: d
Explanation: In power down mode, the clock signal is disabled and all the port pins and
respective SFRs maintain their logic levels.
Answer: c
Explanation: The SMOD bit is used to double the baud rate.
To practice all areas of Microprocessors, here is complete set of 1000+ Multiple Choice
Questions and Answers .
MICROPROCESSOR (KCS 403)
d) None of these
10) PROM stands for:
a) Programmable read-only memory
b) Programmable read write memory
c) Programmer read and write memory
d) None of these
11) EPROM stands for:
a) Erasable Programmable read-only memory
b) Electrically Programmable read write memory
c) Electrically Programmable read-only memory
d) None of these
12) Each memory location has
a) Address
b) Contents
c) Both a and b
d) None of these
13) Customized ROMS are called
a) Mask ROM
b) Flash ROM
c) EPROM
d) None of these
14) A microprocessor retries instructions from
a) Control memory
b) Cache memory
c) Main memory
d) Virtual memory
15) Which causes the microprocessor to immediately terminate its present activity
a) RESET signal
b) INTERUPT signal
c) Both
d) None of these
16) INTR : it implies the signal:
a) INTRRUPT REQUEST
b) INTRRUPT RIGHT
c) INTRRUPT WRONG
d) INTRRUPT RESET
17) Which of the following are the two main components of the CPU?
a) Control Unit and Registers
b) Registers and Main Memory
c) Control unit and ALU
d) ALU and Bus
18) The language that the computer can understand and execute is called
a) Machine language
b) Application software
c) System program
MICROPROCESSOR (KCS 403)
a) 8008
b) 8080
c) 4004
d) 8800
22) Which is the type of memory for information that does not change on
your computer?
a) RAM
b) ROM
c) ERAM
d) RW/RAM
23) Which company is the biggest player in the microprocessor industry?
a) Motorola
b) IBM
c) INTEL
d) AMD
24) The term giga byte refers to
a) 1024 bytes
b) 1024 kilobytes
c) 1024 megabytes
d) 1024 gigabytes
25) 4GB ROM consist of
a) 12 Address lines
b) 32 Address lines
c) 4 Address lines
d) 10 Address lines
26) Which 3x8 decoder IC used for interfacing
a) 74HS13
b) 74LS17
c) 74LS138
d) 9955
27) FFH equivalent to in binary
a) 00001111
MICROPROCESSOR (KCS 403)
b) 11001100
c) 11001111
d) 11111111
28) Universal logic gates are
a) AND, OR
b) OR, NOT
c) NAND, NOR
d) NAND, OR
29) C and C++ is
a) Low level language
b) High level language
c) Assembly level language
d) None of these
30) 32-bit microprocessor consist
of
a) 32 data lines
b) 16 data lines
c) 32 address lines
d) 16 address lines
31. 8085 microprocessor Instruction LHLD 1234H is having following Addressing Mode:
a) Register addressing mode
b) Direct addressing mode
c) Indirect addressing mode
d) Implied addressing mode
32. What is the purpose of the READY signal in 8085
a) It is used to provide WAIT states when the 8085 is communicating with a slow
peripheral device.
b)It indicates that the 8085 is ready to receive inputs
c) It indicates that the 8085 is ready to provide Direct Memory Access
d) It indicates that the 8085 is ready to send outputs
33. Number of machine cycles required to execute LXI H, 7835H instruction in 8085 will
be:
a) 1 machine cycle
b) 3 machine cycles
c) 5 machine cycles
d) 2 machine cycles
34. Number of T states required to execute JMP 5012H instruction is:
a) 10
b) 16
c) 13
d) 7
35. If Register A=59H and Register D= 4DH then after execution of ADD D value of Carry
and Zero flag will be:
a)CF= 0, ZF=0
b) CF= 0, ZF=1
c) CF= 1, ZF=0
MICROPROCESSOR (KCS 403)
d) CF= 1, ZF=1
36. In memory read machine cycle in 8085 , values of status signals are :
a) S0= 0, S1=0
b) S0= 1, S1=0
c) S0= 0, S1=1
d) S0= 1, S1=1
37. Memory handling capacity of 8085 microprocessor is:
a) 64 KB
b) 1MB
c) 16 MB
d) 4 MB
d) 4 Byte
55. Which register pair has been used as by default memory pointer in 8085
a) H and L
b) W and Z
c) B and C
d) D and E
58. Which machine cycle is used for fetching the data from input location:
MICROPROCESSOR (KCS 403)
a) Opcode fetch
b) I/O Read
c) I/O write
d) I/O fetch
61. To execute one instruction at a time (single stepping execution) following flag bit is
used in 8086 microprocessor
a) Trap Flag
b) Interrupt Flag
c) Direction Flag
d) Overflow Flag
62. The maximum size of each segment in memory segmentation of 8086 is:
a) 16 KB
b) 32 KB
c) 48 KB
d) 64 KB
63. In 8086 one of the following statement is not true:
a) Coprocessor is interfaced in MIN mode.
b) Coprocessor is interfaced in MAX mode.
c) I/O can be interfaced in MIN/MAX mode.
d) Supports pipeline architecture
64. For Direction Flag(DF)=1, if starting address of string is 51004H then second string
element address will be:
a) 51003H
b) 51004H
c) 51005H
d) 51003H or 51005H.
65. In 8086 Microprocessor Overflow flag will set when
a) The sum is more than 16 bit.
b) Sign and Carry flag bits are set
c) Only sign flag is set.
d) Signed numbers go out of their range after arithmetic operation.
66. BIU in 8086 contains an instruction queue of size
MICROPROCESSOR (KCS 403)
a) 2 Bytes.
b) 4Bytes
c) 6 Bytes.
d) 8 Bytes.
67. EU in 8086 stands for
a) Extended unit.
b) End unit
c) Execution unit.
d) Encapsulation unit.
68. Which statement is false about EU in 8086 Microprocessor
a) It decodes various instructions.
b) It generates necessary control signals
c) It fetches instructions from memory.
d) It performs various arithmetic operations using ALU.
69. For CS= 1234H and IP= ABCDH, 20 bit physical address of the instruction will be:
a) 0BE01H.
b) 1FC0DH
c) 1CF0DH .
d) ACE04H.
70. For DS=1234H, Maximum Possible physical Address for an element in data segment
will be:
a) 2323F H
b) 21223F H
c) 2233F H
d) 2212F H
71. Which of the following index/pointer register cannot be used to provide offset address
with DS register to locate an element in data segment:
a) BX
b) IP
c) SI
d) DI
72. Memory handling capacity of 8086 microprocessor is:
a) 64 KB
b) 1MB
c) 16 MB
d) 4 MB
73. For 8086 microprocessor, following statement is false:
a) It supports memory segmentation.
b) It supports pipelined architecture
c) It supports multiprogramming.
d) It has a 20 bit data bus.
74. The number of segment registers available in 8086 microprocessor are:
a) 3
b) 4
c) 5
d) 6
MICROPROCESSOR (KCS 403)
f) Inter flag
g) Interrupt flag
h) Initial flag
b) TYPE 1
c) TYPE 2
d) TYPE 3
91. A sequence of two register that multiplies the content of DE register pair by two and store
the result in HL register pair is
(a) XCHG and DAD B
(b) XTHL and DAD H
(c) PCHL and DAD B
(d) XCHG and DAD H
92. Consider the sequence of 8085 instruction given below.
LXI H, 9258H
MOV A,M
CMA
MOV M,A
Which one of the following is performed by this sequence?
(a) Contents of location 9258H are moved to accumulator
(b) Contents of location 9258H are compared with the contents of the accumulator
(c) Contents of location 9258H are complemented and stored in location 9258H
(d) Contents of location 5892H are complemented and stored in location 5892H
93. It is desired to multiply the numbers 0AH by 0BH and store the result in the accumulator.
The numbers are available in register B and C respectively. A part of the 8085 program
for this purpose is given below:
MVI A, 00H
Loop:_____________
___________________
HLT
END
The sequence of instructions to complete the program would be
(a) JNZ LOOP, ADD B, DCR C
(b) ADD B, JNZ LOOP, DCR C
(c) DCR C, JNZ LOOP, ADD B
(d) ADD B, DCR C, JNZ LOOP
94. The following program starts at location 0100H.
LXI SP, 00FFH
LXI H, 0107H
MVI A, 20H
SUB M
The content of accumulator when the program counter reaches 0109H is
(a) 20H
(b) 02H
(c) 00H
(d) FFH
95. For 8085 microprocessor, the following program is executed.
MVI A, 05H;
MICROPROCESSOR (KCS 403)
MVI B, 05H;
PTR: ADD B;
DCR B;
JNZ PTR;
ADI 03H;
HLT;
At the end of program, accumulator contains
(a) 17H
(b) 20H
(c) 23H
(d) 05H
96. An 8085 assembly language program is given below. Assume that the carry flag is
initially unset. The content of the accumulator after the execution of the program is
MVI A, 07H
RLC
MOV B,A
RLC
RLC
ADD B
RRC
(a) 8CH
(b) 64H
(c) 23H
(d) 15H
97. For the 8085 assembly language program given below, the content of the accumulator
after the execution of the program is
3000 MVI A, 45H
3002 MOV B, A
3003 STC
3004 CMC
3005 RAR
3006 XRA B
(a) 00H (b) 45H (c) 67H (d) E7H
98. An 8085 executes the following instructions
2710 LXI H, 30A0 H
2713 DAD H
2714 PCHL
All address and constants are in Hex. Let PC be the contents of the program counter and
HL be the contents of the HL register pair just after executing PCHL. Which of the
following statements is correct?
(a) PC=2715H HL=30A0H
(b) PC=30A0H HL=2715H
(c) PC=6140H HL=6140H
(d) PC=6140H HL=2715H
99. An 8085 assembly language program is given below.
MVI A, B5H
MICROPROCESSOR (KCS 403)
MVI B, 0EH
XRI 69H
ADD B
ANI 9BH
CPI 9FH
STA 3010H
HLT
The contents of the accumulator just execution of ADD instruction in line 4 will be
(a) C3H (b) EAH (c) DCH
(d) 69H
100. From question no. 9, after execution of line 7 of the program, the status of the CY
and Z flags will be
(a) CY=0, Z=0
(b) CY=0, Z=1
(c) CY=1, Z=0
(d) CY=1, Z=1
101. Following is the segment of a 8085 assembly language program
LXI SP, EFFFH
CALL 3000H
-
-
-
3000H: LXI H, 3CF4H
PUSH PSW
SPHL
POP PSW
RET
On completion of RET execution, the contents of SP is
(a) 3CF0 H (b) 3CF8 H (c) EFFD H (d) EFFF H
102. The following program starts at location 0100H.
LXI SP, 00FF
LXI H, 0701
MVI A, 20H
SUB M
The content of accumulator when the program counter reaches 0109 H is
(a) 20 H (b) 02 H (c) 00 H (d) FF H
103. Continuation of question no. 12, if in addition following code exists from 019H
onwards,
ORI 40 H
ADD M
What will be the result in the accumulator after the last instruction is executed
(a) 40 H (b) 20 H (c) 60 H (d) 42H
104. Consider the following assembly language program
MVI B, 87H
MOV A, B
START: JMP NEXT
MICROPROCESSOR (KCS 403)
MVI B, 00H
XRA B
OUT PORT1
HLT
NEXT: XRA B
JP START
OUT PORT2
HLT
The execution of above program in an 8085 microprocessor will result in
(a) an output of 87H at PORT1
(b) an output of 87H at PORT2
(c) infinite looping of the program execution with accumulator data remaining at 00H
(d) infinite looping of the program execution with accumulator data alternating between
00H and 87H
105. The contents of register (B) and accumulator (A) of 8085 microprocessor are 49J
are 3AH respectively. The contents of A and status of carry (CY) and sign (S) after
execution SUB B instructions are
(a) A = F1, CY = 1, S = 1
(b) A = 0F, CY = 1, S = 1
(c) A = F0, CY = 0, S = 0
(d) A = 1F, CY = 1, S = 1
106. The following instructions have been executed by an 8085 MP
ADDRESS (HEX) INSTRUCTION
6010 LXI H, 8 A 79 H
6013 MOV A, L
6015 ADDH
6016 DAA
6017 MOV H, A
6018 PCHL
From which address will the next instruction be fetched?
(a) 6019 (b) 6379 (c) 6979 (d) None of the above
107. The following sequence of instructions are executed by an 8085 microprocessor:
1000 LXI SP, 27 FF
1003 CALL 1006
1006 POP H
The contents of the stack pointer (SP) and the HL, register pair on completion of
execution of these instruction are
(a) SP = 27 FF, HL = 1003
(b) SP = 27 FD, HL = 1003
(c) SP = 27 FF, HL = 1006
(d) SP = 27 FD, HL = 1006
108. In a microprocessor system, the stack is a used for
(a) Storing the program return address whenever a subroutine jump instruction is
executed
(b) Transmitting and receiving input output data
(c) Storing all important CPU register contents whenever an interrupt is to be serviced
MICROPROCESSOR (KCS 403)
b) Byte-wise
c) Bit-wise and byte-wise
d) None of the mentioned
127. Which of these register’s contents is used for auto-initialization (internally)?
a) Current word register
b) Current address register
c) Base address register
d) Command register
128. The register that maintains an original copy of the respective initial current address register
and current word register is
a) mode register
b) Base address register
c) Command register
d) Mask register
129. The register that can be automatically incremented or decremented, after each DMA
transfer is
a) Mask register
b) Mode register
c) Command register
d) Current address register
130. Which of the following is a type of DMA transfer?
a) memory read
b) memory write
c) verify transfer
d) all of the mentioned
131. Programmable peripheral input-output port is another name for
a) serial input-output port
b) parallel input-output port
c) serial input port
d) parallel output port
132. Port C of 8255 can function independently as
a) input port
b) output port
c) either input or output ports
d) both input and output ports
133. All the functions of the ports of 8255 are achieved by programming the bits of an internal
register called
a) data bus control
b) read logic control
c) control word register
d) none of the mentioned
141. The number of hardware interrupts that the processor 8085 consists of is
a) 1
b) 3
c) 5
d) 7
142. The register that stores all the interrupt requests in it in order to serve them one by one on a
priority basis is
a) Interrupt Request Register
b) In-Service Register
c) Priority resolver
MICROPROCESSOR (KCS 403)
Answers
1. D
MICROPROCESSOR (KCS 403)
2. A
3. C
4. D
5. C
6. D
7. A
8. B
9. C
10. A
11. A
12. C
13. A
14. C
15. B
16. A
17. C
18. A
19. B
20. A
21. C
22. B
23. C
24. C
25. B
26. C
27. D
28. C
29. B
30. A
31. B
32. A
33. B
34. A
35. A
36. C
37. A
38. C
39. A
40. A
41. D
42. A
43. A
44. C
45. A
46. B
MICROPROCESSOR (KCS 403)
47. B
48. D
49. B
50. A
51. B
52. C
53. C
54. D
55. A
56. A
57. C
58. B
59. A
60. A
61. A
62. D
63. A
64. A
65. D
66. C
67. C
68. C
69. C
70. C
71. B
72. B
73. D
74. B
75. C
76. A
77. D
78. A
79. A
80. D
81. C
82. C
83. B
84. A
85. A
86. D
87. A
88. B
89. B
90. B
91. D
92. C
MICROPROCESSOR (KCS 403)
93. D
94. C
95. A
96. C
97. C
98. C
99. B
100. C
101. B
102. C
103. C
104. B
105. A
106. C
107. C
108. C
109. B
110. D
111. D
112. A
113. A
114. B
115. B
116. D
117. A
118. B
119. B
120. A
121. B
122. C
123. B
124. A
125. C
126. B
127. C
128. B
129. D
130. D
131. B
132. C
133. C
134. B
135. D
136. D
137. B
138. D
MICROPROCESSOR (KCS 403)
139. C
140. C
141. C
142. A
143. C
144. D
145. D
146. C
147. B
148. A
149. A
150. C
Microprocessor Unit 1
2. Identify the register that holds the instruction that is currently being executed or decoded
a) Instruction Register
b) Program Counter
c) MAR
d) MDR
4. Find a group of circuits that performs all the computations in the computer
a) Arithmetic Logic Unit
b) Control Unit
c) Memory
d) I/O Unit
7. Select the program that converts mnemonic based language into microprocessor language
a) Compiler
b) Interpreter
c) Assembler
d) translator
12. When the data itself present in the instruction then the addressing mode is referred to as
a) Direct Addressing Mode
b) Indirect Addressing Mode
c) Register Addressing Mode
d) Immediate Addressing Mode
14. Differentiate between D-flip flop and D-latch by selecting the statement given below:
a) D-FF is edge triggered and D-latch is level triggered
b) D-FF is level triggered and D-latch is edge triggered
15. The addressing mode which uses the PC instead of a general purpose register is ______
a) Indexed with offset
b) Relative
c) Direct
d) Both Indexed with offset and direct
16. In the following data transfer technique, the CPU enters in a loop until the I/O device indicates that it is
ready to transfer the data
a) Programmed I/O
b) Interrupt Driven I/O technique
c) DMA technique
d) All of the mentioned techniques
17. The system that has multiple processors in the same computer sharing the bus, memory, and I/O is called
a) Multiprocessor system
b) Multi core system
c) Microprocessor system
d) Single processor system
19. Define the purpose of the interfacing devices by selecting the best statement matching with your definition.
a) Interfacing devices are the semiconductor chips that are needed to connect peripheral to the bus
b) Interfacing devices are necessary to interconnect the components of a bus oriented system
c) Encoders and decoders can be used as the interfacing devices
d) All of the mentioned
25. Which mode of Data Transfer Schemes (DTS) has the highest efficiency?
a) Cycle stealing mode
b) Burst mode
c) None
d) Both
31. The __________ controls the flow of data and instructions within the computer.
a) Control Unit
b) Register Array
c) Accumulator
d) Alu
35. FPGA:
a) Forward Programmable Gate Array
b) Forward Parallel Gate Array
c) Field Programmable Gate Array
d) Field Parallel Gate Array
42. The first digital computer build with IC chips was known as -
a) Apple -1
b) IBM 7090
c) IBM system / 360
d) VAX - 10
44. The _________ handles all the communication between the processor and the memory
A. numeric extension unit
B. Packed Unit
C. control unit
D. Binary Unit
Explanation: The control unit handles all the communication between the processor and the memory
A. 2
B. 3
C. 4
D. 5
Explanation: Interface is the path for communication between two components. Interfacing is of two types,
memory interfacing and I/O interfacing.
46.In which type of communication, the interface gets a single byte of data from the microprocessor and sends it
bit by bit to the other system serially and vice-a-versa?
A. Parallel Communication Interface
B. Serial Communication Interface
C. Both A and B
D. None of the above
Explanation: Serial Communication Interface : In this type of communication, the interface gets a single byte of
data from the microprocessor and sends it bit by bit to the other system serially and vice-a-versa.
49. This type of microcontroller is generally used in automatically controlled appliances like automatic
operational machines.
A. 8-bit microcontroller
B. 16-bit microcontroller
C. 32-bit microcontroller
D. 64-bit microcontroller
Explanation: 32-bit microcontroller : This type of microcontroller is generally used in automatically controlled
appliances like automatic operational machines.
50. If the data is present in a register and it is referred using the particular register, then it is
a) direct addressing mode
b) register addressing mode
c) indexed addressing mode
d) immediate addressing mode
51.The cycle required to fetch and execute an instruction in a 8085 microprocessor is which one of the
following?
A. Clock cycle
B. Memory cycle
C. Machine cycle
D. Instruction cycle
52. The RISC architecture is preferred to CISC because RISC architecture has
A. simplicity
B. efficiency
C. high speed
D. all of the mentioned
60. The additional functionality that can be placed on the same chip of RISC is
A. memory management units
B. floating point units
C. memory management and floating point arithmetic units
D. RAM, ROM
61. The technique of assigning a memory address to each I/O device in the computer system is called:
A. memory-mapped I/O
B. ported I/O
C. dedicated I/O
D. wired I/O
62. What type of circuit is used at the interface point of an output port?
A. decoder
B. latch
C. tristate buffer
D. none of the above
63. I/O mapped systems identify their input/output devices by giving them a(n) ________.
A. 8-bit port number
B. 16-bit port number
C. 8-bit buffer number
D. 8-bit instruction
64. What type of circuit is used at the interface point of an input port?
A. decoder
B. latch
C. tristate buffer
D. none of the above
65. Because microprocessor CPUs do not understand mnemonics as they are, they have to be converted to
________.
A. hexadecimal machine code
B. binary machine code
C. assembly language
D. all of the above
66. What is the difference between a mnemonic code and machine code?
A. There is no difference.
B. Machine codes are in binary, mnemonic codes are in shorthand English.
C. Machine codes are in shorthand English, mnemonic codes are in binary.
D. None of the above
67. What kind of computer program is used to convert mnemonic code to machine code?
A. debug
B. assembler
C. Interpreter
D. Compiler
69. Designing logic circuits and writing instructions to enable the microprocessor to communicate with
peripheral is called _________.
A. interfacing
B. monitoring
C. polling
D. pulling
70. ______ means at the same time, the transmitter and receiver are synchronized with the same clock.
A. asynchronous
B. serial data
C. synchronous
D. parallel data
76. The 16 bit register is separated into groups of 4 bit where each groups is called:
A. BCD
B. Nibble
C. Half byte
D. None of these
78. The output data lines of microprocessor and memories are usually tristated because
a) More than one device can transmit information over the data bus by enabling only one device at
a time
b) More than one device can transmit over the data bus at the same time
c) The data line can be multiplexed for both input and output
d) It increases the speed of data transfer over the data bus
79. The first microprocessor to include virtual memory in the intel microprocessor family is
a) 80286
b) 80386
c) 80486
d) Pentium
3. If the source and destination addresses are made implicit the length of instruction is reduced.
a) True
b) False
4. What type of instructions can potentially change the sequence of operations in a program?
a) Logical instructions
b) Data transfer instructions
c) Branch instructions
d) Arithmetic instructions
5. The instructions which after execution transfer control to the next instruction in the sequence are called
a) Sequential control flow instructions
b) control transfer instructions
c) Sequential control flow & control transfer instructions
d) none of the mentioned
Explanation: The sequential control flow instructions follow sequence order in their execution.
6. The instructions that transfer the control to some predefined address or the address specified in the instruction
are called as
a) sequential control flow instructions
b) control transfer instructions
c) sequential control flow & control transfer instructions
d) none of the mentioned
7. The instruction “JUMP” belongs to
a) sequential control flow instructions
b) control transfer instructions
c) branch instructions
d) control transfer & branch instructions
11. It is also a 16-bit register works like stack, which is always incremented /decremented by 2 during push &
pop operations.
A. Stack pointer
B. Temporary register
C. Flag register
D. Program counter
14. This signal indicates that another master is requesting the use of the address and data buses.
A. READY
B. HOLD
C. HLDA
D. INTA
Explanation: HOLD : This signal indicates that another master is requesting the use of the address and data
buses.
15. This signal is used as the system clock for devices connected with the microprocessor.
A. X1, X2
B. CLK OUT
C. CLK IN
D. IO/M
Explanation: CLK OUT : This signal is used as the system clock for devices connected with the microprocessor.
16. Which of the following is true about Control and status signals?
A. These signals are used to identify the nature of operation.
B. There are 3 control signal and 3 status signals.
C. Three status signals are IO/M, S0 & S1.
D. All of the above
19. The program counter in 8085 microprocessor is a 16- bit register because
a) It counts 16 bits at a time
b) There are 16 address lines
c) It facilitates the user storing 16 bit data temporarily
d) It has to fetch two 8-bit data at a time
20. What will be the value in the memory location 1001H after the execution of the following code? The data at
memory location 1000 is 40H.
LXI H, 1000H
MOV A, M
CMA
ADI 06H
STA 1001H
HLT
a) 59H
b) C5H
c) 5AH
d) 5CH
21. Which instruction must be included at the end of each and every subroutine?
a) Return
b) RET
c) CALL
d) EI
24. Which flag is set to 1 when the result of arithmetic or logical operation is zero else it is set to 0?
A. Binary bit
B. Zero flag
C. Sign flag
D. Overflow flag
25. Which flag represents the result when the system capacity is exceeded?
A. Carry flag
B. Auxiliary flag
C. Trap flag
D. Overflow flag
26. It is an edge triggered input, which causes an interrupt request to the microprocessor.
A. NMI
B. INTR
C. INTA
D. ALE
Explanation: The non-maskable interrupt (NMI) is an edge-triggered input that requests an interrupt on the
positive edge (0-to-1 transition). The NMI input is often used for parity errors and other major faults, such as
power failures.
27. It is used to write the data into the memory or the output device depending on the status of M/IO signal.
A. IR
B. HLDA
C. HR
D. WR’
28. Assertion (A): Microprocessor 8085 has an on-chip oscillator with an inbuilt crystal.
Reason (R): For frequency stability crystal oscillator is preferred.
a) Both A and R are correct and R is the correct explanation of A
b) Both A and R are correct but R is not the correct explanation of A
c) A is correct R is wrong
d) A is wrong R is correct
An oscillator is a circuit which produces a continuous, repeated, alternating waveform without any input.
Oscillators basically convert unidirectional current flow from a DC source into an alternating waveform which
is of the desired frequency, as decided by its circuit components
30. It is a power supply signal, which requires +5V supply for the operation of the circuit.
A. VCA
B. VDD
C. VCC
D. INTA
31. ALU (Arithmetic and Logic Unit ) of 8085 microprocessor consists of-
a) Accumulator, arithmetic, logic circuits and five flags
b) Accumulator, arithmetic and logic circuits
c) Accumulator, temporary register, arithmetic, logic circuits and five flags
d) Accumulator, temporary register, arithmetic and logic circuits
35.The instruction that pushes the contents of the specified register/memory location on to the stack is
a) PUSHF
b) POPF
c) PUSH
d) POP
36. In POP instruction, after each execution of the instruction, the stack pointer is
a) incremented by 1
b) decremented by 1
c) incremented by 2
d) decremented by 2
37. The instructions that are used for reading an input port and writing an output port respectively are
a) MOV, XCHG
b) MOV, IN
c) IN, MOV
d) IN, OUT
42. The flags are affected in which category of instructions in 8085 microprocessor
A. Data Transfer group
B. Arithmetic Group and logical group
C. Branch group
D. Machine control group
43. In 8085 microprocessor, the RST6 instruction transfer programme execution to following location
a) 0030H.
b) 0024H.
c) 0048H.
d) 0060H.
8085 requires a signal +5V power supply and operates at 3.2 MHZ single phase clock.
47. There is a „cross-over frequency‟ below which the period mode is preferred. Assuming the crystal
oscillator frequency to be 4MHz, the crossover frequency is given by
a) 8 Mhz.
b) 2 Mhz.
c) 2 Khz.
d) 1Khz.
Explanation: As we know crossover frequency is the half of oscillator frequency.
HLDA or Hold Acknowledge indicates that the CPU has received the HOLD request and that it will relinquish
the bus in the next clock cycle.
HLDA goes low after the Hold request is removed. The CPU takes the bus one half-clock cycle after HLDA
goes low.
RESET OUT signal indicates that microprocessor is being reset. This signal can be used to reset other devices.
The signal is synchronized to the processor clock and lasts an integral number of clock periods.
54. Assertion(A): Ready signal of microprocessor is used to detect whether a peripheral is ready for the data
transfer or not.
Reason(R): In the microprocessor during data transfer operations, the wait states are added by forcing the ready
signal low.
a) Both A & R are true and R is the correct explanation of A.
b) Both A & R are true but R is not the correct explanation of A .
c) A is true but R is false.
d) A is false but R is true.
2. The work of EU
Encoding
Decoding
Calculation
Processing
8. Which instruction is used to load the address of operand into the provided register?
A. LEA
B. LDS
C. LES
D. LAHF
Explanation: LEA : Used to load the address of operand into the provided register.
10. The different ways in which a source operand is denoted/specified in an instruction is known as
A. Instruction Set
B. Interrupts
C. 8086 Configuration
D. Addressing Modes
12. _____________ is a specially designed circuit on microprocessor chip which can perform the same task
very quickly, which the microprocessor performs
A. Coprocessor configuration
B. Closely coupled configuration
C. Loosely coupled configuration
D. None of the above
Explanation: A Coprocessor is a specially designed circuit on microprocessor chip which can perform the same
task very quickly, which the microprocessor performs.
15. _________signal takes care of the coprocessor's activity, i.e. the coprocessor is busy or idle.
A. TEST
B. QS0
C. QS1
D. None of the above
Explanation: TEST signal takes care of the coprocessor's activity, i.e. the coprocessor is busy or idle.
21. The instruction, MOV AX, 0005H belongs to the address mode
a) register
b) direct
c) immediate
d) register relative
Explanation: In Immediate addressing mode, immediate data is a part of instruction and appears in the form of
successive byte or bytes.
27. The instructions that involve various string manipulation operations are
a) branch instructions
b) flag manipulation instructions
c) shift and rotate instructions
d) string instructions
28. The instruction that is used for finding out the codes in case of code conversion problems is
a) XCHG
b) XLAT
c) XOR
d) JCXZ
Explanation: The translate (XLAT) instruction is used to find codes.
29. The instruction that loads the AH register with the lower byte of the flag register is
a) SAHF
b) AH
c) LAHF
d) PUSHF
Explanation: The instruction LAHF (Load AH from a lower byte of Flag) may be used to observe the status of
all the condition code flags(except overflow flag) at a time.
32. The length of bus cycle in 8086/8088 is four clock cycles, T1, T2, T3, T4 and an indeterminate number of
wait state clock cycles denoted by Tw. The wait states are always inserted between
a) T1 & T2
b) T2 & T3
c) T3 & T4
d) T4 & T1
33. Bus Interface Unit (BIU) in 8086 performs the following functions:
a) Instruction decoding.
b) Instruction fetch.
c) Arithmatic and Logic operations.
d) All the above.
44. The directive used to inform the assembler, the names of the logical segments to be assumed for different
segments used in the program is
a) ASSUME
b) SEGMENT
c) SHORT
d) DB
Explanation: In ALP, each segment is given a name by using the directive ASSUME
SYNTAX: ASSUME segment:segment_name
Eg: ASSUME CS:Code
Here CS is the Code segment and code is the name assumed to the segment.
47. The directive that updates the location counter to the next even address while executing a series of
instructions is
a) EVN
b) EVEN
c) EVNE
d) EQU
48. The directive that directs the assembler to start the memory allotment for a particular segment/block/code
from the declared address is
a) OFFSET
b) LABEL
c) ORG
d) GROUP
Explanation: If an ORG is written then the assembler initiates the location counter to keep the track of allotted
address for the module as mentioned in the directive.
If the directive is not present, then the location counter is initialized to 0000H.
49. The directive that marks the starting of the logical segment is
a) SEG
b) SEGMENT
c) SEG & SEGMENT
d) PROC
50. The labels or constants that can be used by any module in the program is possible when they are declared as
a) PUBLIC
b) LOCAL
c) GLOBAL
d) Either PUBLIC or GLOBAL
Explanation: The labels, constants, variables, procedures declared as GLOBAL can be used by any module in
the program.
51. The recurrence of the numerical values or constants in a program code is reduced by
a) ASSUME
b) LOCAL
c) LABEL
d) EQU
58. After every response to the single step interrupt the flag that is cleared is
a) IF (Interrupt Flag)
b) TF (Trap Flag)
c) OF (Overflow Flag)
d) None of the mentioned
61. The interrupt for which the processor has the highest priority among all the external interrupts is
a) keyboard interrupt
b) TRAP
c) NMI
d) INT
62. The interrupt for which the processor has highest priority among all the internal interrupts is
a) keyboard interrupt
b) TRAP
c) NMI
d) INT
65. For the INTR signal, to be responded to in the next instruction cycle, it must go ________ in the last clock
cycle of the current instruction
a) high
b) low
c) high or low
d) unchanged
Explanation: The INTR signal must go high in the clock cycle of the current instruction in order to respond in
the next instruction cycle.
68. If the pin LOCK (active low based) is low at the trailing edge of the first ALE pulse, then till the start of the
next machine cycle, the pin LOCK (active low) is
a) low
b) high
c) low or high
d) none of the mentioned
Explanation: The pin LOCK (active low) remains low till the start of the next machine cycle.
69. With the trailing edge of the LOCK (active low), the INTA (active low) goes low and remains in it for
a) 0 clock cycle
b) 1 clock cycle
c) 2 clock cycles
d) 3 clock cycles
1. The instruction that is used to transfer the data from source operand to destination operand is
a) data transfer instruction
b) branch instruction
c) arithmetic/logical instruction
d) string instruction
A. True
B. False
A. True
B. False
4. Placing an EI instruction on the bus in response to INTA’ during an INA cycles is prohibited
A. True
B. False
A. 3
B. 4
C. 5
D. 10
A. HLT
B. RIM
C. NOP
D. EI
RIM loads the data (status) into the accumulator related to the interrupts and the serial input
The execution of the SIM instruction uses the content of the accumulator (which must be previously loaded)
11. In which of the following addressing mode, the offset is obtained by adding displacement and contents of
one of the base registers?
a) direct mode
b) register mode
c) based mode
d) indexed mode
12. In which of the following addressing mode, the offset is obtained by adding displacement, with the contents
of SI?
a) direct mode
b) register mode
c) based mode
d) indexed mode
13. The address of a location of the operand is calculated by adding the contents of any of the base registers,
with the contents of any of index registers in
a) based indexed mode with displacement
b) based indexed mode
c) based mode
d) indexed mode
14. The representation of 8-bit or 16-bit signed binary operands using 2’s complement is a data type of
a) Ordinal
b) ASCII
c) Packed BCD
d) integer
POP PSW
POP B
POP D
POP 30 H
16. The instruction that pushes the general purpose registers, pointer and index registers on to the stack is
a) POPF
b) PUSH Imd
c) PUSH
d) PUSHF
17. The instruction that pushes all the flags to the word onto the stack is
a) POPF
b) PUSH Imd
c) PUSH
d) PUSHF
18. While executing the PUSH instruction, the stack pointer is decremented by
a) 1
b) 2
c) 4
d) 16
19. While executing the POP instruction, the stack pointer is incremented by
a) 1
b) 2
c) 4
d) 16
21. The instruction that is used for finding out the codes in case of code conversion problems is
a) XCHG
b) XLAT
c) XOR
d) JCXZ
22. The instruction that loads effective address formed by destination operand into the specified source register
is
a) LEA
b) LDS
c) LES
d) LAHF
23. The instruction that loads the AH register with the lower byte of the flag register is
a) SAHF
b) AH
c) LAHF
d) PUSHF
24. The instruction that loads the flag register completely from the word contents of the memory location is
a) PUSH
b) POP
c) PUSHF
d) POPF
27. The flag that acts as Borrow flag in the instruction, SBB is
a) direction flag
b) carry flag
c) parity flag
d) trap flag
30. The instruction, CMP to compare source and destination operands it performs
a) addition
b) subtraction
c) division
d) multiplication
31. During comparison operation, the result of comparing or subtraction is stored in
a) memory
b) registers
c) stack
d) no where
A. Carry Flag
B. Zero Flag
C. Carry Flag and Zero Flag
D. All flags
33. How many T-states are required for execution of OUT 80H instruction?
a) 10
b) 13
c) 16
d) 7
OUT operation means Output data from Accumulator to a port with 8 bit address. The contents of the
accumulator are copied into the output port. It is a two byte operation with 3 machine cycles and 10 T states.
10T states 4 for Opcode fetch, 3 for Memory read and 3 for I/O write operation.
34. How many machine cycles are required for execution of IN 30H instruction
a) 3
b) 4
c) 5
d) 6
IN instruction means Input data to Accumulator from a port with 8-bit address.IN 30H is a 2 byte instruction
which requires 3 machine cycles i.e. Opcode fetch, read, read(operand read from the 8 bit port address).
The flags (flip flop) are affected by the arithmetical and logical operations in the ALU. Flags generally reflects
the data conditions in the accumulator with some exception. INX B is a instruction which increment the content
of the register pair BC by 1 and it does not affect any of the flags.
36. Which instruction is required to rotate the content of accumulator one bit right along with carry?
a) RLC
b) RAL
c) RRC
d) RAR
RAR instruction means rotate accumulator right through carry. By this instruction each bit of the accumulator is
rotated right by one position through the carry flag. The carry flag is set by the least significant digit and content
of the carry flag is placed in the most significant position. Example : accumulator contents before instruction is
10100111 and the flag is set by 0. After the instruction executes the accumulator content is 01010011 and the
flag is set by 1.
37. Which flag will be affected by the execution of RLC /RRC/ RAL/ CMC instruction?
38. A good assembly language programmer should use general purpose registers rather than memory in
maximum possible ways for data processing. This is because:
39. What are the sets of commands in a program which are not translated into machine instructions during
assembly process, called?
a) Mnemonics
b) Directives
c) Identifiers
d) Operands
40. How many bytes in a zero memory page should be reserved for vectors used by RST instructions?
a) 16.
b) 32.
c) 64.
d) 128.
First 64 bytes in a zero memory page should be reserved for vectors used by RST instructions.
a) 4 bytes
b) 2 bytes
c) 1 bytes
d) 3 bytes
42. XCHG instruction exchanges the content of H-L with ______ register pair.
a) B-C
b) PSW
c) D-E
d) Stack Pointer
43. ________used to implement the hardware interrupts (RST 7.5, RST 6.5, RST 5.5) by setting various bits to
form masks or generate output data via the Serial Output Data (SOD) line.
a) RIM
b) SIM
c) EI
d) DI
Set Interrupt Mask (SIM) – It is used to implement the hardware interrupts (RST 7.5, RST 6.5, RST 5.5) by
setting various bits to form masks or generate output data via the Serial Output Data (SOD) line. First the
required value is loaded in accumulator then SIM will take the bit pattern from it.
44. _____________is used to read the status of the hardware interrupts (RST 7.5, RST 6.5, RST 5.5) by loading
into the A register a byte which defines the condition of the mask bits for the interrupts.
a) SIM
b) RIM
c) DI
d) EI
Microprocessor Unit 5
Unit 5 questions
1. The block of 8237 that decodes the various commands given to the 8237 by the CPU is
a) timing and control block
b) program command control block
c) priority block
d) none of the mentioned
2. The priority between the DMA channels requesting the services can be resolved by
a) timing and control block
b) program command control block
c) priority block
d) none of the mentioned
4. The register that holds the data byte transfers to be carried out is
5. When the count becomes zero in the current word register then
a) Input signal is enabled
b) Output signal is enabled
c) EOP (end of process) is generated
d) Start of process is generated
d) command register
Explanation: The contents of base address register cannot be read by the CPU. These contents are used
internally for auto-initialization.
7. The register that can be automatically incremented or decremented, after each DMA transfer is
a) mask register
b) mode register
c) command register
d) current address register
a. Timing block
b. Control block
d. All of d above
10. These maintain an original copy of respective initial current register and current word register before
incrementing or decrementing
a. Mode register
c. Only b
d. Both
11. Each of 4 DMA channels of 8237 has ___ bit current address register.
a. 16
b. 32
c. 64
d. 124
a. Code register
b. Count register
c. Command register
a. 16
b. 32
c. 8
d. 64
a. CPU, reset
b. ALU
c. BIU
15. In mode register bits __ and __ determine which of the 4 channels mode register are to be written
a. 0 and 1
b. 2 and 3
c. 1 and 0
a. 0 and 1
b. 2 and 3
c. 1 and 0
17. Bit ____ indicates whether address incremented or address decremented mode is selected
a. 0
b. 5
c. 3
d. 2
18. _____ register holds data during memory –memory data transfer
a. Temporary register
b. Command register
c. Mode register
d. None of the above
19. ____ register keeps the track of all DMA channel pending requests and the status of terminal counts
a. Temporary register
b. Command register
c. Mode register
d. Status register
20. ___ signal is required for deriving the internal timings requiredfpr circuit operations
a. GND
b. CLK
c. READY
d. RESET
21. High on this input line clears the command, status, request and temporary register
a. RESET
b. CLK
c. READY
d. none
22. This active- high input is used to match the read or write speed of 8237 with slow memories or i/o devices
a. READY
b. RESET
c. CLK
d. None
23. Signal used to indicate that cpu has relinquished the control of the bus, as a response to bus request
a. HLDA
b. READY
c. RESET
d. CLK
24. DREQo has ____ priority
a. Highest
b. Lowest
c. None of these
a. Lowest
b. Highest
c. None
26. Data bus is ____ lines used to transfer data to /from I/O or memory
a. Unidirectional
b. Bidirectional
c. None
27. An output pin used to request the control of the system bus from cpu
a. HRQ
b. HOLD
c. HLDA
8259
28. In 8259, The register that stores all the interrupt requests in it in order to serve them one by one on a priority
basis is
a) Interrupt Request Register
b) In-Service Register
c) Priority resolver
d) Interrupt Mask Register
29. In 8259, The register that stores the bits required to mask the interrupt inputs is
a) In-service register
b) Priority resolver
c) Interrupt Mask register
d) None
30. In 8259, When the PS(active low)/EN(active low) pin of 8259A used in buffered mode, then it can be used
as a
a) input to designate chip is master or slave
b) buffer enable
c) buffer disable
d) none
Explanation: When the pin is used in buffered mode, then it can be used as a buffer enable to control buffer
transreceivers. If it is not used in buffered mode, then the pin is used as input to designate whether the chip is
used as a master or a slave.
31. In 8259, Once the ICW1 is loaded, then the initialization procedure involves
a) edge sense circuit is reset
b) IMR is cleared
c) slave mode address is set to 7
d) all of the mentioned
32. In 8259, When non-specific EOI command is issued to 8259A it will automatically
a) set the ISR
b) reset the ISR
c) set the INTR
d) reset the INTR
Explanation: When non-specific EOI command is issued to 8259A it will automatically reset the highest ISR.
33. In 8259 application where all the interrupting devices are of equal priority, the mode used is
a) Automatic rotation
b) Automatic EOI mode
c) Specific rotation
d) EOI
34. In automatic rotation , the device , after being serviced , receives the ________ priority
A Lowest
B Highest
C Intermediate
D Cannot predict
A When servicing an interrupt request from slave, the slave is not allowed to place any
further requests.
B When servicing an interrupt request from a slave , the slave the slave is allowed to place
further request
C Sometimes A sometimes B
D Cannot predict
37. If the data is transmitted only in one direction over a single communication channel, then it is of
a) simplex mode
b) duplex mode
c) semi duplex mode
d) half duplex mode
38. If the data transmission takes place in either direction, but at a time data may be transmitted only in one
direction then, it is of
a) simplex mode
b) duplex mode
c) semi duplex mode
d) half duplex mode
39. In 8251A, the pin that controls the rate at which the character is to be transmitted is
a) TXC(active low)
b) TXC(active high)
c) TXD(active low)
d) RXC(active low)
40. TXD(Transmitted Data Output) pin carries serial stream of the transmitted data bits along with
a) start bit
b) stop bit
c) parity bit
d) all of the mentioned
41. The signal that may be used either to interrupt the CPU or polled by the CPU is
a) TXRDY(Transmitter ready)
b) RXRDY(Receiver ready output)
c) DSR(active low)
d) DTR(active low)
(A) 85 H
(B) 86 H
(C) 87 H
(D) 88 H
44. Ports are used to connect the CPU to which of the following units ?
1. Printer
(A) 1 and 2
(B) 2 and 3
(C) 3 and 4
(D) 1 and 3
45. 8251 is a
(A) UART
(B) USART
46. When the 8255 is reset, its I/O ports are all initializes as
(B) PB0-PB7
(C) PC3-PC7
(D) PC0-PC2
48. Which is the commonly used programmable interface and particular used to provide handshaking:
A 8251
B 8254
C 8259
D 8255
49. Which provide a mechanism to establish a link between the microprocessor and i/o device:
A. Input interface
B. Output interface
C. Both a and b
D. None of these
50. In which the processor uses a protection of the memory address to represent I/O ports:
c. Both a and b
d. None of these
b. Isolated I/O
c. Both a and b
d. None of these
52. The processor of knowing the status of device and transferring the data with matching speeds is called:
a. Handshaking
b. Peripheral
c. Ports
d. None of these
a. 8251
b. 8254
c. 8255
d. 8259
a. Mode 0
b. Mode 1
c. Mode 2
d. None of these
a. Mode 0
b. Mode 1
c. Mode 2
d. None of these
56. Which mode is used for simple input or output without handshaking:
a. Mode 0
b. Mode 1
c. Mode 2
d. None of these
57. Which PORT C pins are used for port B in 8255 mode 1:
a. PC0-PC2
b. PC3-PC7
c. PC6-PC7
d. PC3-PC5
a. PC0-PC2
b. PC3-PC7
c. PC6-PC7
d. PC3-PC5
59. Which are used for handshake lines for port A in 8255 mode 2:
a. PC0-PC2
b. PC3-PC7
c. PC6-PC7
d. PC3-PC5
(D) Either along with the bits or after the data transfer
A. 3
B. 4
C. 5
D. 6
A. 3
B. 4
C. 5
D. 6
A. Mode 0
B. Mode 1
C. Mode 2
D. Mode 4
64. Which of the following port can be programmed nibble wise (separately)?
A. Port A
B. Port B
C. Port C
D. Port D
A. A
B. B
C. C
D. None
66. In BSR (bit set reset) mode, individual bits of port C can be accessed.
A. True
B. False
67. What is the purpose of B3B2B1 bits of control word in mode 0 (BSR mode)?
B. for port B
C. For port C
A0
B. 1
C. 10
D. 11
69. Give the control word address if port C lower bit is to be configured as input Port, port A as an output port in
mode 0 and port B is not used in I/O mode?
A. 80H
B. 81H
C. 87H
D. 07H
A. Port A
B. Port B
C. Port C
D. All of above
A.8 Bits
B. 16 Bits
C. 4 Bits
D. 2 Bits
8251
a. Stop
b. Parity
c. Character length
d. None of these
74. Setting of parity error flag (PE) will not stop the operation of receiver
a. True
b. False
a. True
b. False
76. When transmitter is enabled & ready to transmit the data value of CTS will be
a. 0
b. 1
c. 00
d. 11
a. Falling
b. Rising
c. Trailing
d. None of these
b. Falling
c. Rising
d. Trailing
e. None of these
79. Signal is used to inform CPU about availability of data in receiver & CPU must
a. RxRDY
b. TxRDY
c. TxE
d. None of these
80. line is made high & sync characters are transmitted on TxD line
a. RxRDY
b. TxRDY
c. TxE
d. None of these.
c. Transmitter section
d. Receiver section
e. Modem control
83. 8251 accepts on data & decides which part to activate when……………….
a. CS=0
b. C/D=0
c. CS=1
d. C/D=1
84. 8251 contains data buffer registers
a. 2
b. 4
c. 1
d. None of these
a. DTR
b. DSR
c. CTS
d. Both a & c
a. True
b. False
a. 8255
b. 8251
c. 8254
d. 8259
88. The communication between processor & 8251 can be done in ………mode only.
a. Parallel
b. Serial
c. Both a & b
d. None of these
a. Parallel to serial
b. Serial to parallel
c. Both a & b
d. None of these
90. 8251A support full duplex transmission & reception
a. True
b. False
………..bits & transmits them over the TxD line to the peripheral.
a. Parallel, serial
b. Serial,parallel
c. Any, any
d. None of these
a. UART
b. USART
a. True
b. False
94. 8251 USART provides double buffering of data in the transmission section & in the receiver section.
a. True
b. False
a. 64K
b. 19.2K
c. 32K
d. 12K
96. Which of these errors are recognized by 8251 provides error detection logic , which detects parity, over run,
framing errors?
a. Parity
b. Overrun
c. Frame
d. All of these
a. 28
b. 32
c. 26
d. 30
a. Single,5
b. Single,8
c. Dual,5
d. Dual,8
99. Which of the following is a permissible character lengths applicable in 8251 asynchronous mode?
a. 6 bits
b. 7 bits
c. 8 bits
d. All of these
a. Asynchronous
b. Character synchronization
c. Enter HUNT
d. None of these
101. 8251A sets…. pin high to indicate that the synchronization is achieved.
a. DSR
b. SYNDET
c. PE
d. FE
102………….controls the operation of USART within its basic frame work established by
a. Status word
b. Command instruction
c. Mode instruction
d. None of these
103. In mode instruction of 8251A… bit is added to the data bits only if parity isenabled
a. START
b. STOP
c. Parity
a. Start bits
b. Stop bit
c. Parity bit
105. 8251 when used as a modem control… indicates that the terminal is ready to
communicate.
a. DSR
b. DTR
c. CTS
d. RTS
106. The number of counters that are present in the programmable timer device 8254 is
a) 1
b) 2
c) 3
d) 4
107. In 8254, the operation that can be performed on control word register is
a) read operation
b) write operation
c) read and write operations
d) none
108. In 8254, the mode that is used to interrupt the processor by setting a suitable terminal count is
a) mode 0
b) mode 1
c) mode 2
d) mode 3
110. In 8254, in control word register, if SC1=0 and SC0=1, then the counter selected is
a) counter 0
b) counter 1
c) counter 2
d) none
112. In 8254, the control word register contents are used for
a) initializing the operating modes
b) selection of counters
c) choosing binary/BCD counters
d) all of the mentioned
MCQs
Answer: c
Explanation: Machine language instruction format has one or more fields. The first one is the
operation code field.
a) Operand field
Answer: c
Explanation: Machine language instruction format has both the fields.
a) 2 bytes
b) 1 byte
c) 3 bytes
d) 4 bytes
Answer: b
Explanation: This format is only one byte long.
b) 1 byte
c) 3 bytes
d) 4 bytes
Answer: a
Explanation: This format is 2 bytes long.
a) another register
c) other operands
Answer: d
Explanation: The LSBs
leastsignificantbits
from 0 to 3 represent R/M field that specifies another register or memory location i.e. the other
operand.
a) status bit
b) sign bit
Answer: c
Explanation: The S-bit known as sign extension bit is used along with W-bit to show the type of
operation.
a) W-bit
b) S-bit
c) V-bit
d) Z-bit
Answer: d
Explanation: The Z-bit is used by the REP instruction to control the loop.
a) 8 bits
b) 4 bits
c) 16 bits
d) 2 bits
Answer: c
Explanation: If W-bit is ‘1’ then the operand is of 16-bits, and if it is ‘0’ then the operand is of
8-bits.
9. The instructions which after execution transfer control to the next instruction in the sequence
are called
Answer: a
Explanation: The sequential control flow instructions follow sequence order in their execution.
10. The instructions that transfer the control to some predefined address or the address
specified in the instruction are called as
Answer: b
Explanation: The control transfer instructions transfer control to the specified address.
c) branch instructions
Answer: d
Explanation: The JUMP instruction transfers the control to the address located in the instruction.
To practice all areas of Microprocessors, here is complete set of 1000+ Multiple Choice
Questions and Answers .
MCQs
a) register
b) direct
c) immediate
d) register relative
Answer: c
Explanation: In Immediate addressing mode, immediate data is a part of instruction and appears
in the form of successive byte or bytes.
Answer: c
Explanation: Since immediate data is present in the instruction.
Answer: b
Explanation: Since the address is directly specified in the instruction as a part of it.
4. If the data is present in a register and it is referred using the particular register, then it is
Answer: b
Explanation: Since register is used to refer the address.
Answer: d
Explanation: Since the register used to refer to the address is accessed indirectly.
6. If the offset of the operand is stored in one of the index registers, then it is
Answer: c
Explanation: In the indexed addressing mode, the offset of an operand is stored and in the rest
of them, address is stored.
Answer: b
Explanation: In intrasegment indirect mode, the branch address is found as the content of a
register or a memory location.
8. If the location to which the control is to be transferred lies in a different segment other than
the current one, then the mode is called
a) intrasegment mode
Answer: d
Explanation: In intersegment mode, the control to be transferred lies in a different segment.
is an example of
Answer: c
Explanation: Since in intersegment direct mode, the address to which the control is to be
transferred is in a different segment.
10. The contents of a base register are added to the contents of index register in
a) indexed addressing mode
Answer: d
Explanation: The effective address is formed by adding the contents of both base and index
registers to a default segment.
To practice all areas of Microprocessors, here is complete set of 1000+ Multiple Choice
Questions and Answers .
MCQs
1. The instruction that is used to transfer the data from source operand to destination operand is
b) branch instruction
c) arithmetic/logical instruction
d) string instruction
Answer: a
Explanation: These instructions are used to copy and transfer the instructions.
a) MOV
b) PUSH
c) DAS
d) POP
Answer: c
Explanation: DAS
DecimalAdjustafterSubtraction
is an arithmetic instruction.
3. The instructions that involve various string manipulation operations are
a) branch instructions
d) string instructions
Answer: d
Explanation: The string instructions perform operations on strings such as load, move, scan,
compare etc.
a) MOV AX, BX
d) PUSH AX
Answer: b
Explanation: Both the source and destination operands cannot be memory locations except for
string instructions.
5. In PUSH instruction, after each execution of the instruction, the stack pointer is
a) incremented by 1
b) decremented by 1
c) incremented by 2
d) decremented by 2
Answer: d
Explanation: The actual current stack-top is always occupied by the previously pushed data. So,
the push operation decrements SP by 2 and then stores the two bytes contents of the operand
onto the stack.
6. The instruction that pushes the contents of the specified register/memory location on to the
stack is
a) PUSHF
b) POPF
c) PUSH
d) POP
Answer: c
Explanation: Since PUSH operation transfers data to stack from a register or memory location.
7. In POP instruction, after each execution of the instruction, the stack pointer is
a) incremented by 1
b) decremented by 1
c) incremented by 2
d) decremented by 2
Answer: c
Explanation: The actual current stack top is poped into the specific operand as the contents of
stack top memory is stored in AL&SP and further contents of the memory location pointed to by
SP are copied to AH & SP.
8. The instructions that are used for reading an input port and writing an output port respectively
are
a) MOV, XCHG
b) MOV, IN
c) IN, MOV
d) IN, OUT
Answer: d
Explanation: The address of the input/output port may be specified directly or indirectly.
Example for input port: IN AX, DX; This instruction reads data from a 16-bit port whose address
is in DX and stores it in AX
Example for output port: OUT 03H, AL; This sends data available in AL to a port whose address
is 03H.
9. The instruction that is used for finding out the codes in case of code conversion problems is
a) XCHG
b) XLAT
c) XOR
d) JCXZ
Answer: b
Explanation: The translate
XLAT
instruction is used to find codes.
10. The instruction that loads effective address formed by destination operand into the specified
source register is
a) LEA
b) LDS
c) LES
d) LAHF
Answer: a
Explanation: The instruction, LEA loads effective address and is more useful for assembly
language rather than for machine language.
11. The instruction that loads the AH register with the lower byte of the flag register is
a) SAHF
b) AH
c) LAHF
d) PUSHF
Answer: c
Explanation: The instruction LAHF
LoadAHfromalowerbyteofFlag
may be used to observe the status of all the condition code flags
exceptoverflowflag
at a time.
12. The instruction that pushes the flag register on to the stack is
a) PUSH
b) POP
c) PUSHF
d) POPF
Answer: c
Explanation: The instruction PUSHF
pushflagstostack
pushes the flag register on to the stack.
13. The instruction that loads the flag register completely from the word contents of the memory
location is
a) PUSH
b) POP
c) PUSHF
d) POPF
Answer: d
Explanation: POPF is pop flags to stack.
14. The instruction that adds immediate data/contents of the memory location specified in an
instruction/register to the contents of another register/memory location is
a) SUB
b) ADD
c) MUL
d) DIV
Answer: b
Explanation: ADD instruction adds the data.
a) ADD
b) ADC
Answer: b
Explanation: ADC
AddwithCarry
instruction performs the same operation as ADD operation, but adds the carry flag bit to the
result.
To practice all areas of Microprocessors, here is complete set of 1000+ Multiple Choice
Questions and Answers .
This set of Microprocessors Interview Questions and Answers focuses on “Instruction Set of
8086/8088 – 2”.
1. The instruction, “INC” increases the contents of the specified register or memory location by
a) 2
b) 0
c) 1
d) 3
Answer: c
Explanation: This instruction adds 1 to the contents of the operand and so increments by 1.
2. The instruction that subtracts 1 from the contents of the specified register/memory location is
a) INC
b) SUBB
c) SUB
d) DEC
Answer: d
Explanation: The DEC instruction decrements the contents of a specified register/memory
location by 1.
a) DEC
b) SUB
c) SBB
a) direction flag
b) carry flag
c) parity flag
d) trap flag
Answer: b
Explanation: If borrow exists in the subtraction operation performed then carry flag is set.
a) memory location
b) register
c) immediate data
Answer: d
Explanation: The source operand is the element which is data or data stored memory location
on which operation is performed.
a) memory location
b) register
c) immediate data
Answer: d
Explanation: Since the destination should be able to store the data, immediate data cannot be
considered as a destination operand.
a) addition
b) subtraction
c) division
d) multiplication
Answer: b
Explanation: For comparison, the instruction CMP subtracts source operand from destination
operand.
a) memory
b) registers
c) stack
d) no where
Answer: d
Explanation: The result of subtraction operation is not stored anywhere during a comparison.
a) AAA
b) AAS
c) AAM
Answer: d
Explanation: All the ASCII adjust instructions give result in unpacked decimal form and so are
called as “Unpacked BCD arithmetic instructions”.
a) ADD
b) ADC
c) AAA
Answer: c
Explanation: AAA is a mnemonic. It doesn’t have either a source or destination operand.
11. The instruction in which adjustment is made before performing the operation is
a) AAA
b) AAS
c) AAM
d) AAD
Answer: d
Explanation: The AAD instruction converts two unpacked BCD digits in AH and AL to the
equivalent binary number in AL. This adjustment must be made before dividing the two
unpacked BCD digits.
Answer: c
Explanation: This instruction performs conversion operation.
13. The instruction that is used to convert the result of the addition of two packed BCD numbers
to a valid BCD number is
a) DAA
b) DAS
c) AAA
d) AAS
Answer: a
Explanation: In this conversion, the result has to be only in AL.
14. The ROR instruction rotates the contents of the destination operand to
a) left
b) right
Answer: b
Explanation: ROR stands for Rotate Right without carry. so, the instruction rotates right.
To practice all areas of Microprocessors for Interviews, here is complete set of 1000+ Multiple
Choice Questions and Answers .
This set of Microprocessors Questions and Answers for Freshers focuses on “Instruction Set of
8086/8088 – 3”.
a) AAA
b) AAS
c) AAM
d) AAD
Answer: d
Explanation: The AAD instruction converts two unpacked BCD digits in AH and AL to the
equivalent binary number in AL.
a) AAA
b) ADC
c) AAM
d) AAD
Answer: d
Explanation: Since the operation, AAD is performed before division operation is performed, the
carry flag, auxiliary flag and overflow flag are undefined.
3. The instruction that performs logical AND operation and the result of the operation is not
available is
a) AAA
b) AND
c) TEST
d) XOR
Answer: c
Explanation: In the TEST instruction, the logical AND operation is performed and the result is
not stored but flags are affected.
4. In the RCL instruction, the contents of the destination operand undergo function as
a) carry flag is pushed into LSB & MSB is pushed into the carry flag
b) carry flag is pushed into MSB & LSB is pushed into the carry flag
c) auxiliary flag is pushed into LSB & MSB is pushed into the carry flag
d) parity flag is pushed into MSB & LSB is pushed into the carry flag
Answer: a
Explanation: In RCL
Rotaterightthroughcarry
, for each operation, the carry flag is pushed into LSB and the MSB of the operand is pushed
into carry flag.
5. The instruction that is used as prefix to an instruction to execute it repeatedly until the CX
register becomes zero is
a) SCAS
b) REP
c) CMPS
d) STOS
Answer: b
Explanation: The instruction to which the REP is prefix, is executed repeatedly until CX register
becomes zero. When CX becomes zero, the execution proceeds to the next instruction in
sequence.
b) A-2,B-1,C-4,D-3
c) A-2,B-3,C-1,D-4
d) A-2,B-3,C-4,D-1
Answer: d
Explanation: By using the string instructions, the operations on strings can be performed.
7. The instructions that are used to call a subroutine from the main program and return to the
main program after execution of called function are
a) CALL, JMP
b) JMP, IRET
c) CALL, RET
d) JMP, RET
Answer: c
Explanation: At each CALL instruction, the IP and CS of the next instruction are pushed onto the
stack, before the control is transferred to the procedure. At the end of the procedure, the RET
instruction must be executed to retrieve the stored contents of IP & CS registers from a stack.
8. The instruction that unconditionally transfers the control of execution to the specified address
is
a) CALL
b) JMP
c) RET
d) IRET
Answer: b
Explanation: In this the control transfers to the address specified in the instruction and flags are
not affected by this instruction.
9. Which instruction cannot force the 8086 processor out of ‘halt’ state?
a) Interrupt request
b) Reset
c) Both interrupt request and reset
d) Hold
Answer: d
Explanation: Only an interrupt request or Reset will force the 8086 processor to come out of the
‘halt’ state.
a) Address
b) Delay
c) Memory location
Answer: b
Explanation: NOP is the No operation. It means that the processor performs no operation for the
clock cycle and thus there exists a delay.
a) HLT
b) CLC
c) LOCK
d) ESC
Answer: b
Explanation: Since CLC is a flag manipulation instruction where CLC stands for Clear Carry
Flag.
To practice all areas of Microprocessors for Freshers, here is complete set of 1000+ Multiple
Choice Questions and Answers .
MCQs
1. The assembler directives which are the hints using some predefined alphabetical strings are
given to
a) processor
b) memory
c) assembler
Answer: c
Explanation: These directives help the assembler to correctly understand the assembly
language programs to prepare the codes.
2. The directive used to inform the assembler, the names of the logical segments to be assumed
for different segments used in the program is
a) ASSUME
b) SEGMENT
c) SHORT
d) DB
Answer: a
Explanation: In ALP, each segment is given a name by using the directive ASSUME
SYNTAX: ASSUME segment:segment_name
Eg: ASSUME CS:Code
here CS is the Code segment and code is the name assumed to the segment.
Answer: d
Explanation: These directives are used for allocating memory locations in the available memory.
4. The directive that marks the end of an assembly language program is
a) ENDS
b) END
Answer: b
Explanation: The directive END is used to denote the completion of the program.
a) ENDS
b) END
Answer: a
Explanation: The directive ENDS is used to end a segment where as the directive END is used
to end the program.
6. The directive that updates the location counter to the next even address while executing a
series of instructions is
a) EVN
b) EVEN
c) EVNE
d) EQU
Answer: b
Explanation: The directive updates location counter to next even address if the current location
counter contents are not even.
7. The directive that directs the assembler to start the memory allotment for a particular
segment/block/code from the declared address is
a) OFFSET
b) LABEL
c) ORG
d) GROUP
Answer: c
Explanation: If an ORG is written then the assembler initiates the location counter to keep the
track of allotted address for the module as mentioned in the directive.
If the directive is not present, then the location counter is initialized to 0000H.
a) SEG
b) SEGMENT
d) PROC
Answer: b
Explanation: The directive SEGMENT indicates the beginning of the segment.
a) ASSUME
b) LOCAL
c) LABEL
d) EQU
Answer: d
Explanation: In this, the recurring/repeating value is assigned with a label. The label is placed
instead of the numerical value in the entire program code.
10. The labels or constants that can be used by any module in the program is possible when
they are declared as
a) PUBLIC
b) LOCAL
c) GLOBAL
Answer: c
Explanation: The labels, constants, variables, procedures declared as GLOBAL can be used by
any module in the program.
To practice all areas of Microprocessors, here is complete set of 1000+ Multiple Choice
Questions and Answers .
This set of Microprocessors Technical Interview Questions & Answers focuses on “Do’s and
Don’ts While Using Instructions”.
a) flowchart
b) algorithm
Answer: c
Explanation: The logic required for implementing a program must be visualized clearly which is
possible by flowchart and algorithm.
a) register, register
Answer: b
Explanation: Only one memory operand can be specified in one instruction.
a) MOV AX, BX
c) MOV 55H, BL
Answer: c
Explanation: 8-bit or 16-bit operand cannot be used as a destination operand.
4. The instruction that is not possible among the following is
Answer: d
Explanation: Both the operands cannot be memory operands.
a) register, register
Answer: c
Explanation: Since destination operand should not be immediate data.
6. The registers that cannot be used as operands for arithmetic and logical instructions are
b) pointers
c) index registers
d) segment registers
Answer: d
Explanation: Segment registers are not allowed as operands for arithmetic and logical
instructions.
a) registers
c) immediate operands
d) memory operands
Answer: b
Explanation: Both the operands should not be immediate operands and memory operands.
To practice all technical interview questions on Microprocessors, here is complete set of 1000+
Multiple Choice Questions and Answers .
MCQs
a) time consuming
c) debugging is difficult
Answer: d
Explanation: The machine level programming is complicated.
a) .ASM file
b) .OBJ file
c) .EXE file
d) .OBJECT file
Answer: b
Explanation: .OBJ file is created with same name as source file and extension .OBJ. It contains
the coded object modules of the program to be assembled.
c) debugging is easy
d) all of the mentioned
Answer: d
Explanation: The assembly level programming is more advantageous than the machine level
programming.
a) .ASP
b) .ALP
c) .ASM
d) .PGM
Answer: c
Explanation: All the files should have the extension, .ASM.
5. The directory that is under work must have the files that are related to
a) Norton’s editor
b) Assembler
c) Linker
Answer: d
Explanation: Before starting the process of entering a small program on PC, ensure that all the
files namely Norton’s editor, assembler, linker and debugger are available in the same directory
in which work is been done.
b) extension .LSF
Answer: d
Explanation: The listing file is automatically generated in the assembly process and is identified
by the entered or source file name and an extension .LST.
7. The extension file that is must for a file to be accepted by the LINK as a valid object file is
a) .OBJ file
b) .EXE file
c) .MASM file
d) DEBUG file
Answer: a
Explanation: The .OBJ extension is a must for a file to be accepted by the LINK as a valid object
file.
Answer: d
Explanation: The listing file contains total offset map of source file including labels, offset
addresses, opcodes, memory allotments for different directives and labels and relocation
information.
a) debugging
b) trouble shooting
Answer: c
Explanation: DEBUG.COM is a DOS utility that facilitates the debugging and trouble shooting.
a) .EXE files
b) .OBJ files
c) .EXE file and .OBJ file
Answer: a
Explanation: The DEBUG may be used either to debug a source program or to observe the
results of execution of an .EXE file.
To practice all areas of Microprocessors, here is complete set of 1000+ Multiple Choice
Questions and Answers .
MCQs
focuses on “Stack”.
a) first-in-first-out
b) first-in-last-out
c) last-in-first-out
d) last-in-last-out
Answer: c
Explanation: The stack follows last-in-first-out sequence.
2. If the processor is executing the main program that calls a subroutine, then after executing
the main program up to the CALL instruction, the control will be transferred to
b) subroutine address
Answer: b
Explanation: Since subroutine is called, to start the execution of the subroutine, the control is
transferred to the subroutine address.
Answer: d
Explanation: Stack is used for temporary storage of contents of registers and memory locations,
status of registers.
a) SP register
b) SS register
c) SP and SS register
Answer: c
Explanation: The stack is accessed using a pointer that is implemented using SP and SS
registers.
5. As the storing of data words onto the stack is increased, the stack pointer is
a) incremented by 1
b) decremented by 1
c) incremented by 2
d) decremented by 2
Answer: d
Explanation: The data is stored from top address of the stack and is decremented by 2.
a) incremented by 1
b) incremented by 2
c) decremented by 1
d) decremented by 2
Answer: b
Explanation: The data in the stack, may again be transferred back from a stack to register. At
that time, the stack pointer is incremented by 2.
7. The process of storing the data in the stack is called ……… the stack.
a) pulling into
b) pulling out
c) pushing into
d) popping into
Answer: c
Explanation: The data is pushed into the stack while loading the stack.
8. The reverse process of transferring the data back from the stack to the CPU register is known
as
Answer: d
Explanation: The data retrieved from stack is called popping off.
a) queue
c) stack
Answer: d
Explanation: If the books are arranged one on the other, then the book that is placed last will be
the first out.
a) data flow
b) data flow and uses queue
c) sequential flow
Answer: d
Explanation: Since PID temperature controller has steps that need to be sequentially executed
such as sampling the output, conversion of a signal with ADC, finding errors, deriving control
signals and applying the control signal to control flow of energy.
To practice all areas of Microprocessors, here is complete set of 1000+ Multiple Choice
Questions and Answers .
MCQs
Answer: c
Explanation: The stack pointer register contains the offset of the address of the stack segment.
Answer: b
Explanation: The stack segment register contains base address of the stack segment in the
memory. The stack pointer register
sP
and stack segment register
SS
together address the stack-top.
3. PUSH operation
a) decrements SP
b) increments SP
c) decrements SS
d) increments SS
Answer: a
Explanation: Each PUSH operation decrements the SP
StackPointer
register.
4. POP operation
a) decrements SP
b) increments SP
c) decrements SS
d) increments SS
Answer: b
Explanation: Each POP operation increments the SP
StackPointer
register.
5. The register or memory location that is pushed into the stack at the end must be
Answer: c
Explanation: The data can be retrieved by POP operation and as in stack, the data that is
pushed at the end must be popped off first.
6. In the instruction, ASSUME CS : CODE, DS : DATA, SS : STACK
Answer: d
Explanation: The directive ASSUME facilitates to name the segments with the desired name
that is not a mnemonic or keyword.
b) only SS is initialised
c) only SP is initialised
Answer: a
Explanation: Though the Stack segment is initialised, the SS and SP pointers must be
initialised.
Answer: c
Explanation: The number of PUSH instructions must be equal to the number of POP
instructions.
a) Arithmetic operations
b) logical operations
c) BCD operations
Answer: d
Explanation: The 8086 microprocessor does not support direct BCD packed operations.
10. For 8086 microprocessor, the stack segment may have a memory block of a maximum of
a) 32K bytes
b) 64K bytes
c) 16K bytes
d) NONE
Answer: b
Explanation: In 8086 microprocessor, the memory segments each have a memory of 64K bytes.
To practice all areas of Microprocessors, here is complete set of 1000+ Multiple Choice
Questions and Answers .
MCQs
Answer: c
Explanation: An interrupt function is to break the sequence of operation.
d) control unit
Answer: a
Explanation: An interrupt transfers the control to interrupt service routine
ISR
. After executing ISR, the control is transferred back again to the main program.
3. While executing the main program, if two or more interrupts occur, then the sequence of
appearance of interrupts is called
a) multi-interrupt
b) nested interrupt
Answer: d
Explanation: If an interrupt occurs while executing a program, and the processor is executing
the interrupt, if one more interrupt occurs again, then it is called a nested interrupt.
4. Whenever a number of devices interrupt a CPU at a time, and if the processor is able to
handle them properly, it is said to have
Answer: c
Explanation: The processor if handles more devices as interrupts then it has multiple interrupt
processing ability.
a) nonmaskable interrupt
b) nonmultiple interrupt
c) nonmovable interrupt
d) none of the mentioned
Answer: a
Explanation: NMI is the acronym for nonmaskable interrupt.
7. If any interrupt request given to an input pin cannot be disabled by any means then the input
pin is called
a) maskable interrupt
b) nonmaskable interrupt
Answer: b
Explanation: A nonmaskable interrupt input pin is one which means that any interrupt request at
NMI
nonmaskableinterrupt
input cannot be masked or disabled by any means.
a) maskable
b) nonmaskable
Answer: a
Explanation: the INTR
interruptrequest
is maskable or can be disabled.
a) direction flag
b) overflow flag
c) interrupt flag
d) sign flag
Answer: c
Explanation: If a microprocessor wants to serve any interrupt then interrupt flag, IF=1. If interrupt
flag, IF=0, then the processor ignores the service.
To practice all areas of Microprocessors, here is complete set of 1000+ Multiple Choice
Questions and Answers .
MCQs
a) internal interrupt
b) external interrupt
c) interrupt
Answer: b
Explanation: If an external device or a signal interrupts the processor from outside then it is an
external interrupt.
a) internal interrupt
b) external interrupt
c) interrupt-in-interrupt
Answer: a
Explanation: The internal interrupt is generated internally by the processor circuit or by the
execution of an interrupt instruction.
b) keyboard interrupt
c) overflow interrupt
d) type2 interrupt
Answer: b
Explanation: Since the keyboard is external to the processor, it is an external interrupt.
b) overflow interrupt
Answer: d
Explanation: Since the interrupts occur within the processor itself, they are called internal
interrupts.
a) NMI
b) TRAP
c) Divide by zero
Answer: d
Explanation: These requests are independent of IF flag.
6. The type of the interrupt may be passed to the interrupt structure of CPU from
b) stack
c) interrupt controller
Answer: c
Explanation: After an interrupt is acknowledged, the CPU computes the vector address from the
type of the interrupt that may be passed to the internal structure of the CPU from an interrupt
controller in case of external interrupts.
7. During the execution of an interrupt, the data pushed into the stack is the content of
a) IP
b) CS
c) PSW
Answer: d
Explanation: The contents of IP, CS and PSW are pushed into the stack during the execution.
8. After every response to the single step interrupt the flag that is cleared is
a) IF
InterruptFlag
b) TF
TrapFlag
c) OF
OverflowFlag
d) None of the mentioned
Answer: b
Explanation: If the trap flag is set then the processor enters the single step execution mode.
After the execution, the trap flag is cleared.
a) END
b) ENDS
c) IRET
d) INTR
Answer: c
Explanation: After the execution of the ISR, the control must go to the previous program
maybemainprogram
which was being executed. To execute it, IRET is placed at the end of ISR.
Answer: a
Explanation: When the instruction IRET is executed, the contents of flags, IP and CS which
were saved at the stack by the CALL instruction are retrieved to the respective registers.
To practice all areas of Microprocessors, here is complete set of 1000+ Multiple Choice
Questions and Answers .
MCQs
INTR
”.
1. The interrupt for which the processor has the highest priority among all the external interrupts
is
a) keyboard interrupt
b) TRAP
c) NMI
d) INT
Answer: c
Explanation: The Non-Maskable Interrupt input pin has the highest priority among all the
external interrupts.
2. The interrupt for which the processor has highest priority among all the internal interrupts is
a) keyboard interrupt
b) TRAP
c) NMI
d) INT
Answer: b
Explanation: TRAP is the internal interrupt that has highest priority among all the interrupts
except the Divide By Zero
Type0
exception.
3. In case of string instructions, the NMI interrupt will be served only after
a) initialisation of string
Answer: c
Explanation: When NMI is activated, the current instruction being executed is completed and
then NMI is served. In the case of string instructions, it is served after the complete string is
manipulated.
b) 3 clock cycles
c) 1 clock cycle
d) 2 clock cycles
Answer: d
Explanation: The NMI pin should remain high for atleast 2 clock cycles and need not be
synchronized with the clock for being sensed.
a) TRAP flag
b) INTERRUPT flag
c) MASK flag
d) DIRECTION flag
Answer: b
Explanation: The INTR signal can be masked by resetting the interrupt flag.
6. For the INTR signal, to be responded to in the next instruction cycle, it must go ________ in
the last clock cycle of the current instruction
a) high
b) low
c) high or low
d) unchanged
Answer: a
Explanation: The INTR signal must go high in the clock cycle of the current instruction in order
to respond in the next instruction cycle.
Answer: d
Explanation: At the end of each instruction, the status of the pending interrupts is checked.
a) set
b) reset
c) high
d) low
Answer: b
Explanation: The IF is automatically reset when the processor responds to an INTR signal. If the
processor wants to respond to any type of INTR signal further then, the IF should again be set.
activelowbased
is low at the trailing edge of the first ALE pulse, then till the start of the next machine cycle, the
pin LOCK
activelow
is
a) low
b) high
c) low or high
Answer: a
Explanation: The pin LOCK
activelow
remains low till the start of the next machine cycle.
activelow
, the INTA
activelow
a) 0 clock cycle
b) 1 clock cycle
c) 2 clock cycles
d) 3 clock cycles
Answer: c
Explanation: The INTA
activelow
goes low and remains low for two clock cycles before returning back to the high state.
To practice all areas of Microprocessors, here is complete set of 1000+ Multiple Choice
Questions and Answers .
This set of Microprocessors Interview Questions and Answers for freshers focuses on “Interrupt
Programming, Passing Parameters to Procedures, Handling Programs of Size More Than
64KB”.
Answer: a
Explanation: For both software and hardware, the method of defining the interrupt service
routine is the same.
2. While programming for any type of interrupt, the interrupt vector table is set
a) externally
b) through a program
Answer: c
Explanation: The programmer must, either externally or through the program, set the interrupt
vector table for that type preferably with the CS and IP addresses of the interrupt service
routine.
Answer: d
Explanation: To execute a program, first assemble it, link it and then execute it. After execution,
a new file RESULT is created in the directory. Then external pulse is applied to IRQ2 pin, and
this will again cause the execution of ISR into the file.
a) macros
b) segment
c) subroutines
d) none
Answer: c
Explanation: Procedures are also known as subroutines.
a) input data
b) output data
c) constants
Answer: d
Explanation: Procedures require input data or constants for their execution. Their data or
constants may be passed to the subroutine by the main program.
6. The technique that is used to pass the data or parameter to procedures in assembly
language program is by using
b) registers
c) stack
Answer: d
Explanation: The techniques that are used to pass the data or parameter to procedures are by
using global declared variable, registers of CPU, memory locations, stack, PUBLIC & EXTRN.
c) it uses stack
Answer: a
Explanation: If a procedure is interactive, then it accepts the inputs directly from input devices.
8. For passing the parameters to procedures using the PUBLIC & EXTRN directives, it must be
declared PUBLIC in the
a) subroutine
b) procedure
c) main routine
Answer: c
Explanation: For passing the parameters to procedures, it must be declared PUBLIC in the main
routine and the same should be declared EXTRN in the procedure.
9. The technique to estimate the size of an executable program, before it is assembled and
linked is
c) stack
d) none
Answer: d
Explanation: There is no technique to estimate the size of an executable program before it is
assembled and linked.
10. To estimate the size of an executable program before it is assembled and linked, the
programming methodology concerned is by writing
a) programs with more than one segment for data and code
Answer: d
Explanation: By writing programs with more than one segment for data, code or stack or by
writing programs with FAR subroutines each of size 64KB, the size of an executable program
can be estimated.
To practice all areas of Microprocessors for Interviews, here is complete set of 1000+ Multiple
Choice Questions and Answers .
MCQs
focuses on “Macros”.
1. If a number of instructions are repeating through the main program, then to reduce the length
of the program, __________ is used.
a) procedure
b) subroutine
c) macro
Answer: c
Explanation: For a certain number of instructions that are repeated in the main program, when
macro is defined then the code of a program is reduced by placing the name of the macro at
which the set of instructions are needed to be repeated.
a) initialising macro
d) defining a macro
Answer: d
Explanation: The process of assigning a label to the string is called defining a macro.
a) macro-within-macro
b) nested macro
c) macro-in-macro
Answer: b
Explanation: A macro may be called from inside a macro. This type of macro is called nested
macro.
a) beginning of a program
b) end of a program
d) anywhere in a program
Answer: d
Explanation: A macro can be defined anywhere in a program.
a) in data segment
b) to represent directives
c) to represent statements
Answer: d
Explanation: A macro may be used in data segment and can also be used to represent
statements and directives.
a) END
b) ENDS
c) ENDM
d) ENDD
Answer: c
Explanation: The ENDM directive marks the end of the instructions or statements sequence
assigned with the macro name.
7. Inserting the statements and instructions represented by macro, directly at the place of the
macroname, in the program, is known as
a) calling a macro
b) inserting a macro
c) initializing a macro
Answer: a
Explanation: Inserting the statements and instructions at the place of macroname, in the
program, is known as calling a macro.
8. The time required for execution of a macro is ________ that of the procedure.
a) greater than
b) less than
c) equal to
a) complete code of instruction string is inserted at each place, wherever the macroname
appears
Answer: c
Explanation: Macro does not require stack memory and hence has less time for execution.
a) START
b) BEGIN
c) MACRO
Answer: c
Explanation: The beginning of the macro is represented as macroname followed by the directive
MACRO.
SYNTAX: macroname MACRO
EXAMPLE: STRINGS MACRO.
To practice all areas of Microprocessors, here is complete set of 1000+ Multiple Choice
Questions and Answers .
MCQs
1. If ‘n’ denotes the number of clock cycles and ‘T’ denotes period of the clock at which the
microprocessor is running, then the duration of execution of loop once can be denoted by
a) n+T
b) n-T
c) n*T
d) n/T
Answer: c
Explanation: The duration of execution of the loop is the product of number of clock cycles and
the period of the clock cycle at which microprocessor is running.
a) stack
b) loop count
c) program counter
d) time duration
Answer: b
Explanation: As the microprocessor executes each instruction corresponding loop counter value
decreases and the microprocessor executes the instructions till the loop counter becomes zero.
3. In case of subroutines, the actual number of instructions executed by the processor depends
on
a) loop count
c) length of procedure
d) none
Answer: c
Explanation: In case of subroutines or interrupt service routines, the number of instructions
executed by the processor depends on the length of procedure
orsubroutine
or length of interrupt service routine along with the main calling program.
Answer: d
Explanation: The delays can be generated step wise.
Answer: a
Explanation: The count N can be defined as the required time delay by the duration for
execution of the loop once.
Count, N = required delay
Td
/duration for execution of the loop once
n∗T
.
if the zeroth condition is satisfied then, for execution, the JNZ instruction takes
a) 1 clock cycle
b) 2 clock cycles
c) 3 clock cycles
d) 4 clock cycles
Answer: d
Explanation: The JNZ instruction takes only 4 clock cycles if the zeroth condition is satisfied.
7. In the instruction set,
if the zeroth condition is not satisfied, then the JNZ instruction takes
a) 2 clock cycles
b) 8 clock cycles
c) 16 clock cycles
d) 64 clock cycles
Answer: c
Explanation: The JNZ instruction takes 16 clock cycles if the zeroth condition is not satisfied.
a) memory usage
Answer: d
Explanation: The maximum count value of 16-bit count register is FFFFH. This may put the
limitation on the maximum delay that can be generated using the instructions.
Answer: a
Explanation: One or more count registers can be used to serve large delays.
To practice all areas of Microprocessors, here is complete set of 1000+ Multiple Choice
Questions and Answers .
MCQs
a) one dimensional
b) two dimensional
c) three dimensional
d) none
Answer: b
Explanation: The semiconductor memories are organised as two dimensions of an array which
consists of rows and columns.
2. If a location is selected, then all the bits in it are accessible using a group of conductors called
a) control bus
b) address bus
c) data bus
Answer: c
Explanation: The bits in a selected location are accessible using data bus.
3. To address a memory location out of N memory locations, the number of address lines
required is
a) log N
tothebase2
b) log N
tothebase10
c) log N
tothebasee
d) log
2N
tothebasee
Answer: a
Explanation: For n memory locations, log n
tothebaseof2
address lines are required. For addressing 4K bytes of memory, 12 address lines are required
since log
4KB
=log
4∗1024
=log(2 12 )=12.
4. If the microprocessor has 10 address lines, then the number of memory locations it is able to
address is
a) 512
b) 1024
c) 2048
d) none
Answer: b
Explanation: Since for n address lines, the number of memory locations able to address is 2^n.
5. In static memory, the upper 8-bit bank of an available 16-bit memory chip is called
Answer: d
Explanation: In static memory, the upper 8-bit bank is called odd address memory bank.
6. In static memory, the lower 8-bit bank of an available 16-bit memory chip is called
Answer: b
Explanation: In static memory, the lower 8-bit bank is called even address memory bank.
7. In most of the cases, the method used for decoding that may be used to minimise the
required hardware is
a) absolute decoding
b) non-linear decoding
c) linear decoding
d) none
Answer: c
Explanation: In general, linear decoding is used to minimise the required hardware.
8. To obtain 16-bit data bus width, the two 4K*8 chips of RAM and ROM are arranged in
a) parallel
b) serial
c) both serial and parallel
Answer: a
Explanation: The two 4K*8 chips of RAM and ROM are arranged in parallel.
9. If
addressline
Answer: c
Explanation: If Ao=0 then address is even and is in RAM. If Ao=1 then, address is odd and is in
RAM.
activelow
selected will be
a) RAM
b) ROM
d) ONLY RAM
Answer: c
Explanation: If at a time Ao and BHE
activelow
both are zero, then both RAM and ROM are selected.
To practice all areas of Microprocessors, here is complete set of 1000+ Multiple Choice
Questions and Answers .
MCQs
b) low cost
Answer: d
Explanation: The dynamic RAM is advantageous than the static RAM as it has a higher packing
density, lower cost and less power consumption.
a) Static RAM
b) Dynamic RAM
d) ROM
Answer: b
Explanation: Dynamic RAM is preferred for large memory.
3. If a typical static RAM cell requires 6 transistors then corresponding dynamic RAM requires
Answer: a
Explanation: The hardware complexity of dynamic RAM is lesser than that of static RAM.
4. To store the charge as a representation of data, the basic dynamic RAM cell uses
a) resistor
b) capacitor
c) diode
d) transistor
Answer: c
Explanation: The basic dynamic RAM cell uses capacitance to store the charge as a
representation of data. This capacitor is manufactured as a diode that is reverse biased so that
the storage capacitance is obtained.
5. The process of refreshing the data in the RAM to reduce the possibility of data loss is known
as
a) data cycle
b) regain cycle
c) retain cycle
d) refresh cycle
Answer: d
Explanation: The data storage in RAM which is capacitance
reverse−biaseddiode
may have a leakage current that tends to discharge the capacitor giving rise to possibility of
data loss. To avoid this, the data must be refreshed after a fixed time interval regularly.
6. The field in which dynamic RAM is more complicated than static RAM is
a) complexity
b) interfacing circuit
c) execution unit
d) cost
Answer: b
Explanation: The refresh mechanism and the additional hardware required makes the
interfacing circuit of dynamic RAM more complicated than that of static RAM.
7. Memory refresh activity is
a) initialised by processor
Answer: c
Explanation: The refresh operation is independent regular activity that is initialised and carried
out by the refresh mechanism.
8. The number of memory chips that are enabled at a time for refresh activity is
a) 2
b) 4
c) 8
d) more than 1
Answer: d
Explanation: More than one memory chip can be enabled at a time to refresh activity to reduce
the number of total memory refresh cycles.
9. A timer that derives pulse for refreshing action or time for which a dynamic RAM cell can hold
data charge level practically constant is
a) constant timer
c) refresh timer
d) qualitative timer
Answer: c
Explanation: Refresh timer derives a pulse for refreshing action after each refresh interval which
can be qualitatively defined as the time for which a dynamic RAM cell can hold data charge
level practically constant.
10. If ‘n’ denotes the number of rows that are to be refreshed in a single refresh interval, ‘td’
denotes the range of time it may take then, refresh time
tr
can be defined as
a) n*td
b) td/n
c) n/td
d) td n
Answer: b
Explanation: Refresh time is the ratio of time duration taken for refreshing to the number of rows
that are refreshed. Refresh frequency is the reciprocal of refresh time.
To practice all areas of Microprocessors, here is complete set of 1000+ Multiple Choice
Questions and Answers .
MCQs
1. The device that enables the microprocessor to read data from the external devices is
a) printer
b) joystick
c) display
d) reader
Answer: b
Explanation: Since joystick is an input device, it reads data from the external devices.
a) CRT display
b) 7-segment display
c) Printer
Answer: d
Explanation: The output device transfers data from the microprocessor to the external devices.
3. The input and output operations are respectively similar to the operations,
a) read, read
b) write, write
c) read, write
d) write, read
Answer: c
Explanation: The input activity is similar to read operation and the output activity is similar to
write operation.
activelow
performs
Answer: b
Explanation: IOWR
activelow
operation means writing data to an output device and not an input device.
Answer: c
Explanation: If the output port is to source large currents, the port lines must be buffered. So,
the latch is used as it acts as a good output port.
6. While performing read operation, one must take care that much current should not be
Answer: c
Explanation: More current should not be sourced or sinked from data lines while reading to
avoid loading.
a) latch
b) flipflop
c) buffer
d) tristate buffer
Answer: d
Explanation: A tristate buffer is used as an input device to overcome loading.
a) bidirectional buffer
Answer: d
Explanation: The chip 74LS245 is a bidirectional buffer that contains 8 buffers and may be used
as an 8-bit input port. But while using as an input device, only one direction is useful.
a) inputs to outputs
b) outputs to inputs
c) source to sink
d) sink to source
Answer: a
Explanation: If DIR is 1, then the direction is from A
inputs
to B
outputs
.
b) memory locations
Answer: b
Explanation: In memory-mapped scheme, the devices are viewed as memory locations and are
addressed likewise.
To practice all areas of Microprocessors, here is complete set of 1000+ Multiple Choice
Questions and Answers .
MCQs
ProgrammableInput–OutputPort
”.
Answer: b
Explanation: The parallel input-output port chip 8255 is also known as programmable peripheral
input-output port.
a) input port
b) output port
Answer: c
Explanation: Port C can function independently either as input or as output ports.
3. All the functions of the ports of 8255 are achieved by programming the bits of an internal
register called
Answer: c
Explanation: By programming the bits of control word register, the operations of the ports are
specified.
c) data bus
Answer: b
Explanation: The data bus buffer is controlled by read/write control logic.
b) A1
c) WR
ACTIVELOW
Answer: d
Explanation: RD
ACTIVELOW
, WR
ACTIVELOW
, A1, A0, RESET are the inputs provided by the microprocessor to the read/write control logic of
8255.
6. The device that receives or transmits data upon the execution of input or output instructions
by the microprocessor is
Answer: c
Explanation: 3-state bidirectional buffer is used to receives or transmits data upon the execution
of input or output instructions by the microprocessor.
7. The port that is used for the generation of handshake lines in mode 1 or mode 2 is
a) port A
b) port B
c) port C Lower
d) port C Upper
Answer: d
Explanation: Port C upper is used for the generation of handshake lines in mode 1 or mode 2.
8. If A1=0, A0=1 then the input read cycle is performed from
Answer: b
Explanation: If A1=0, A0=1 then the input read cycle is performed from port B to data bus.
a) CS
activelow
=1
b) CS
activelow
=0
c) CS
activelow
= 0, RD
activelow
= 1, WR
activelow
=1
d) CS
activelow
= 1 OR CS
activelow
= 0, RD
activelow
= 1, WR
activelow
=1
Answer: d
Explanation: The data bus is tristated when chip select pin=1 or chip select pin=0 and read and
write signals are high i.e 1.
10. The pin that clears the control word register of 8255 when enabled is
a) CLEAR
b) SET
c) RESET
d) CLK
Answer: c
Explanation: If reset pin is enabled then the control word register is cleared.
To practice all areas of Microprocessors, here is complete set of 1000+ Multiple Choice
Questions and Answers .
MCQs
a) reset pins
b) set pins
Answer: c
Explanation: In BSR
BitSet−Reset
Mode, port C can be used to set and reset its individual port bits.
Answer: d
Explanation: In mode 0, any port can be used as input or output and output ports are latched.
a) mode 0
b) mode 1
c) mode 2
d) none
Answer: b
Explanation: In this mode, the handshaking signals control the input or output action of the
specified port.
Answer: a
Explanation: If the value of the pin STB
StrobeInput
falls to low level, the input port is loaded into input latches.
6. The signal, SLCT in the direction of signal flow, OUT, indicates the selection of
b) CPU
c) Printer
d) Ports
Answer: c
Explanation: This signal indicates that the printer is selected.
7. The pulse width of the signal INIT at the receiving terminal must be more than
a) 10 microseconds
b) 20 microseconds
c) 40 microseconds
d) 50 microseconds
Answer: d
Explanation: The pulse width of the signal must be more than 50microseconds at the receiving
terminal.
activelow
becomes ‘low’ when the printer is in
b) Offline state
c) Error state
Answer: d
Explanation: The level of the signal ERROR
activelow
becomes ‘low’ when the printer is in the Paper end state, Offline state and Error state.
9. The signals that are provided to maintain proper data flow and synchronization between the
data transmitter and receiver are
a) handshaking signals
b) control signals
c) input signals
d) none
Answer: a
Explanation: Handshaking signals maintain proper data flow and synchronization.
Answer: d
Explanation: In mode 2 of 8255, a single 8-bit port is available i.e group A.
To practice all areas of Microprocessors, here is complete set of 1000+ Multiple Choice
Questions and Answers .
This set of Microprocessors Puzzles focuses on “Interfacing Analog to Digital Data Converters”.
1. The time taken by the ADC from the active edge of SOC
startofconversion
endofconversion
signal is called
a) edge time
b) conversion time
c) conversion delay
d) time delay
Answer: c
Explanation: Broadly speaking, the time taken by the converter to calculate the equivalent digital
data output from the moment of the start of conversion is called conversion delay.
a) successive approximation
d) none
Answer: c
Explanation: Successive approximation and dual slope integration are the most popular
techniques that are used in the integrated ADC chips.
Answer: d
Explanation: The general algorithm for interfacing ADC contains ensuring the stability of analog
input, issuing start of conversion pulse to ADC, reading end of conversion signal to mark the
end of a conversion process, reading digital data output of ADC as equivalent digital output.
a) AD 7523
b) 74373
c) 74245
d) ICL7109
Answer: d
Explanation: AD 7523 is a DAC
Digitaltoanalogconverter
, 74373 is a latch, 74245 is transceiver and ICL7109 is an ADC.
a) 100 milliseconds
b) 100 microseconds
c) 50 milliseconds
d) 50 milliseconds
Answer: b
Explanation: The conversion delay is 100microseconds which is low as compared to other
converters.
6. The number of inputs that can be connected at a time to an ADC that is integrated with
successive approximation is
a) 4
b) 2
c) 8
d) 16
Answer: c
Explanation: As these converters internally have 3:8 analog multiplexer, at a time 8 different
analog inputs can be connected to the chip.
7. ADC 7109 integrated by Dual slope integration technique is used for
c) low complexity
Answer: d
Explanation: Compared to other 12-bit ADCs, it is of very low cost and useful for slow practical
applications.
8. Which of the following is not one of the phases of the total conversion cycle?
a) autozero phase
b) conversion phase
d) disintegrate phase
Answer: b
Explanation: Autozero phase, signal integrate phase and disintegrate phase are the three
phases of total conversion cycle.
a) autozero phase
c) disintegrate phase
d) none
Answer: a
Explanation: A feedback loop is closed around the system to charge the autozero capacitor to
compensate for the offset voltages in the buffer amplifier, integrator and comparator.
10. In the signal integrate phase, the differential input voltage between IN LO
inputlow
and IN HI
inputhigh
Answer: c
Explanation: The internal integrator needs 2048 clock cycles to integrate voltage difference
between input low and input high.
To practice all Puzzles on Microprocessors, here is complete set of 1000+ Multiple Choice
Questions and Answers .
This set of Microprocessors Questions and Answers for Experienced people focuses on
“Interfacing Digital to Analog Converters, Stepper Motor Interfacing and Control of High Power
Devices Using 8255”.
1. DAC
DigitaltoAnalogConverter
finds application in
Answer: d
Explanation: DAC is used in digitally controlled gains, motor speed controls and programmable
gain amplifiers.
2. To save the DAC from negative transients the device connected between OUT1 and OUT2 of
AD 7523 is
b) Zener
c) FET
d) BJT
BipolarJunctiontransistor
Answer: b
Explanation: Zener is connected between OUT1 and OUT2 pins of AD7523 to save from
negative transients.
c) as current-to-voltage converter
Answer: d
Explanation: An operational amplifier is used as a current-to-voltage converter to convert the
current output to output voltage and also provides additional driving capability to the DAC.
a) 100 milliseconds
b) 100 microseconds
c) 50 milliseconds
d) 50 microseconds
Answer: a
Explanation: DAC 0800 has a settling time of 100 milliseconds.
5. The device that is used to obtain an accurate position control of rotating shafts in terms of
steps is
a) DC motor
b) AC motor
c) Stepper motor
d) Servo motor
Answer: c
Explanation: Stepper motor employs rotation of its shaft in terms of steps, rather than
continuous rotation as in case of AC or DC motors.
a) 1 winding
b) 2 windings
c) 3 windings
d) 4 windings
Answer: d
Explanation: The internal schematic of a typical stepper motor has 4 windings.
7. The number of pulses required for one complete rotation of the shaft of the stepper motor is
equal to the
Answer: a
Explanation: The number of pulses required for one complete rotation of the shaft of the stepper
motor is equal to the number of internal teeth on its rotor.
a) rotating scheme
b) shaft scheme
c) wave scheme
d) none
Answer: c
Explanation: In this scheme, the windings are applied with the required voltage pulses, in a
cyclic fashion.
9. The firing angles of thyristors are controlled by
b) relaxation oscillators
c) microprocessor
Answer: d
Explanation: In early days, the firing angles were controlled by a pulse generating circuits like
relaxation oscillators and now, they are accurately fired using a microprocessor.
b) isolation
d) none
Answer: c
Explanation: Any switching component of a high power circuit may be sufficient to damage the
microprocessor system. So, to protect the low power circuit isolation transformers are used.
They are also used if isolation is necessary.
To practice all areas of Microprocessors for Experienced people, here is complete set of 1000+
Multiple Choice Questions and Answers .
MCQs
1. The number of counters that are present in the programmable timer device 8254 is
a) 1
b) 2
c) 3
d) 4
Answer: c
Explanation: There are three counters that can be used as either counters or delay generators.
a) read operation
b) write operation
d) none
Answer: b
Explanation: The control word register can only be written and cannot be read.
3. The mode that is used to interrupt the processor by setting a suitable terminal count is
a) mode 0
b) mode 1
c) mode 2
d) mode 3
Answer: a
Explanation: Mode 0 is also called as an interrupt on the terminal count.
N−1
a) 1 clockcycle
b) 2 clockcycles
c) 3 clockcycles
d) 4 clockcycles
Answer: a
Explanation: After
N−1
cycles, the output becomes low for only 1 clockcycle. If the count N is reloaded and again the
output becomes high and remains so for
N−1
clock pulses.
a) mode 1
b) mode 2
c) mode 3
d) mode 4
Answer: c
Explanation: When the count N loaded is even, then for half of the count, the output remains
high and for the remaining half it remains low. If the count loaded is odd, the first clock pulse
decrements it by 1 resulting in an even count value.
6. In control word register, if SC1=0 and SC0=1, then the counter selected is
a) counter 0
b) counter 1
c) counter 2
d) none
Answer: b
Explanation: SC denotes select counter.
Answer: c
Explanation: To access 16 bit, first LSB is loaded first, and then MSB.
a) decimal count
b) hexadecimal count
c) binary count
d) octal count
Answer: b
Explanation: If BCD=0 then hexadecimal count. If BCD=1, then the operation is BCD count.
Answer: b
Explanation: If the GATE signal is enabled, then the counter starts counting.
b) selection of counters
Answer: d
Explanation: The control word register contents are used for
i) initializing the operating modes
mode0−mode4
a) 1
b) 3
c) 5
d) 7
Answer: c
Explanation: The processor 8085 has five hardware interrupt pins. Out of these five, four pins
were alloted fixed vector addresses but the pin INTR was not alloted by vector address, rather
an external device was supposed to hand over the type of the interrupt to the microprocessor.
2. The register that stores all the interrupt requests in it in order to serve them one by one on a
priority basis is
b) In-Service Register
c) Priority resolver
Answer: a
Explanation: The interrupts at IRQ input lines are handled by Interrupt Request Register
internally.
3. The register that stores the bits required to mask the interrupt inputs is
a) In-service register
b) Priority resolver
d) None
Answer: c
Explanation: Also, Interrupt Mask Register operates on IRR
InterruptRequestRegister
at the direction of the Priority Resolver.
a) manages interrupts
Answer: d
Explanation: The interrupt control logic performs all the operations that are involved within the
interrupts like accepting and managing interrupt acknowledge signals, interrupts.
a) 4
b) 8
c) 16
d) 64
Answer: d
Explanation: A single 8259A provides 8 vectored interrupts. In cascade mode, 64 vectored
interrupts can be provided.
6. When the PS
activelow
/EN
activelow
b) buffer enable
c) buffer disable
d) none
Answer: b
Explanation: When the pin is used in buffered mode, then it can be used as a buffer enable to
control buffer transreceivers. If it is not used in buffered mode, then the pin is used as input to
designate whether the chip is used as a master or a slave.
b) IMR is cleared
Answer: d
Explanation: The initialization procedure involves
i) edge sense circuit is reset.
ii) IMR is cleared.
iii) IR7 input is assigned the lowest priority.
iv) slave mode address is set to 7
v) special mask mode is cleared and the status read is set to IRR.
Answer: b
Explanation: When non-specific EOI command is issued to 8259A it will automatically reset the
highest ISR.
9. In the application where all the interrupting devices are of equal priority, the mode used is
a) Automatic rotation
c) Specific rotation
d) EOI
Answer: a
Explanation: The automatic rotation is used in the applications where all the interrupting devices
are of equal priority.
To practice all areas of Microprocessors, here is complete set of 1000+ Multiple Choice
Questions and Answers .
MCQs
1. The registers that store the keyboard and display modes and operations programmed by
CPU are
c) Return buffers
Answer: b
Explanation: The control and timing register to store the keyboard and display modes and other
operations programmed by CPU.
a) keyboard mode
Answer: c
Explanation: In this mode, each key code of the pressed key is entered in the order of the entry,
and in the meantime, read by the CPU, till the RAM becomes empty.
3. The registers that hold the address of the word currently being written by the CPU from the
display RAM are
Answer: d
Explanation: The display address registers holds the address of the word currently being written
or read by the CPU to or from the display RAM.
Answer: c
Explanation: In scanned keyboard mode with 2 key lockout mode of operation, when a key is
pressed, a debounce logic comes into operation. During the next two scans, other keys are
checked for closure and if no other key is pressed then the first pressed key is identified.
5. The mode that is programmed using “end interrupt/error mode set command” is
Answer: a
Explanation: The scanned keyboard special error mode is programmed using end interrupt/error
mode set command. This mode is valid only under the N-key rollover mode.
6. When a key is pressed, the debounce circuit waits for 2 keyboard scans and then checks
whether the key is still depressed in
7. The data that is entered from the left side of the display unit is of
d) none
Answer: a
Explanation: The data that is entered from the left side of the display unit is of left entry mode,
as in a type-writer the first character typed appears at the left-most position, while the
subsequent characters appear successively to the right of the first one.
a) keyboard mode
Answer: c
Explanation: Overrun error occurs when an already full FIFO has attempted an entry. Underrun
error occurs when an empty FIFO read is attempted.
9. The flag that increments automatically after each read or write operation to the display RAM
is
a) IF
b) RF
c) AI
d) WF
Answer: c
Explanation: AI refers to auto increment flag.
10. If any change in sensor value is detected at the end of a sensor matrix scan, then the IRQ
line
a) goes low
b) goes high
c) remains unchanged
d) none
Answer: b
Explanation: In sensor matrix mode, the IRQ line goes high, if any change in sensor value is
detected at the end of a sensor matrix scan or the sensor RAM has a previous entry to be read
by the CPU.
To practice all areas of Microprocessors, here is complete set of 1000+ Multiple Choice
Questions and Answers .
MCQs
a) simplex
b) duplex
c) semi duplex
d) half duplex
Answer: c
Explanation: Basically, there are three modes of data transmission. simplex, duplex and half
duplex.
2. If the data is transmitted only in one direction over a single communication channel, then it is
of
a) simplex mode
b) duplex mode
Answer: a
Explanation: In simplex mode, the data transmission is unidirectional. For example, a CPU may
transmit data for a CRT display unit in this mode.
3. If the data transmission takes place in either direction, but at a time data may be transmitted
only in one direction then, it is of
a) simplex mode
b) duplex mode
Answer: d
Explanation: In half duplex mode, data transmission is bidirectional but not at a time. For
example, Walkie-Talkie.
4. In 8251A, the pin that controls the rate at which the character is to be transmitted is
a) TXC
activelow
b) TXC
activehigh
c) TXD
activelow
d) RXC
activelow
Answer: a
Explanation: Transmitter Clock Input
TXC(activelow
) is a pin that controls the rate at which the character is to be transmitted.
5. TXD
TransmittedDataOutput
pin carries serial stream of the transmitted data bits along with
a) start bit
b) stop bit
c) parity bit
Answer: d
Explanation: Transmitted Data Output pin carries a serial stream of the transmitted data bits
along with other information like start bits, stop bits and parity bits etc.
6. The signal that may be used either to interrupt the CPU or polled by the CPU is
a) TXRDY
Transmitterready
b) RXRDY
Receiverreadyoutput
c) DSR
activelow
d) DTR
activelow
Answer: b
Explanation: RXRDY
Receiverreadyoutput
may be used either to interrupt the CPU or polled by the CPU.
Answer: d
Explanation: RS232C has been used for long and has a few disadvantages like limited speed of
communication, high-voltage level signaling and big-size communication adapters.
Answer: d
Explanation: The USB standards support the signaling rates. Also, USB signaling is
implemented in a differential in low- and full-speed options.
9. The bit packet that commands the device either to receive data or transmit data in
transmission of USB asynchronous communication is
a) Handshake packet
b) Token packet
c) PRE packet
d) Data packet
Answer: b
Explanation: The token packet is the second type of packet which commands the device either
to receive data or transmit data.
a) Handshake packet
b) Token packet
c) PRE packet
d) Data packet
Answer: c
Explanation: PRE packets are only of importance to low-speed USB devices.
To practice all areas of Microprocessors, here is complete set of 1000+ Multiple Choice
Questions and Answers .
MCQs
a) directly
b) indirectly
Answer: a
Explanation: In direct memory access mode, the data may transfer directly without the
interference from the CPU.
2. In 8257
DMA
Answer: b
Explanation: The DMA supports four channels, and each of the channels has a pair of two 16-bit
registers, namely DMA address register and a terminal count register.
Answer: c
Explanation: The two common registers for all the four channels of DMA are mode set register
and status register.
4. In 8257 register format, the selected channel is disabled after the terminal count condition is
reached when
Answer: d
Explanation: If the TC STOP bit is set, the selected channel is disabled after the terminal count
condition is reached, and it further prevents any DMA cycle on the channel.
5. The IOR
activelow
b) master mode
Answer: b
Explanation: The IOR
activelow
is an active low bidirectional tristate input line, that acts as input in the slave mode, and acts as
output in the master mode. In master mode, this signal is used to read data from a peripheral
during a memory write cycle.
6. The IOW
activelow
Answer: d
Explanation: In its slave mode, the IOW
activelow
loads the contents of a data bus to 8-bit mode register, upper/lower byte of 16-bit DMA address
register or terminal count register.
7. The pin that disables all the DMA channels by clearing the mode registers is
a) MARK
b) CLEAR
c) RESET
d) READY
Answer: c
Explanation: The RESET pin which is asynchronous input disables all the DMA channels by
clearing the mode registers, and tristate all the control lines.
a) HLDA
b) HRQ
c) ADSTB
Answer: b
Explanation: The hold request output requests the access of the system bus.
9. The pin that is used to write data to the addressed memory location, during DMA write
operation is
a) MEMR
activelow
b) AEN
c) MEMW
activelow
d) IOW
activelow
Answer: c
Explanation: The MEMW
activelow
is used to write data to the addressed memory location, during DMA write operation.
10. The pin that strobes the higher byte of the memory address, generated by the DMA
controller into the latches is
a) AEN
b) ADSTB
c) TC
Answer: b
Explanation: The pin ADSTB strobes the higher byte of the memory address, generated by the
DMA controller into the latches.
To practice all areas of Microprocessors, here is complete set of 1000+ Multiple Choice
Questions and Answers .
MCQs
b) write operation
c) read operation
Answer: d
Explanation: The 8257 can accomplish three types of operations and they are
i) verify DMA operation
ii) write operation
iii) read operation.
2. The bus is available when the DMA controller receives the signal
a) HRQ
b) HLDA
c) DACK
Answer: b
Explanation: If the HLDA signal is received by the DMA controller, it indicates that the bus is
available.
3. To indicate the I/O device that its request for the DMA transfer has been honored by the CPU,
the DMA controller pulls
a) HLDA signal
b) HRQ signal
c) DACK
activelow
d) DACK
activehigh
Answer: c
Explanation: The DACK
activelow
line of the used channel is pulled down by the DMA controller to indicate the I/O device that its
request for the DMA transfer has been honored by the CPU.
4. If more than one channel requests service simultaneously, the transfer will occur as
a) multi transfer
b) simultaneous transfer
c) burst transfer
Answer: c
Explanation: If more than one channel requests service simultaneously, then the transfer occurs
as a burst or continuous transfer.
5. The continuous transfer may be interrupted by an external device by pulling down the signal
a) HRQ
b) DACK
activelow
c) DACK
activehigh
d) HLDA
Answer: d
Explanation: The burst or continuous transfer may be interrupted by an external device by
pulling down the HLDA line.
a) 2
b) 4
c) 8
Answer: b
Explanation: The 8257 uses four clock cycles to complete a transfer.
7. In 8257, if each device connected to a channel is assigned to a fixed priority then it is said to
be in
Answer: b
Explanation: In this scheme, the DRQ3 has the lowest priority followed by DRQ2 and DRQ1.
The DRQ0 has the highest priority.
Answer: a
Explanation: In this scheme, the priorities assigned to the channels are not fixed.
d) Status register
Answer: c
Explanation: The selected register may be read or written depending on the instruction executed
by the CPU. But only write operation can be performed on the mode set register.
a) write operation
b) read operation
Answer: b
Explanation: The status register can only be read.
To practice all areas of Microprocessors, here is complete set of 1000+ Multiple Choice
Questions and Answers .
MCQs
1. The block of 8237 that decodes the various commands given to the 8237 by the CPU is
c) priority block
Answer: b
Explanation: The program control block decodes various commands given to the 8237 by the
CPU before servicing a DMA request.
2. The priority between the DMA channels requesting the services can be resolved by
c) priority block
Answer: c
Explanation: The priority encoder block resolves the priority between the DMA channels
requesting the services.
d) command register
Answer: b
Explanation: The current address register holds the current memory address. The current
address register is accessed during the DMA transfer.
4. The register that holds the data byte transfers to be carried out is
d) command register
Answer: a
Explanation: The current word register is a 16-bit register that holds the data transfers. The
word count is decremented after each transfer, and the new value is stored again in the register.
5. When the count becomes zero in the current word register then
c) EOP
endofprocess
is generated
Answer: c
Explanation: When the count becomes zero, the EOP signal is generated. This can be written in
successive bytes by the CPU, in program mode.
a) bit-wise
b) byte-wise
Answer: b
Explanation: The current address register is byte-wise programmed by the CPU, i.e. lower byte
first and the higher byte later.
internally
Answer: c
Explanation: The contents of base address register cannot be read by the CPU. These contents
are used internally for auto-initialization.
8. The register that maintains an original copy of the respective initial current address register
and current word register is
a) mode register
c) command register
d) mask register
Answer: b
Explanation: The base address register maintains an original copy of the current address
register and current word register, before incrementing or decrementing.
9. The register that can be automatically incremented or decremented, after each DMA transfer
is
a) mask register
b) mode register
c) command register
Answer: d
Explanation: The address is automatically incremented or decremented after each DMA
transfer, and the resulting address value is again stored in the current address register.
a) memory read
b) memory write
c) verify transfer
Answer: d
Explanation: Memory read, memory write and verify transfer are the three types of DMA
transfer.
To practice all areas of Microprocessors, here is complete set of 1000+ Multiple Choice
Questions and Answers .
This set of Microprocessors Question Paper focuses on “Programmable DMA Interface 8237
-2”.
b) generation of TC
Answer: d
Explanation: In the request register, each bit is set or reset under program control or is cleared
upon generation of a TC or an external EOP.
2. The register that holds the data during memory to memory data transfer is
a) mode register
b) temporary register
c) command register
d) mask register
Answer: b
Explanation: The temporary register holds the data during memory to memory data transfers.
After the completion of the transfer operation, the last word transferred remains in the temporary
register, until it is cleared by a reset operation.
3. The register that keeps track of all the DMA channel pending requests and status of their
terminal counts is
a) mask register
b) request register
c) status register
d) count register
Answer: c
Explanation: The status register keeps track of all the DMA channel pending requests, and
status of their terminal counts. These are cleared upon reset.
4. The pin that clears the command, request and temporary registers, and internal first/last
flipflop when it is set is
a) CLEAR
b) SET
c) HLDA
d) RESET
Answer: d
Explanation: A high on the reset pin clears the command, status, request and temporary
registers, and also clears the internal first/last flipflop.
5. The DMA request input pin that has the highest priority is
a) DREQ0
b) DREQ1
c) DREQ2
d) DREQ3
Answer: a
Explanation: DREQ0 has the highest priority while DREQ3 has the lowest one. The priorities of
the DREQ lines is programmable.
6. When interface 8237 does not have any valid pending DMA request then it is said to be in
a) active state
b) passive state
c) idle state
Answer: c
Explanation: If 8237 is in idle state, then CPU may program it in this state.
Answer: c
Explanation: A memory to memory transfer is a two cycle operation and requires a read from
and write-to memory cycle, to complete each DMA transfer.
8. In demand transfer mode of 8237, the device stops data transfer when
a) a TC
terminalcount
is reached
b) an external EOP
activelow
is detected
Answer: d
Explanation: In demand transfer mode, the device continues transfers till a TC is reached or an
external EOP is detected or the DREQ signal goes inactive.
9. The mode of 8237 in which the device transfers only one byte per request is
d) cascade mode
Answer: b
Explanation: In single mode, the device transfers only one byte per request. For each transfer,
the DREQ must be active until the DACK is activated.
10. The transfer of a block of data from one set of memory address to another takes place in
d) cascade mode
Answer: c
Explanation: To perform the transfer of a block of data from one set of a memory address to
another one, this transfer mode is used.
11. Which of the following command is used to make all the internal registers of 8237 clear?
Answer: b
Explanation: Using master clear command, all the internal registers of 8237 are cleared, while
all the bits of the mask register are set.
To practice all questions papers on Microprocessors, here is complete set of 1000+ Multiple
Choice Questions and Answers .
MCQs
Answer: c
Explanation: Whatever their physical sizes and storage formats, all the floppies incorporate the
basic principles of magnetic data recording and reading.
2. In floppy disk, the small hole that enables the drive to identify the beginning of a track and its
first sector is
a) inner hole
b) key hole
c) index hole
d) start hole
Answer: c
Explanation: The small hole called index hole, enables the drive to identify the beginning of a
track and its first sector.
a) 200 RPM
b) 300 RPM
c) 150 RPM
d) 50 RPM
Answer: b
Explanation: The floppy media is rotated at the speed of 300 RPM
RevolutionPerMinute
inside its jacket.
4. The Double Density Double Sided disks on each side are organized with
a) 20 tracks
b) 30 tracks
c) 40 tracks
d) 50 tracks
Answer: c
Explanation: The Double Density Double Sided
DDDS
disks are organized with 40 tracks on each side of the disk.
5. The magnetic recording technique used for storing data onto the disks
floppydisks
is called
a) return to zero
b) non-return to zero
Answer: b
Explanation: In this technique, the magnetic flux on the disk surface never returns to zero, i.e.
no erase operation is carried out.
a) blue laser
b) white laser
c) red laser
d) green laser
Answer: c
Explanation: A DVD is an optical disk that uses a red laser for reading the disks.
Answer: c
Explanation: The blue ray disk uses a high frequency blue laser with a small wavelength to read
the disk.
8. A blue ray disk can store data upto _________ per layer.
a) 25 KB
b) 25 MB
c) 25 TB
d) 25 GB
Answer: d
Explanation: A blue ray disk can store data upto 25 GB per layer and is popularly used for
storing long duration videos like movies.
9. DVDRW is for
a) read-write DVD
b) rewriteable DVD
c) recordable DVD
Answer: b
Explanation: DVDRW is for rewriteable DVD and DVDR is for recordable DVD.
a) hard disk
b) hard drive
c) fixed disk
Answer: d
Explanation: The Hard Disk Drive is also called as a hard disk, hard drive, fixed drive, fixed disk
or fixed disk drive.
To practice all areas of Microprocessors, here is complete set of 1000+ Multiple Choice
Questions and Answers .
MCQs
Answer: d
Explanation: The memory serves the microprocessor in the same way, whether it is a single
microprocessor or a multi microprocessor.
a) one processor
b) two processors
Answer: a
Explanation: In a shared bus architecture, only one processor performs bus cycle to fetch
instructions or data from the memory.
are
a) 1
b) 2
c) 3
d) many
Answer: b
Explanation: The processors P1 and P2 address a multiport memory, which can be accessed at
a time by both the processors.
b) memory technique
d) mapping technique
Answer: c
Explanation: The bus window technique is the correct method of interconnection between the
processors.
Answer: d
Explanation: The disadvantage of bus window technique is that both processors must know
implicitly about the existence of a bus window, its size and the address map. It also results in
loss of effective local memory space.
b) crossbar switching
c) linked input/output
d) shared bus
Answer: b
Explanation: In crossbar switching type of interconnection topology, several parallel data paths
are possible. Each node of the crossbar represents a bus switch.
7. Which of the following is not a type of configuration that is based on physical interconnections
between the processors?
a) star configuration
b) loop configuration
c) regular topologies
d) incomplete interconnection
Answer: d
Explanation: Based on the physical interconnections between the processors, the configurations
are
i) star configuration
ii) loop or ring configuration
iii) complete interconnection
iv) regular topologies
v) irregular topologies.
8. The configuration, in which all the processing elements are connected to a central switching
element, that may be independent processor via dedicated paths is
a) star
b) loop
c) complete
d) irregular
Answer: a
Explanation: The switching element controls the interconnections between the processing
elements.
a) star
b) loop
c) complete
d) regular
Answer: c
Explanation: For a large number of processors, the complete interconnection is impractical due
to a large number of interconnection paths.
a) star
b) loop
c) complete
d) regular
Answer: d
Explanation: In array processor architecture, the processing elements are arranged in a regular
fashion.
To practice all areas of Microprocessors, here is complete set of 1000+ Multiple Choice
Questions and Answers .
MCQs
a) control unit
b) microprocessor
c) processing unit
Answer: d
Explanation: The microprocessors or processing unit is used as a node in interconnection
topologies. They may also work as stand-alone processors or subprocessing units, under the
control of other microprocessors or processing units.
a) task dependent
Answer: d
Explanation: The main feature of multi-microprocessor is that it is task dependent. If it is
designed for a specific task, then it may not be useful for other tasks.
a) greater throughput
Answer: c
Explanation: Greater throughput and enhanced fault tolerance are the main objectives of the
multi-microprocessor system. These systems incorporate a multiplicity of hardware and
software, for the purpose.
4. An interface between the user or an application program, and the system resources are
a) microprocessor
b) microcontroller
c) multi-microprocessor
d) operating system
Answer: d
Explanation: The operating system acts as an interface, and is an important program that
resides in the computer memory.
b) input/output management
c) memory management
Answer: d
Explanation: An operating system provides a means of hardware and software resource
management including input/output and memory management.
6. Distributed systems are designed to run
a) serial process
b) parallel process
Answer: d
Explanation: Distributed systems are designed to run a parallel process. It is essential that a
proper environment exists for concurrent processes to communicate and cooperate, in order to
complete the allotted task.
a) intraprocessor communication
d) interprocessor communication
Answer: c
Explanation: A distributed operating system must provide a mechanism for interprocess and
interprocessor communication.
Answer: d
Explanation: A multiprocessor operating system should have a mechanism to split a task,
optimise system performance, and should handle structural changes.
Answer: d
Explanation: An operating system must have process-processor allocation strategies, a
mechanism to collect results of subtasks and software to improve overall performance.
d) data protection
Answer: b
Explanation: A multiprocessor operating system must take care of unauthorized data access
and data protection.
To practice all areas of Microprocessors, here is complete set of 1000+ Multiple Choice
Questions and Answers .
MCQs
1. The unit that executes all the numeric processor instructions in 8087 is
a) Control unit
b) ALU
Answer: c
Explanation: The 8087 is divided into two sections namely control unit and numeric extension
unit in which the numeric extension unit executes all the numeric processor instructions.
a) Control unit
b) ALU
Answer: a
Explanation: The control unit receives, decodes the instructions, and executes the 8087 control
instructions.
Answer: d
Explanation: The control unit is used for establishing communication between CPU and memory
and coordinating the internal coprocessor execution.
NEU
a) BUSY
activehigh
b) BUSY
activelow
c) READY
activelow
d) RESET
activehigh
Answer: a
Explanation: When NEU begins its execution, the BUSY signal is pulled up. Also, this output
signal when high, indicates to the CPU that it is busy with the execution of an allotted
instruction.
5. The register that allows the register programmer to select the required processing options is
a) significant
b) exponent
Answer: c
Explanation: The control word register allows the register programmer to select the required
processing options out of available ones. It is used to control the operation of 8087.
a) stack overflow
b) stack underflow
Answer: d
Explanation: Invalid operation is generated due to stack overflow, stack underflow,
indeterminate form as result, or non-number
NAN
as operand.
7. The exception generated for a too big result to fit in the format is
a) invalid operation
b) overflow
c) denormalized operand
d) result overflow
Answer: b
Explanation: A too big result to fit in the format generates this exception. The condition code bits
indicate that the result is prohibitively large.
a) overflow
b) invalid operation
c) denormalized operand
d) zero divide
Answer: d
Explanation: If any non-zero finite operand is divided by zero, the zero divide exception is
generated. The resulting condition code bits indicate that the result is infinity, even if the
exception is masked.
activelow
is
b) connected to ground
c) left unconnected
Answer: b
Explanation: The 8087 can operate in a maximum mode, only when the MN/MX
activelow
pin of the CPU is grounded. In maximum mode, all the control signals are derived using a
sequence chip known as a bus controller.
10. If the result is rounded according to the rounding control bits, then the exception generated
is
a) denormalized operand
b) underflow
c) inexact result
d) invalid operation
Answer: c
Explanation: If it is impossible to fit the actual result in the specified format, the result is rounded
according to the rounding control bits, and an exception is generated. This sets the precision
exception flag.
11. The instruction that stores a copy of top of the stack into the memory, and pops the top of
the stack is
a) FST
b) FSTP
c) FIST
d) FLD
Answer: b
Explanation: FSTP
storefloatingpointnumberandpop
stores a copy of top of the stack into memory or any coprocessor register, and then pops the
top of the stack.
12. The instruction that multiplies the content of the stack top by 2n is
a) FMUL
b) FPREM
c) FSCAL
d) FCSH
Answer: c
Explanation: FSCAL instruction multiplies the content of the stack top by 2n, where n is an
integral part of stack and stores the result in stack.
13. If the opcode bit is D=1, then the source and destination operands are
a) incremented
b) decremented
c) cleared
d) interchanged
Answer: d
Explanation: If D=1, then it interchanges the source and destination operands.
To practice all areas of Microprocessors, here is complete set of 1000+ Multiple Choice
Questions and Answers .
MCQs
1. The 8089 shares the system bus and memory with the host CPU in
Answer: a
Explanation: In a tightly coupled configuration, the 8089 shares the system bus and memory
with the host CPU using its RQ
activelow
or GT
activelow
pins.
2. The 8089 communicates with the host CPU using bus arbiter and controller in
Answer: b
Explanation: In a loosely coupled configuration, the 8089 has its own local bus and
communicates with the host CPU using bus arbiter and controller.
3. The number of address lines used by the I/O processor in 8089 is
a) 20
b) 12
c) 16
d) 8
Answer: c
Explanation: The 8089 I/O processor uses only 16 address lines, and thus it can address only
64KB of IO space.
a) 16-bit IO
b) 8-bit IO
c) 64-bit IO
Answer: d
Explanation: The 8089 handled IO devices need not have the same data bus width as that of
8089. This enables even 8-bit IO devices to be interfaced easily with 8089.
5. In the 8089 architecture, the address of memory table for channel-2 is calculated by
Answer: b
Explanation: The address of the memory table for channel-2 is calculated by adding 8 to the
contents of CCP or by adding memory table address for channel-1 to the contents of CCP.
a) GA
b) BC
c) CX
d) MC
Answer: c
Explanation: The registers GA, GB, GC, BC, IX and MC can be used as general purpose
registers.
7. The registers that are used as source and destination pointers during DMA operations are
a) GB, GC
b) GC, BC
c) GC, GA
d) GA, GB
Answer: d
Explanation: GA register is used as source and GB as destination pointers during DMA
operations.
8. The pin that is used for data transfer control and operation termination signals is
a) SINTR
b) EXT
d) RQ
activelow
or GT
activelow
Answer: c
Explanation: The DRQ and EXT are used for data transfer control and operation termination
signals during DMA operations.
9. The pin that is used to inform the CPU that the previous operation is completed is
a) RQ
activelow
b) GT
activelow
c) DRQ
d) SINTR
Answer: d
Explanation: The SINTR pins are used by the channels either to inform the CPU that the
previous operation is over or to ask for its attention or interference if required, before the
completion of the task.
Answer: d
Explanation: The program status word contains the current channel status, which contains
source and destination address widths, channel activity, interrupt control and servicing, bus load
limit and priority information.
To practice all areas of Microprocessors, here is complete set of 1000+ Multiple Choice
Questions and Answers .
MCQs
c) priority resolving
Answer: d
Explanation: To resolve the various bus contention and interprocessor communication problems,
different hardware strategies and algorithms are worked out. These incorporated functions like
bus allotment and control, bus arbitration and priority resolving into them.
2. The device that deals with the bus access control functions and bus handshake activities is
b) bus arbiter
c) priority resolver
Answer: b
Explanation: The bus arbiter or 8289 takes care of bus access control functions and bus
handshake activities.
3. The clock generator delays the READY signal until the signal _________ goes low
a) DEN
activehigh
b) DEN
activelow
c) AEN
activelow
d) AEN
activehigh
Answer: c
Explanation: If AEN
activelow
is high, the clock generator delays the READY signal till the AEN
activelow
goes low.
a) READY
activelow
b) LOCK
activehigh
c) CBRQ
activelow
d) BPRO
activehigh
Answer: b
Explanation: The bus controller does not relinquish
releaseitscontrolon
the bus, till the LOCK
activelow
input is low.
5. The signals that are used by the bus arbitration in the independent request method is
a) BREQ
activelow
b) BPRN
activelow
c) CBRQ
activelow
Answer: d
Explanation: The four active low signals, bus request
BREQ
, bus priority in
BPRN
, common bus request
CBRQ
and bus priority out
BPRO
are used for bus arbitration.
6. The signal that is used to drive a priority resolving network that actually accepts the bus
request inputs is
a) BREQ
activelow
b) BPRN
activelow
c) CBRQ
activelow
d) BPRO
activelow
Answer: a
Explanation: The BREQ
activelow
is used to drive a priority resolving network that actually accepts the bus request inputs from all
the masters and derives the priority outputs which further drive the BPRN
activelow
inputs of all the masters.
7. Which of the following is the simplest and cheapest method of bus arbitration?
a) daisy chaining
b) independent request
c) polling
Answer: a
Explanation: The daisy chaining method is the simplest one, as it has less hardware complexity.
8. The method of bus arbitration that does not contain priority resolving network in it is
a) daisy chaining
b) independent request
c) polling
d) none
Answer: a
Explanation: The daisy chaining method does not contain any priority resolving network, rather
the priorities of all the devices are essentially assumed to be in sequence.
9. Which of the following is the fastest method of bus arbitration?
a) daisy chaining
b) independent request
c) polling
Answer: b
Explanation: The independent request scheme is quite fast because each of the masters can
independently communicate with the controller.
a) daisy chaining
b) independent request
c) polling
Answer: c
Explanation: In a polling scheme, a set of address lines is driven by the controller to address
each of the masters in sequence.
To practice all areas of Microprocessors, here is complete set of 1000+ Multiple Choice
Questions and Answers .
MCQs
a) coprocessors
b) independent processors
Answer: c
Explanation: The processors used in the multi-microprocessor are either coprocessors or
independent processors.
2. The processor that executes the instructions fetched for it by the host processor is
a) microprocessor
b) coprocessor
c) independent processor
Answer: b
Explanation: The coprocessor executes the instructions fetched for it by the host processor.
3. The processor that asks for bus access or may itself fetch the instructions and execute them
is
a) microprocessor
b) coprocessor
c) independent processor
Answer: c
Explanation: The independent processor may ask for bus access, may fetch the instructions
itself, and execute them independently.
a) common clock
Answer: c
Explanation: The microprocessors share a common clock and bus control logic, in a tightly
coupled system.
5. Communication between processors using a common system bus and common memory
takes place in
a) loosely coupled system
Answer: b
Explanation: In tightly coupled systems, the two processors may communicate using a common
system bus or common memory.
Answer: a
Explanation: In a loosely coupled multiprocessor system, each CPU may have its own bus
control logic. The bus arbitration is handled by an external circuit, common to all the processors.
Answer: d
Explanation: The loosely coupled system is advantageous than the tightly coupled system as it
has advantages of more number of CPUs can be added to improve the system performance. A
fault in a single module does not lead to a complete system breakdown.
8. In a tightly coupled system, when a processor is using the bus then the local bus of other
processors is in
a) hold state
Answer: b
Explanation: When a processor is using the bus then the other processors maintain their local
buses in high impedance state.
b) less portable
c) more expensive
Answer: d
Explanation: The loosely coupled systems are more complicated due to the required additional
communication hardware. They are less portable and more expensive due to additional
hardware.
tightly
d) clock pulse
Answer: c
Explanation: The microprocessor in a closely coupled system either uses a status bit in memory
or interrupts the host to inform it about the completion of task allotted to it.
To practice all areas of Microprocessors, here is complete set of 1000+ Multiple Choice
Questions and Answers .
MCQs
focuses on “Design of a PC Based Multimicroprocessor System”.
1. The files that reside in the current drive and directory of the hard disk is
a) OBJ files
b) EXE files
c) SRC files
d) DEST files
Answer: b
Explanation: The files that reside in the current drive and directory of the hard disk is EXE files.
2. The master processor stores the result buffers on to the hard disk with the filename as
a) .EXE file
b) .OBJ file
Answer: c
Explanation: The master processor stores the result buffers on to the hard disk with the filename
as .EXE file with extension .RES.
a) ALE
b) DEN
c) DT/R
activelow
Answer: d
Explanation: The latches are enabled by ALE signal and data will be enabled by DEN signal.
The ALE, DEN and DT/R
activelow
signals are derived by a separate 8288 bus controller chip.
a) 30 KB
b) 50 KB
c) 60 KB
d) 40 KB
Answer: c
Explanation: The EXE files should not be more than 60 KB size.
5. A part of memory that can be addressed by more than one processor for communication is
known as
a) memory module
b) bus window
c) ram
Answer: b
Explanation: There are two slave processors and thus there are two bus windows.
6. When a subprocessor wants to communicate with the bus window, it informs the main
processor to
b) storage buffer
Answer: c
Explanation: An 8255 IO card is used to control the tristate buffers that provide isolation. When
a subprocessor wants to communicate with the bus window, it informs the main processor to
disable tristate buffer.
7. When the subprocessor completes its execution, then the status on the status lines shows
a) hold status
b) halt status
c) high status
d) low status
Answer: b
Explanation: When the subprocessor completes its execution, then the status on the status lines
shows halt status.
8. For MEMR
activelow
and MEMWR
activelow
Answer: c
Explanation: During MEMR
activelow
the data flow from memory to CPU so isolation buffer should be in receiver mode and data
flows from CPU to memory during MEMWR
activelow
operation and so buffer should be in transmit mode.
9. If the DIR pin of the isolation chip is high, then it enters into
a) receiver mode
d) transmit mode
Answer: d
Explanation: If the DIR pin of the isolation chip is high, then it enters into transmit mode and if it
is 0 then the isolation chip enters into receiver mode.
a) main program
Answer: d
Explanation: System software of the complete system consists of three parts. the first part main
control program controls the total operation of the system, and the remaining two parts are the
small local initialization programs for each of the subprocessors.
To practice all areas of Microprocessors, here is complete set of 1000+ Multiple Choice
Questions and Answers .
MCQs
a) 8 MB
b) 16 MB
c) 24 MB
d) 64 MB
Answer: b
Explanation: The 80286 with its 24-bit address bus is able to address 16 Mbytes of physical
memory.
a) 12.5 MHz
b) 10 MHz
c) 8 MHz
d) all of the mentioned
Answer: d
Explanation: Various versions of 80286 are available that run on 12.5 MHz, 10 MHz and 8 MHz
clock frequencies.
3. The management of the memory system required to ensure the smooth execution of the
running process is done by
a) control unit
b) memory
Answer: c
Explanation: The memory management which is an important task of the operating system is
now supported by a hardware unit called a memory management unit.
4. The fetching of the program from secondary memory to place it in physical memory, during
the execution of CPU is called
a) mapping
b) swapping in
c) swapping out
d) pipelining
Answer: b
Explanation: Whenever the portion of a program is required for execution by the CPU, it is
fetched from the secondary memory and placed in the physical memory. This is called swapping
in of the program.
5. The process of making the physical memory free by storing the portion of program and partial
results in the secondary storage called
a) mapping
b) swapping in
c) swapping out
d) pipelining
Answer: c
Explanation: In swapping out, a portion of the program or important partial results required for
further execution, may be saved back on secondary storage to make the physical memory free,
for further execution of another required portion of the program.
6. The memory that is considered as a large logical memory space, that is not available
physically is
a) logical memory
b) auxiliary memory
c) imaginary memory
d) virtual memory
Answer: d
Explanation: To the user, there exists a very large logical memory space, which is actually not
available called virtual memory. This does not exist physically in a system. It is however,
possible to map a large virtual memory space onto the real physical memory.
a) data protection
c) segmented memory
Answer: d
Explanation: The important aspects of memory management are data protection, unauthorized
access prevention, and segmented memory.
8. The memory management and protection mechanisms are disabled when the 80286 is
operated in
a) normal mode
Answer: b
Explanation: In real address mode of 80286, all the memory management and protection
mechanisms are disabled.
9. The memory management and protection mechanisms are enabled with advanced instruction
set when 80286 is operated in
a) normal mode
Answer: c
Explanation: In virtual address mode, 80286 works with all of its memory management and
protection capabilities, with the advanced instruction set.
10. The 80286 is an upward object code compatible with 8086 or 8088 when operated in
a) normal mode
Answer: d
Explanation: The 80286 is operated in two modes, namely real address mode and virtual
address mode. In both the modes, the 80286 is compatible with 8086/8088.
To practice all areas of Microprocessors, here is complete set of 1000+ Multiple Choice
Questions and Answers .
MCQs
Answer: d
Explanation: The CPU of 80286 contains the same set of registers as in 8086.
2. The bits that are modified according to the result of the execution of logical and arithmetic
instructions are called
Answer: c
Explanation: The flag register bits, D0, D2, D4, D6, D7 and D11 are modified according to the
result of the execution of logical and arithmetic instructions. These are called as status flag bits.
3. The flags that are used for controlling machine operation are called
a) status flags
b) control flags
Answer: b
Explanation: The flags such as trap flag
TF
and Interrupt flag
IF
bits are used for controlling the machine operation, and thus they are called control flags.
c) protection enable
a) address unit
b) bus unit
c) instruction unit
d) control unit
Answer: d
Explanation: The CPU may be viewed to contain four functional parts and they are
i) Address Unit
ii) Bus Unit
iii) Instruction Unit
iv) Execution Unit.
6. The unit that is responsible for calculating the address of instructions, and data that the CPU
wants to access is
a) bus unit
b) address unit
c) instruction unit
d) control unit
Answer: b
Explanation: The address unit is responsible for calculating the address of instructions, and data
that the CPU wants to access. Also, the address lines derived by this unit may be used to
address different peripherals.
7. The process of fetching the instructions in advance, and storing in the queue is called
a) mapping
b) swapping
c) instruction pipelining
d) storing
Answer: c
Explanation: The instructions are fetched in advance and stored in a queue to enable faster
execution of the instructions. This concept is known as instruction pipelining.
8. The CPU must flush out the prefetched instructions immediately following the branch
instruction in
a) conditional branch
b) unconditional branch
Answer: b
Explanation: In case of unconditional branch, the CPU will have to flush out the prefetched
instructions, immediately following the branch instruction.
9. The device that interfaces and control the internal data bus with the system bus is
a) data interface
b) controller interface
d) data transreceiver
Answer: d
Explanation: The data transreceivers interface and control the internal data bus with the system
bus.
b) scratch pad
Answer: d
Explanation: The execution unit contains the register bank, used for storing the data as scratch
pad, or used as special purpose registers.
c) INT instruction
Answer: d
Explanation: The interrupts generated by 80286 may be divided into 3 categories as external or
hardware interrupts, INT instruction or software interrupts and interrupts generated by
exceptions.
12. For which of the following instruction does the return address point to instruction causing an
exception?
Answer: d
Explanation: For the instructions, divide error, bound range exceeded and invalid opcode
exceptions, the return address points to the instruction causing exception.
13. The instruction that comes into action, if the trap flag is set is
a) maskable interrupt
b) non-maskable interrupt
d) breakpoint interrupt
Answer: c
Explanation: Single step interrupt is an internal interrupt that comes into action if the trap flag
TF
is set.
14. The interrupt that has the highest priority among the following is
a) Single step
b) NMI
non−maskableinterrupt
c) INTR
d) Instruction exception
Answer: d
Explanation: The instruction exception has the highest priority followed by single step, NMI and
INTR instrution.
15. The interrupt that has the lowest priority among the following is
b) INTR
c) INT instruction
d) NMI
Answer: c
Explanation: The INT instruction has the lowest priority. The order of priority of interrupts from
high to low is
1) instruction exception
2) single step
3) NMI
4) processor extension segment overrun
5) INTR
6) INT instruction.
To practice all areas of Microprocessors, here is complete set of 1000+ Multiple Choice
Questions and Answers .
MCQs
a) 68-pin PLCC
plasticleadedchipcarrier
b) 68-pin LCC
leadlesschipcarrier
c) 68-pin PGA
pingridarray
Answer: d
Explanation: The 80286 is available in 68-pin PLCC
plasticleadedchipcarrier
, 68-pin LCC
leadlesschipcarrier
and 68-pin PGA
pingridarray
packages.
a) 2
b) 4
c) 8
d) 1
Answer: a
Explanation: The clock frequency is divided by two internally, and is used for deriving
fundamental timings for basic operations of the circuit.
a) memory transfer
b) address transfer
Answer: d
Explanation: The address lines, A23-A16 are zero during I/O transfers.
4. The signals S1
activelow
, S2
activelow
are
a) output signals
activelow
Answer: d
Explanation: The signals S1
activelow
, S2
activelow
are active low status output signals, which indicate initiation of a bus cycle, and with M/IO
activelow
and COD/INTA
activelow
, they define the type of the bus cycle.
5. If M/IO
activelow
a) I/O cycle
b) Memory cycle
Answer: c
Explanation: If M/IO
activelow
signal is ‘0’ then it indicates that an I/O cycle or INTA cycle is in the process, and if it is ‘1’, it
indicates that a memory or a HALT cycle is in progress.
6. The LOCK
activelow
a) XCHG signal
b) Interrupt acknowledge
Answer: d
Explanation: The lock pin is used to prevent the other masters from gaining the control of the
bus, for the current and the following bus cycles. This pin is activated by a “LOCK” instruction
prefix, or automatically by hardware during XCHG, interrupt acknowledge or descriptor table
access.
a) WAIT
b) BHE
activelow
c) READY
activelow
d) WAIT
activelow
Answer: c
Explanation: The active low READY pin is used to insert wait states in a bus cycle, for
interfacing low speed peripherals. This signal is neglected during HLDA cycle.
8. The minimum number of clock cycles required in an input pulse width of the RESET pin is
a) 4
b) 2
c) 8
d) 16
Answer: d
Explanation: The active high RESET input clears the internal logic of 80286, and re-initializes it.
The reset input pulse width should be at least 16 clock cycles.
9. To filter the output, a 0.047microfarads, 12V capacitor is connected between the pins
Answer: a
Explanation: A 0.047microfarads, 12V capacitor is connected between the CAP pin and ground,
to filter the output of the internal substrate bias generator.
10. The signal that causes the 80286 to perform the processor extension interrupt while
executing the WAIT and ESC instructions are
a) BUSY
activelow
b) PEACK
activelow
c) PEREQ
d) ERROR
activelow
Answer: d
Explanation: An active ERROR
activelow
signal causes the 80286 to perform the processor extension interrupt while executing the WAIT
and ESC instructions.
To practice all areas of Microprocessors, here is complete set of 1000+ Multiple Choice
Questions and Answers .
MCQs
1. The 80286 CPU acts just like that of 8086 when operated in
Answer: a
Explanation: In the real addressing mode of operation of 80286, it just acts as a fast 8086.
a) 16 MB
b) 8 MB
c) 2 MB
d) 1 MB
Answer: d
Explanation: In real addressing mode, the 80286 addresses a physical memory of 1 Mbytes
using A0-A19. The lines A20-A23 are not used by the internal circuit of 80286 in this mode.
Answer: a
Explanation: Because of extra pipelining and other circuit level improvements, in real address
mode also, the 80286 operates at a much faster rate than 8086.
4. In physical memory, if the segment size limit is exceeded by the instruction or data then
b) exception is generated
Answer: b
Explanation: An exception is generated if the segment size limit is exceeded by the instruction
or the data.
a) system initialization
Answer: c
Explanation: The 80286 reserves two fixed areas of physical memory for system initialization
and interrupt vector table.
6. In the real mode, the memory that is reserved for interrupt vector table is
a) first 2 KB of memory
b) first 1 KB of memory
c) last 2 KB of memory
d) last 1 KB of memory
Answer: b
Explanation: In the real mode, the first 1 Kbyte of memory starting from the address 00000H to
003FFH, is reserved for interrupt vector table.
7. In the real mode, the memory that is reserved for system initialization is
Answer: c
Explanation: The addresses from FFFF0H to FFFFFH are reserved for system initialization, in
real addressing mode.
Answer: b
Explanation: When 80286 is reset, it always starts its execution in real addressing mode.
a) initialization of IP
b) enables interrupts
Answer: d
Explanation: The 80286 in real addressing mode performs the following functions: it initializes IP
and other registers of 80286, initializes the peripheral, enables interrupts, sets up descriptor
tables, and then prepares it for entering the protected virtual address mode.
10. In real address mode, while addressing the physical memory, the 80286 uses the signal
a) HLDA
b) BHE
activelow
c) CAP
d) HOLD
Answer: b
Explanation: In real address mode, while addressing the physical memory, the 80286 uses BHE
activelow
along with A0-A19.
To practice all areas of Microprocessors, here is complete set of 1000+ Multiple Choice
Questions and Answers .
MCQs
PVAM
-1”.
1. The procedure of fetching the chosen program segments or data from the secondary storage
into the physical memory is
a) mapping
b) swapping
c) unswapping
d) pipelining
Answer: b
Explanation: Swapping is the procedure of fetching the chosen program segments or data from
the secondary storage into the physical memory.
2. The procedure of storing back the partial results on to the secondary storage is called
a) mapping
b) swapping
c) unswapping
d) pipelining
Answer: c
Explanation: The procedure of storing back the partial results or data back on to the secondary
storage is called unswapping.
a) 1MB
b) 1GB
c) 1TB
Answer: b
Explanation: The 80286 is able to address 1Gbyte of virtual memory per task.
a) swapping mechanism
b) unswapping mechanism
c) operating system
Answer: d
Explanation: The handling of branch instructions like JUMP and CALL is taken care of, by the
swapping and unswapping mechanism, and operating system.
a) program segment
b) page
Answer: d
Explanation: The segments or pages have been associated with a data structure known as a
descriptor. The descriptor contains information on the page, and also carry relevant information
regarding a segment, and its access rights.
6. The descriptors that are used for subroutines and interrupt service routines are
b) gate descriptors
Answer: b
Explanation: For data segment, the corresponding descriptor may be data segment descriptor
and for code segment, there may be code segment descriptor. For subroutines and interrupt
service routines there are gate descriptors.
7. A segment with low privilege level is not allowed to access another segment of
Answer: b
Explanation: A segment with low privilege level is not allowed to access another segment with
high privilege level.
b) task switching
Answer: d
Explanation: A descriptor is used to carry out additional functions like transfer of control and
task switching.
9. The descriptor that is used for special system data segments and control transfer operations
is
b) gate descriptors
Answer: d
Explanation: The 80286 has system segment descriptor, that is used for special system data
segments, and control transfer operations.
Answer: d
Explanation: A code or data segment descriptor contains 16-bit segment limit, 24-bit segment
base address, 8-bit access rights byte and the remaining 16-bits are reserved by Intel for
upward compatibility.
Present
b) virtual memory
Answer: a
Explanation: If P=1, then the segment is mapped into physical memory.
12. In access rights byte, to select system segment descriptor, the condition is
a) S=1
b) S=0
Answer: b
Explanation: If S
segmentdescriptor
=0, then system segment descriptor or gate descriptor is selected.
13. If S
segmentdescriptor
Answer: d
Explanation: If S=1, then code or data
includingstack
segment descriptors are selected.
b) 4 bits
c) 8 bits
d) 16 bits
Answer: d
Explanation: The limit field, which is the maximum allowed offset address, is of 16 bits.
To practice all areas of Microprocessors, here is complete set of 1000+ Multiple Choice
Questions and Answers .
This set of Advanced Microprocessors Questions and Answers focuses on “Protected Virtual
Address Mode
PVAM
-2”.
a) system descriptor
b) gate descriptor
Answer: c
Explanation: The system segment descriptors are of seven types. The types 1 to 3 are called
system descriptors and the types 4 to 7 are called gate descriptors.
a) call gate
b) task gate
c) interrupt gate
Answer: d
Explanation: The gate descriptors are of four types namely, call gate, task gate, interrupt gate
and trap gate.
3. The gate descriptor contains the information of
b) stack manipulations
c) privilege level
Answer: d
Explanation: The gate descriptor contains the information regarding the destination of control
transfer, required stack manipulations, privilege level and its type.
a) call gate
b) task gate
c) interrupt gate
d) trap gate
Answer: a
Explanation: Call gates are used to alter the privilege levels.
Answer: c
Explanation: Interrupt gates and trap gates are used to specify corresponding service routines.
a) trap gate
b) task gate
Answer: b
Explanation: Task gate is used to switch from one task to another.
a) trap gate
b) task gate
c) interrupt gate
d) call gate
Answer: d
Explanation: The word count field is only used by a call gate descriptor, to indicate the number
of bytes to be transferred from the stack of the calling routine to the stack of the called routine.
8. The memory that maintains the most frequently required data for execution, in a high speed
memory is called
a) virtual memory
b) physical memory
c) cache memory
d) ROM
readonlymemory
Answer: c
Explanation: To minimize the time required for fetching the frequently required descriptor
information, from the main memory, cache memory is used in which the most frequently
required data for execution is stored.
RPL
b) table indicator
c) index
Answer: d
Explanation: In the protected mode, the contents of the segment registers are known as
selectors. The selector field consists of three fields namely, RPL, table indicator
TI
and index.
Answer: b
Explanation: The type of descriptor table is global if TI=0 and local if TI=1.
is
a) LDT
c) GDT
Answer: b
Explanation: The LGDT and LLDT instructions are privileged, and may be executed only at
privilege level 0.
12. The instruction that loads a selector which refers to a local descriptor table, containing the
base address and limit for LDT is
a) LGT
b) GDT
c) LGDT
d) LLDT
Answer: d
Explanation: The LLDT instruction loads a selector, which refers to a local descriptor table,
containing the base address, and limit for LDT.
13. The descriptor that is used to store task gates, interrupt gates and trap gates is
Answer: c
Explanation: The 80286 has a third type of descriptor table known as interrupt descriptor table,
which is used to store task gates, interrupt gates and trap gates.
14. The number of interrupt descriptors that the interrupt descriptor table
IDT
handles is
a) 16
b) 64
c) 128
d) 256
Answer: d
Explanation: The IDT is able to handle upto 256 interrupt descriptors.
a) 2
b) 4
c) 6
d) 8
Answer: c
Explanation: Six bytes are required for each interrupt in an interrupt descriptor table.
To practice advanced questions and answers on all areas of Microprocessors, here is complete
set of 1000+ Multiple Choice Questions and Answers .
MCQs
focuses on “Privilege”.
a) operating system
b) interrupt handlers
c) system software
Answer: d
Explanation: The operating system, interrupt handlers and other system softwares can be
protected from unauthorized accesses in virtual address space of each task using the privilege
mechanism.
DPL
CPL
EPL
d) None of the mentioned
Answer: b
Explanation: Any one of the four privilege levels may be used to execute a task. The task
privilege level at that instant is called the Current Privilege Level
CPL
.
a) hold
Answer: c
Explanation: Once the CPL is selected, it cannot be changed during the execution normally in a
single code segment. It can only be changed by transferring the control, using gate descriptors,
to a new segment.
globaldescriptortable
localdescriptortable
a) privilege level 0
b) privilege level 1
c) privilege level 2
d) privilege level 3
Answer: a
Explanation: A task executing at level 0, the most privileged level, can access all the data
segments defined in GDT and the LDT of the task.
5. A task with privilege level 0, doesn’t refer to all the lower level privilege descriptors in
a) GDT
globaldescriptortable
b) LDT
localdescriptortable
c) IDT
interruptdescriptortable
Answer: b
Explanation: The task with privilege level 0, refers to all the lower level privilege descriptors
which apply to all the descriptors except the LDT descriptors.
6. The selector RPL that uses a less trusted privilege than the current privilege level for further
use is known as
Answer: c
Explanation: A selector RPL uses a less trusted privilege than the current privilege level for
further use. This is known as the Effective Privilege Level of the task.
Answer: c
Explanation: The effective privilege level is minimum in numeric and maximum in the privilege of
RPL and CPL.
8. The task requesting an access to a descriptor is allowed to access after checking the
a) type of descriptor
b) privilege level
d) corresponding segment
Answer: c
Explanation: The task requesting an access to a descriptor is allowed to access to it and to the
corresponding segment, only after checking the type of the descriptor and privilege level
CPL,RPL,DPL
.
Answer: b
Explanation: A CALL or JUMP instruction can reference only a code segment descriptor with
DPL equal to CPL of the task or a segment with a DPL of equal or greater privilege than CPL.
10. The RPL of a selector that referred to the code descriptor must have
Answer: c
Explanation: The RPL of a selector that referred to the code descriptor must have the same
privilege as CPL.
11. The instruction that refers to only code segment descriptors with DPL equal to or less than
the task CPL is
a) CALL
b) IRET
c) ESC
Answer: d
Explanation: The RET and IRET instructions are to refer to only code segment descriptors with
DPL equal to or less than the task CPL.
TSS
Answer: c
Explanation: When a CALL or JUMP instruction references a Task State Segment
TSS
descriptor, then DPL must be less or equally privileged than CPL.
a) loading DS
b) loading ES
c) loading SS
Answer: d
Explanation: If the privilege test is negative or an improper segment is referenced then an
exception 13 is generated. If the referenced segment is not present in physical memory, an
exception 11 is generated.
To practice all areas of Microprocessors, here is complete set of 1000+ Multiple Choice
Questions and Answers .
MCQs
focuses on “Protection”.
1. The mechanism to provide protection, that is accomplished with the help of read/write
privileges is
c) privileged instructions
d) privileged operations
Answer: a
Explanation: The restricted use of segments is accomplished with the help of read/write
privileges.
LDT
are present in
Answer: c
Explanation: In restricted use of segments i.e. segment load check, the segment usages are
restricted by classifying the corresponding descriptors, under LDT and GDT.
3. The mechanism that is accomplished using descriptor usages limitations and rules of
privilege check is
Answer: b
Explanation: Restricted accesses to segment, also called, operation reference check, is
accomplished using descriptor usages limitations, and rules of privilege check.
CurrentPrivilegeLevel
IOPL
is
Answer: c
Explanation: The privileged instructions or operations, also called, privileged instruction check,
is executed at certain privilege levels, determined by CPL and I/O privilege level
IOPL
, as defined by the flag register.
5. If CPL is not of the required privilege level, then the instructions that get affected is
a) IRET
b) POPF
Answer: c
Explanation: The IRET and POPF instructions do not perform any of their functions, if CPL is
not of the required privilege level.
6. If CPL is greater than zero, then the instruction that remains unaffected is
a) IRET
b) POPF
c) IF
Answer: c
Explanation: IF remains unaffected if CPL is greater than zero. No exception is generated for
this condition.
7. The condition, “CPL not equals to zero” satisfies when executing the instruction
a) LIDT
b) LGDT
c) LTR
Answer: d
Explanation: The condition, “CPL not equals to zero” satisfies, when executing the instructions,
LIDT, LGDT, LTR, LMSW, CTS and HLT.
a) CPL = 0
Answer: c
Explanation: The condition CPL>IOPL exists, when executing the instructions, INs, IN, OUTS,
OUT, STI, CLI and LOCK.
9. The instruction at which the exception is generated, but the processor extension registers
contain the address of failing instruction is
a) LTR
b) INS
c) CTS
d) ESC
Answer: d
Explanation: At the ESC instruction, the exception is generated, but the processor extension
registers contain the address of failing instruction.
Answer: b
Explanation: The processor extension segment overrun has no error code on the stack.
Answer: d
Explanation: Double exception detected, invalid task state segment, stack segment overrun,
processor extension segment overrun, are the protected mode exceptions.
To practice all areas of Microprocessors, here is complete set of 1000+ Multiple Choice
Questions and Answers .
MCQs
b) halt
c) processor reset
Answer: d
Explanation: The 80286 carries out six operations. They are:
1. processor reset and initialization
2. task switch operation
3. pointer testing instructions
4. protected mode initialization
5. how to enter protected mode?
6. halt.
2. After completion of the first cycle, the first task is again scheduled for the next cycle. This
process is known as
a) repetition
c) processor initiation
3. The operation that is provided by the internal architecture, to save the execution state of a
task is
a) processor reset
b) processor initialization
d) halt
Answer: c
Explanation: The 80286 internal architecture provides a task switch operation, to save the
execution state of a task, and to load a new task to be executed.
4. The instruction that can be used to carry out task switch operation is
b) exception
c) external interrupt
Answer: d
Explanation: A software interrupt instruction, exception or external interrupt, can also be used to
carry out task switch operation.
5. The IRET instruction gets back the execution state of the previous task, if
a) NT
nestedtaskflag
=1
b) NT
nestedtaskflag
=0
c) IF
interruptflag
=1
d) IF
interruptflag
=0
Answer: a
Explanation: If NT = 1, the IRET instruction gets back the execution state of the previous task.
Otherwise, the IRET instruction lets the current task continue, after popping the required values
from the stack.
a) CALL
b) INT
Answer: c
Explanation: The NT flag is set by CALL or INT initiated task switch operations.
b) protected mode
Answer: b
Explanation: To enter into protected mode, 80286 executes LMSW instruction, that sets PE flag.
8. The instruction that sets the zero flag, if the segment referred to, by the selector can be read
is
a) VERW
b) VERR
c) LSL
d) LAR
Answer: b
Explanation: The VERR
VERifytoRead
instruction sets the zero flag, if the segment referred to, by the selector, can be read.
9. The instruction that sets the zero flag, if the segment referred to by the selector, can be
written as
a) VERW
b) APRL
c) LSL
d) LAR
Answer: a
Explanation: The VERW
VERifytoWrite
instruction sets the zero flag, if the segment referred to, by the selector can be written.
10. The instruction that reads the descriptor access rights byte into the register is
a) VERW
b) APRL
c) LSL
d) LAR
Answer: d
Explanation: The LAR
LoadAccessRights
instruction reads the descriptor access rights byte into the register, if privilege rules allow.
11. The instruction that reads the segment limit into the register, if privilege rules and descriptor
type allow is
a) VERW
b) APRL
c) LSL
d) LAR
Answer: c
Explanation: The LSL
LoadSegmentLimit
instruction reads the segment limit into the register, if privilege rules, and descriptor type allow.
RequestedPrivilegeLevel
a) LAR
b) VERR
c) LSL
d) APRL
Answer: d
Explanation: The APRL
AdjustRequestedPrivilegeLevel
adjusts the RPL
RequestedPrivilegeLevel
of the selector to the numeric maximum of current selector RPL value, and the RPL value in the
register.
To practice all areas of Microprocessors, here is complete set of 1000+ Multiple Choice
Questions and Answers .
This set of Microprocessors Interview Questions and Answers for Experienced people focuses
on “80286 Minimum System Configuration, Interfacing Memory and I/O Devices With 80286”.
a) interrupt controller
b) clock generator
c) bus controller
d) all of the mentioned
Answer: d
Explanation: The interrupt controller 8259A, clock generator 82C284, and bus controller 82C288
are the unavoidable members of the family, of supporting chips of 80286.
Answer: d
Explanation: In a minimum mode, the 80286 carries out all the data transfers to/from memory or
I/O, controls the data transfer, and instruction execution of 80287.
3. The signal that is applied to the decoding logic, to differentiate between interrupt, code fetch
and data bus cycles is
a) COD
b) INTA
activelow
c) M/IO
activelow
Answer: d
Explanation: The COD, INTA
activelow
, M/IO
activelow
signals are applied to the decoding logic, to differentiate between interrupt, I/O, code fetch, and
data bus cycles.
4. By adding which of the following, the minimum mode of 80286 gives the multibus interface of
80286?
a) bus controller
b) bus arbiter
c) interrupt controller
Answer: b
Explanation: The addition of single chip 82C289 known as bus arbiter, to the configuration of
80286 minimum mode, gives the multibus structure of 80286.
5. The number of bus controllers that are used for interfacing of memory and I/O devices is
a) 1
b) 2
c) 3
Answer: b
Explanation: The interfacing of memory and I/O devices, uses two 82288 bus controllers, one
each for local, and system bus.
6. If the 80286 need to use system bus, then the signal that is to be active is
a) SRDY
b) SRDYEN
c) ARDYEN
d) ARDY
Answer: c
Explanation: The ARDYEN pin is to be activated if the 80286 is to use the system bus. The
SRDYEN pin is to be grounded.
a) AEN
b) CEN
c) AEN and CEN
Answer: a
Explanation: The MBYTES input selects the function of AEN/CEN pin. If MBYTES is high, the
pin serves as AEN, else it serves as CEN. The CEN pin is used for selecting one of the
available 82288s.
Answer: d
Explanation: The address and data lines are not multiplexed, hence no latches are required in
80286 system. Rather the addresses of the next bus cycle are displayed in advance, hence the
latches are required for latching the address, and decode the signals.
9. The I/O port addresses, that are not used, while designing practical systems around 80286
are
a) 0000H to 00FFH
b) 00FFH to FFFFH
c) 00F8H to 00FFH
d) 0000H to FFFFH
Answer: c
Explanation: The I/O port addresses 00F8H to 00FFH are reserved by Intel, hence these should
not be used while designing practical systems around 80286.
To practice all areas of Microprocessors for Interviews, here is complete set of 1000+ Multiple
Choice Questions and Answers .
This set of Microprocessors test focuses on “Priority of Bus Use By 80286, Bus Hold and HLDA
Sequence, Interrupt Acknowledge Sequence”.
c) hold request
Answer: d
Explanation: The second byte transfer of 2-byte transfer at an odd address, is the highest
priority usage among the given usages.
activelow
signal
b) hold request
executionunit
Answer: a
Explanation: The transfer with LOCK
activelow
signal is the highest priority usage than any other usage.
a) hold request
Answer: c
Explanation: The order of priority usages, starting from the highest one to the lowest one, is
given as
1. transfer with LOCK
activelow
signal
2. second byte transfer of 2-byte transfer at an odd address
3. second or third transfer cycle of a processor extension data transfer
4. HOLD request
5. processor extension data transfer
6. data transfer performed by EU
executionunit
4. As a response to the valid bus hold request, the bus is pushed into
a) TH
hold
state
b) Ts
status
state
c) Tc
command
state
d) Ti
idle
state
Answer: a
Explanation: 80286 local bus is relinquished for another bus master if a valid bus hold request is
received at the HOLD input pin. As a response to a valid bus hold request, the bus is pushed
into TH state.
a) Address
b) M/IO
activelow
c) COD/INTA
activelow
Answer: d
Explanation: The address, M/IO
activelow
and COD/INTA
activelow
are relinquished by bus arbiter.
a) 34 clockcycles
Answer: d
Explanation: Only after 34 clockcycles, after the 80286 is reset, a valid HOLD request should be
ascertained.
7. The master PIC 8259A decides which of its slave interrupt controllers is to return the vector
address, as a response of
a) first INTA
activelow
b) second INTA
activelow
pulse from 80286
c) third INTA
activelow
Answer: a
Explanation: In response to the first INTA
activelow
pulse from 80286, the master PIC 8259A decides, which of its slave interrupt controllers is to
return the vector address.
8. The slave
whichisselected
a) first INTA
activelow
b) second INTA
activelow
c) third INTA
activelow
Answer: b
Explanation: The interrupt acknowledge sequence consists of two INTA
activelow
pulses. After the second pulse, the selected slave sends the vector on D0-D7 data lines, and
80286 reads it.
9. The signal of 82C288, that enables the cascade address drivers, during INTA cycles is
a) DEN
b) DT/R
activelow
c) MCE
d) MB
Answer: c
Explanation: The MCE
MasterCascadeEnable
signal of 82C288 enables the cascade address drivers during INTA cycles, to select the slave
using the local address bus.
activelow
Answer: b
Explanation: The LOCK
activelow
signal is activated during Ts of first INTA cycle.
Ti
, that is allowed between two INTA cycles, to meet the 8259A speed and cascade address
output delay is
a) 1
b) 2
c) 3
d) 4
Answer: c
Explanation: The 80286 allows three idle states
Ti
between the two INTA cycles, to meet the 8259A speed and cascade address output delay.
To practice all areas of Microprocessors for tests, here is complete set of 1000+ Multiple Choice
Questions and Answers .
MCQs
1. In which of these modes, the immediate operand is included in the instruction itself?
Answer: b
Explanation: In immediate operand mode, the immediate operand is included in the instruction
itself.
c) si or di
Answer: d
Explanation: In register address mode, the operand is stored either in one of the 8-bit or 16-bit
general purpose registers or in SI, DI, BX or BP.
3. In which of the following addressing mode, the offset is obtained by adding displacement and
contents of one of the base registers?
a) direct mode
b) register mode
c) based mode
d) indexed mode
Answer: c
Explanation: In a based mode, the offset is obtained by adding displacement and contents of
one of the base registers, either BX or BP.
4. In which of the following addressing mode, the offset is obtained by adding displacement, with
the contents of SI?
a) direct mode
b) register mode
c) based mode
d) indexed mode
Answer: d
Explanation: In an indexed mode, the offset is obtained by adding displacement, with contents
of an index register, either SI or DI.
5. The address of a location of the operand is calculated by adding the contents of any of the
base registers, with the contents of any of index registers in
c) based mode
d) indexed mode
Answer: b
Explanation: In a based indexed mode, the operand is stored at a location, whose address is
calculated by adding the contents of any of the base registers, with the contents of any of the
index registers.
b) ASCII
c) Packed BCD
Answer: d
Explanation: The 80286 supports seven data types. They are
1. integer
2. Ordinal
unsigned
3. pointer
4. string
5. ASCII
6. BCD
7. Packed BCD.
7. The representation of 8-bit or 16-bit signed binary operands using 2’s complement is a data
type of
a) Ordinal
b) ASCII
c) Packed BCD
d) integer
Answer: d
Explanation: In integer data type, 8-bit or 16-bit signed binary operands are represented using
2’s complement.
8. The instruction that pushes the general purpose registers, pointer and index registers on to
the stack is
a) POPF
b) PUSH Imd
c) PUSH*A
d) PUSHF
Answer: c
Explanation: The PUSH*A instruction, pushes the general purpose registers, AX, CX, DX and
BX, pointer and index registers, SP, BP, SI, DI, on to the stack.
a) 1 bit
b) 2 bits
c) 4 bits
d) 16 bits
Answer: b
Explanation: The stack pointer is decremented by 16
eight2−byteregisters
.
Answer: d
Explanation: The POP*A instruction, pops all the contents of the registers DI, SI, BP, SP, BX,
DX, CX and AX from the stack in this sequence, that is exactly opposite to that of pushing.
11. The instruction that multiplies the content of AL with a signed immediate operand is
a) MUL
b) SMUL
c) IMUL
Answer: c
Explanation: The IMUL instruction multiplies the content of AL with a signed immediate operand,
and the signed 16-bit result is stored in AX.
b) RCR
c) ROR
Answer: d
Explanation: The rotate source, count is a group of four instructions containing RCL, RCR, ROL,
ROR.
To practice all areas of Microprocessors, here is complete set of 1000+ Multiple Choice
Questions and Answers .
source
then
a) TF is cleared
b) OF is cleared
c) TF is set
d) OF is set
Answer: b
Explanation: If CF is equal to MSB of operand
source
, the overflow flag is cleared, otherwise, it is set to 1.
a) IMUL
b) INSW
c) INSB
d) POP*A
Answer: a
Explanation: No flags are affected by the instructions, INSW, INSB and POP*A.
3. A general protection exception is generated, if the value of
Answer: c
Explanation: When the value of CPL is greater than that of IOPL, a general protection exception
is generated.
a) 1
b) 2
c) 3
d) 4
Answer: b
Explanation: The SI is automatically incremented by 1 for byte
OUTSB
and 2 for word
OUTSW
operations.
a) QUIT
b) STOP
c) LEAVE
d) EXIT
Answer: c
Explanation: The instruction, LEAVE, is generally used with high level languages, to exit a
procedure.
6. The instruction that determines the number of bytes, to be copied into the new stack frame,
from the previous stack is
a) ENTER
b) BOUND
c) CLTS
d) LEAVE
Answer: a
Explanation: The ENTER instruction prepares a stack structure for parameters of a procedure to
be executed further. This instruction determines the number of bytes to be copied, into the new
stack frame, from the previous stack.
7. The instruction that is used to check whether a signed array offset is within the limit, defined
for it by the starting and ending index is
a) ENTER
b) BOUND
c) CLTS
d) LEAVE
Answer: b
Explanation: The BOUND instruction is used to check whether a signed array offset is within the
limit defined for it, by the starting and ending index.
8. The CLTS
ClearTaskSwitchFlag
instruction records every execution of WAIT and ESC and is trapped if the flag
a) PE
ProtectionEnable
and TS
taskswitch
Answer: c
Explanation: The CLTS
ClearTaskSwitchFlag
instruction records every execution of WAIT and ESC, and is trapped, if the MP flag and task
switched flag is set.
9. The instruction that determines whether the segment pointed to, by a 16-bit register, can be
accessed from the current privilege level is
a) RPL
b) CPL
c) ARPL
d) VERR
Answer: d
Explanation: The VERR/VERW instructions determine whether the segment pointed to, by a
16-bit register, can be accessed from the current privilege level.
10. The instruction that loads 6 bytes from a memory block, pointed to by the effective address
of the operand, into global descriptor table register is
a) LLDT
b) SGDT
c) LGDT
Answer: c
Explanation: The LGDT
loadglobaldescriptortableregister
loads 6 bytes from a memory block, pointed to by the effective address of the operand, into
global descriptor table register.
11. In LGDT instruction, while loading 6 bytes, the first word is loaded into the field of
a) LIMIT field
b) BASE field
Answer: a
Explanation: While loading the 6 bytes, the first word is loaded into the LIMIT field of the
descriptor table register. The next three bytes are loaded into the BASE field of the register, and
the remaining byte is ignored.
To practice all areas of Microprocessors for Quizzes, here is complete set of 1000+ Multiple
Choice Questions and Answers .
MCQs
Answer: d
Explanation: The three blocks of an internal architecture of 80287 are:
1. bus control logic
2. data interface and control unit
3. floating point unit.
2. The unit that provides and controls the interface, between the internal 80287 bus and 80286
bus via data buffer is
Answer: a
Explanation: The bus control logic provides and controls the interface, between the internal
80287 bus and 80286 bus via data buffer.
c) instruction decoders
Answer: d
Explanation: The data interface and control unit contains status and controls words, TAG words
and error pointers.
4. The word that optimizes the NDP performance, by maintaining a record of empty and
non-empty register locations is
b) TAG words
c) Error pointers
Answer: b
Explanation: The TAG word optimizes the NDP performance by maintaining a record of empty
and non-empty register locations. It helps the exception handler to identify special values in the
contents of the stack locations.
5. The part of the data interface and control unit, that points to the source of exception
generated is
b) TAG words
c) Error pointers
Answer: c
Explanation: The error pointers point to the source of exception
addressoftheinstructionthatgeneratedtheexception
generated.
a) 16 bits
b) 32 bits
c) 64 bits
d) 84 bits
Answer: d
Explanation: The data bus in a floating point unit is of 84-bits. Out of this 84-bits, the lower 68
bits are significant
mantissa
data bit, the next 16 bits are used for the exponent.
7. The arrangement of data that is to be shifted successively, whenever required for the
execution, is done by
a) error pointer
b) data buffer
c) barrel shifter
Answer: c
Explanation: The barrel shifter arranges and presents the data to be shifted successively,
whenever required for the execution.
8. The word that is used to select one of the processing options, among the provided ones is
a) status word
b) control word
Answer: b
Explanation: The control word is used to select one of the processing options, among the ones
provided by 80287.
9. After reset of 80287, the control bit that is initialized to zero is
a) masking bits
Answer: d
Explanation: The infinity control bit is initialized to zero after reset.
10. The bits that are modified depending upon the result of the execution of arithmetic
instructions are
a) masking bits
Answer: c
Explanation: The condition code bits are similar to the flags of a CPU. These are modified
depending upon the result of the execution of arithmetic instructions.
To practice all areas of Microprocessors, here is complete set of 1000+ Multiple Choice
Questions and Answers .
1. If the stack flag is set, and condition code bit C1=1, then the stack is
a) full
b) overflown
c) underflown
d) empty
Answer: b
Explanation: If the stack flag is set, and condition code bit C1=1, then the stack has overflown.
2. If the stack flag is set, and condition code bit C1=0, then the stack is
a) full
b) overflown
c) underflown
d) empty
Answer: c
Explanation: If the stack flag is set, and condition code bit C1=0, then the stack has underflown.
3. The bits that affect the result of arithmetic operations like ADD, SUB, MUL, DIV are
c) masking bits
Answer: d
Explanation: The precision control bits affect ADD, SUB, MUL, DIV and SQRT results.
a) opcode
Answer: c
Explanation: For other than the arithmetic instructions
likeADD,SUB,MUL,DIVandSQRT
, the precision is decided by opcode or extended precision format.
NPWR
a) memory to processor
b) 80287 to 80286
c) 80286 to 80287
d) 8086 to 80287
Answer: c
Explanation: If Numeric Processor Write
NPWR
active-low input pin is activated, then it enables a data transfer from 80286 to 80287.
NPRD
a) memory to processor
b) 80287 to 80286
c) 80286 to 80287
d) 8086 to 80287
Answer: b
Explanation: If Numeric Processor Read
NPRD
active-low input pin is activated, then it enables a data transfer from 80287 to 80286.
indicate that the CPU is performing an escape operation, and enables 80287 to execute the
next instruction?
a) NPWR
activelow
and NPRD
activelow
activelow
c) NPS1
activelow
and NPS2
Answer: c
Explanation: The Numeric Processor select input lines, NPS1
activelow
and NPS2, indicate that the CPU is performing an escape operation, and enables 80287 to
execute the next instruction.
8. For which pin of 80286 is the active low pin, BUSY of 80287, connected?
a) ERROR
activelow
b) BUSY
activelow
c) HLDA
d) TEST
activelow
Answer: d
Explanation: The BUSY
activelow
is connected to the TEST
activelow
pin of 80286.
9. If Clock Mode
CM
a) 1
b) 2
c) 3
d) 4
Answer: b
Explanation: If Clock Mode
CM
input pin is held high, then the CLK input is directly used for deriving the internal timings. Else,
it is divided by 2.
10. Which of the following pin is not involved in the interface of 80287 with 80286?
a) PEREQ
b) ERROR#
c) RESET
Answer: c
Explanation: The 10 pins, PEREQ, PEACK#, BUSY#, ERROR#, NPRD
activelow
#, NPWR
activelow
#, NPS1
activelow
#, NPS2#, CMD0 and CMD1.
activelow
a) PEREQ
b) ERROR#
c) RESET
Answer: a
Explanation: When the data transfer is over, the CPU activates PEACK
activelow
# pin, which results in deactivating the PEREQ pin by 80287.
To practice MCQs on all areas of Microprocessors, here is complete set of 1000+ Multiple
Choice Questions and Answers .
MCQs
Answer: d
Explanation: The 80386DX is a 32-bit processor that supports, 8-bit/16-bit/32-bit data operands.
a) 8 address lines
b) 16 address lines
c) 32 address lines
d) 64 address lines
Answer: c
Explanation: The 80386, with its 32-bit address bus, can address up to 4 GB of physical
memory.
3. The number of debug registers that are available in 80386, for hardware debugging and
control is
a) 2
b) 4
c) 8
d) 16
Answer: c
Explanation: The 80386 offers a set of total eight debug registers DR0-DR7, for hardware
debugging and control.
a) virtual memory
b) paging
Answer: d
Explanation: The memory management section of 80386 supports the virtual memory, paging
and four levels of protection, maintaining full compatibility with 80286.
5. The 80386 enables itself to organize the available physical memory into pages, which is
known as
a) segmentation
b) paging
c) memory division
Answer: b
Explanation: The concept of paging which is introduced in 80386, enables it to organize the
available physical memory into pages of size 4 KB each, under the segmented memory.
Answer: d
Explanation: The 80386 has on-chip address translation cache, and the instruction set is
upward compatible with all its predecessors.
a) 64 pin
b) 128 pin
c) 132 pin
d) 142 pin
Answer: c
Explanation: The 80386DX is available in a 132-pin grid array package.
Answer: b
Explanation: The operating frequency of 80386DX is 20MHz and 33 MHz.
9. The 80386 in its protected mode, in its virtual mode of operation, can run the applications of
a) 8086
b) 80286
c) 80287
d) 80387
Answer: a
Explanation: The 80386 can run the applications under protected mode, in its virtual 8086 mode
of operation.
10. The 80386 in protected mode, supports all software written for
a) 8086 and 80287
Answer: d
Explanation: The 80386 in protected mode, supports all software written for 8086 and 80286
tobeexecutedunderthecontrolofmemorymanagementandprotectionabilitiesof80386
.
To practice all areas of Microprocessors, here is complete set of 1000+ Multiple Choice
Questions and Answers .
MCQs
Answer: d
Explanation: The internal architecture of 80386 is divided into three sections namely, central
processing unit, memory management unit and bus interface unit.
Answer: c
Explanation: The central processing unit is further divided into the execution unit and instruction
unit.
3. The unit that is used for handling data, and calculates offset address is
b) execution unit
c) instruction unit
Answer: b
Explanation: The execution unit has eight general purpose and eight special purpose registers,
which are either used for handling the data or calculating the offset addresses.
4. The unit that decodes the opcode bytes, received from the 16-byte instruction code queue is
b) execution unit
c) instruction unit
d) barrel shifter
Answer: c
Explanation: The instruction unit decodes the opcode bytes, received from the 16-byte
instruction code queue, after decoding them so as to pass it to the control section, for deriving
the necessary control signals.
5. The unit that increases the speed of all shift and rotate operations is
b) execution unit
c) instruction unit
d) barrel shifter
Answer: d
Explanation: The barrel shifter speeds up all shift and rotate operations.
a) segmentation unit
b) paging unit
Answer: c
Explanation: The memory management unit consists of a segmentation unit and a paging unit.
Answer: d
Explanation: The segmentation unit allows the use of two address components. They are:
segment and offset for relocation and sharing of code and data.
8. The unit that organizes the physical memory, in terms of pages of 4KB size each is
a) segmentation unit
b) execution unit
c) paging unit
d) instruction unit
Answer: c
Explanation: The paging unit organizes the physical memory, in terms of pages of 4KB size
each.
b) segmentation unit
c) execution unit
d) instruction unit
Answer: b
Explanation: The paging unit works under the control of the segmentation unit; i.e. each
segment is further divided into pages.
10. The unit that provides a four level protection mechanism, for system’s code and data against
application program is
b) segmentation unit
Answer: b
Explanation: The segmentation unit provides a four level protection mechanism, for protecting
and isolating the system’s code and data, from those of the application program.
11. The unit that has a prioritizer to resolve the priority of the various bus requests is
b) data buffer
d) execution unit
Answer: c
Explanation: The bus control unit has a prioritizer to resolve the priority of the various bus
requests.
12. The unit that interfaces the internal data bus with the system bus is
b) data buffer
d) execution unit
Answer: b
Explanation: The data buffer interfaces the internal data bus with the system bus.
13. The unit that drives the bus enable and address signals A0-A31 is
c) address driver
d) bus driver
Answer: c
Explanation: The address driver drives the bus enable and address signals A0-A31.
14. Which of the following pin when activated, allows address pipelining?
a) ADS
b) NA
c) AP
Answer: b
Explanation: The Next Address
NA
input pin, if activated, allows address pipelining, during 80386 bus cycles.
15. The signal that is used to insert WAIT states in a bus cycle in 80386 is
a) HOLD
b) HLDA
c) READY
d) PEREQ
Answer: c
Explanation: READY signal is used to insert WAIT states in a bus cycle, and is useful for
interfacing of slow devices with the CPU.
16. The signal which indicates to the CPU, to fetch a data word for the coprocessor is
a) READY
b) NMI
c) HLDA
d) PEREQ
Answer: d
Explanation: The Processor Extension Request
PEREQ
output signal indicates to the CPU to fetch a data word for the coprocessor.
a) data signals
b) address signals
c) control signals
Answer: c
Explanation: The pipeline and dynamic bus sizing units handle the related control signals.
To practice all areas of Microprocessors, here is complete set of 1000+ Multiple Choice
Questions and Answers .
MCQs
1. The 16-bit registers are available with their extended size of 32 bits, by adding the registers
with a prefix of
a) X
b) E
c) 32
d) XX
Answer: b
Explanation: A 32 bit register, known as an extended register, is represented by the register
name with a prefix of E.
2. In a 32-bit register, ESP, the lower 16-bits of the register can be represented by
a) LSP
b) FSP
c) SP
Answer: c
Explanation: Though the extended size of 32 bits are named as EBP, ESP, ESI and EDI, the
names BP, SP, SI and DI represent the lower 16-bits.
a) ES
b) FS
c) GS
Answer: d
Explanation: The six segment registers available in 80386 are CS, SS, DS, ES, FS and GS, out
of which DS, ES, FS and GS are the four data segment registers.
a) 8 bits
b) 16 bits
c) 32 bits
Answer: d
Explanation: The 32-bit addressing modes may use all the register widths, i.e. 8, 16 or 32 bits.
5. The flag that is additional in flag register of 80386, compared to that of 80286 is
a) VM flag
b) RF flag
c) VM and RF flag
Answer: c
Explanation: The VM and RF flags are added to the 80286 flag register, to derive the flag
register of 80386.
6. The VM
virtualmode
a) virtual mode
b) protected mode
Answer: b
Explanation: If VM flag is set, the 80386 enters the virtual 8086 mode within the protected
mode. This is to be set only when the 80386 is in protected mode.
a) IRET instruction
Answer: c
Explanation: The VM flag can be set using the IRET instruction or any task switch operation,
only in the protected mode.
8. During the instruction cycle of 80386, any debug fault can be ignored if
a) VM flag is set
b) VM flag is cleared
c) RF is cleared
d) RF is set
Answer: d
Explanation: If RF
resumeflag
is set, any debug fault is ignored during the instruction cycle.
9. The RF is not automatically reset after the execution of
a) IRET
b) POPA
Answer: c
Explanation: The RF is automatically reset after the execution of every instruction, except for the
IRET and POPF instructions. Also, it is not cleared automatically after the successful execution
of JMP, CALL and INT instructions causing a task switch.
a) attributes
Answer: d
Explanation: The segment descriptor register is used to store the descriptor information like
attributes, limit and base addresses of segments.
To practice all areas of Microprocessors, here is complete set of 1000+ Multiple Choice
Questions and Answers .
This set of Microprocessors Multiple Choice Questions & Answers focuses on “Register
Organisation of 80386 -2”.
1. The 32-bit control register, that is used to hold global machine status, independent of the
executed task is
a) CR0
b) CR2
c) CR3
Answer: d
Explanation: The 80386 has three 32-bit control registers CR0, CR2 and CR3, to hold global
machine status, independent of the executed task.
a) GDT
Globaldescriptortable
b) IDT
Interruptdescriptortable
c) LDT
Localdescriptortable
Answer: d
Explanation: The 80386 supports four types of descriptor tables. They are, GDT, IDT, LDT and
TSS.
3. The registers that are together, known as system address registers are
c) TR and GDTR
d) LDTR and TR
Answer: a
Explanation: The GDTR and IDTR are known as system address registers.
a) GDTR
b) LDTR
c) IDTR
Answer: b
Explanation: The LDTR and TR are known as system segment registers.
Answer: c
Explanation: Two test registers are provided by 80386 for page caching, namely test control and
test status registers.
6. Among eight debug registers, DR0-DR7, the registers that are reserved by Intel are
b) DR4, DR5
c) DR1, DR4
Answer: b
Explanation: Out of the eight debug registers, the two registers DR4 and DR5 are Intel reserved.
7. The registers that are used to store four program controllable break point addresses are
a) DR5-DR7
b) DR0-DR1
c) DR6-DR7
d) DR0-DR3
Answer: d
Explanation: The initial four registers, DR0-DR3 store four program controllable break point
addresses.
Answer: a
Explanation: The registers DR6 and DR7 respectively hold break point status and break point
control information.
9. The flag bits that indicate the privilege level of current IO operations are
Answer: b
Explanation: The IOPL flag bits indicate the privilege level of current IO operations.
10. The registers that are not available for programmers are
b) instruction pointers
d) flag registers
Answer: c
Explanation: The segment descriptor registers of 80386 are not available for programmers,
rather, they are internally used to store the descriptor information.
To practice all areas of Microprocessors, here is complete set of 1000+ Multiple Choice
Questions and Answers .
a) 2
b) 4
c) 6
d) 8
Answer: c
Explanation: In case of the scaled the modes, any of the index register values can be multiplied
by a valid scale factor to obtain the displacement. The valid scale factors are 1, 2, 4 and 8.
2. Contents of an index register are multiplied by a scale factor that may be added further to get
the operand offset in
c) indexed mode
Answer: b
Explanation: In scaled indexed mode, contents of an index register are multiplied by a scale
factor that may be added further to get the operand offset.
3. Contents of an index register are multiplied by a scale factor and then added to base register
to get the operand offset in
c) indexed mode
Answer: a
Explanation: In base scaled indexed mode, contents of an index register are multiplied by a
scale factor and then added to base register to get the operand offset.
4. In the based scaled indexed mode with displacement mode, the contents of an index register
are multiplied by a scale factor and are added to
a) base register
b) displacement
Answer: c
Explanation: Contents of an index register are multiplied by a scale factor and the result is
added to a base register and a displacement to get the offset of an operand.
c) indexed mode
Answer: a
Explanation: Since in base scaled indexed mode, contents of an index register are multiplied by
a scale factor and then added to base register to get the operand offset.
c) indexed mode
Answer: b
Explanation: Since in scaled indexed mode, contents of an index register are multiplied by a
scale factor that may be added further to get the operand offset.
7. Bit field can be defined as a group of
a) 8 bits
b) 16 bits
c) 32 bits
d) 64 bits
Answer: c
Explanation: A group of at the most 32 bits
4bytes
is defined as a bit field.
a) 2 MB
b) 4 MB
c) 2 GB
d) 4 GB
Answer: d
Explanation: Bit string is a string of contiguous bits of maximum 4Gbytes in length.
Answer: c
Explanation: The integer word is the signed 16-bit data.
10. A 16-bit displacement that references a memory location using any of the addressing modes
is
a) Pointer
b) Character
c) BCD
d) Offset
Answer: d
Explanation: Offset is a 16-bit or 32-bit displacement that references a memory location using
any of the addressing modes.
a) unsigned integer
b) signed integer
c) unpacked BCD
d) packed BCD
Answer: c
Explanation: Decimal digits from 0-9 are represented by unpacked bytes.
To practice all areas of Microprocessors, here is complete set of 1000+ Multiple Choice
Questions and Answers .
MCQs
1. The instructions available in the 80386 that are not available in its real address mode is
a) addressing techniques
Answer: b
Explanation: All the instructions of 80386 are available in this mode except for those designed to
work with or for protected address mode.
Answer: c
Explanation: The paging unit is disabled in real address mode.
Answer: d
Explanation: To form a physical memory address, appropriate segment register contents are
shifted by left by 4 positions and then added to 16-bit offset address formed using one of
addressing modes, in same way as in the 80386 real address mode.
a) overlapped
b) non-overlapped
Answer: c
Explanation: The segments in 80386 real mode are may be overlapped or non-overlapped.
a) read
b) write
c) execute
Answer: d
Explanation: The segments in 80386 real mode can be read, written or executed, i.e. no
protection is available.
6. The selectors contain the segment’s
a) segment limit
b) base address
Answer: d
Explanation: In protected mode, the contents of segment registers are used as selectors to
address descriptors which contain the segment limit, base address and access rights byte of the
segment.
Answer: a
Explanation: The effective address
offset
is added with segment base address to calculate linear address.
a) effective address
b) physical address
Answer: b
Explanation: The paging unit when enabled, it converts a linear address into physical address.
a) effective address
b) physical address
c) segment base address
Answer: b
Explanation: The linear address is used as a physical address if the paging unit is disabled.
a) virtual mode
b) addressing mode
c) protected mode
Answer: c
Explanation: The paging unit is enabled only in protected mode.
11. For a single task in protected mode, the 80386 can address the virtual memory of
a) 32 GB
b) 64 MB
c) 32 TB
d) 64 TB
Answer: d
Explanation: In protected mode, the 80386 can address 4 GB of physical memory and 64 TB of
virtual memory per task.
To practice all areas of Microprocessors, here is complete set of 1000+ Multiple Choice
Questions and Answers .
MCQs
focuses on “Segmentation”.
1. The bit that indicates whether the segment has been accessed by the CPU or not is
a) base address
b) attribute bit
c) present bit
d) granular bit
Answer: b
Explanation: The accessed bit or attribute bit
A
indicates whether the segment has been accessed by the CPU or not.
a) descriptor type
b) segment type
d) none
Answer: c
Explanation: The type field decides the descriptor type and hence the segment type.
c) system descriptor
Answer: c
Explanation: If S=0, then system descriptor. If S=1, then code or data segment descriptor.
a) base address
b) attribute bit
c) present bit
d) granularity bit
Answer: d
Explanation: The granularity bit indicates whether the segment is page addressable.
5. If the Default operation size bit, D=1, the code segment operation size selected is
a) 8-bit
b) 16-bit
c) 32-bit
d) 64-bit
Answer: c
Explanation: If D=1, the segment selected is 32-bit operand segment, else, it is a 16-bit operand
segment.
a) access rights
b) limit
c) base address
Answer: d
Explanation: The segment descriptors are 8-byte quantities containing access right or attribute
bits along with the base and limit of the segments.
a) system descriptors
b) local descriptors
c) gate descriptors
d) none
Answer: d
Explanation: The five types of segment descriptors of 80386 are:
1. Code or data segment descriptors
2. System descriptors
3. Local descriptors
4. TSS
taskstatesegment
descriptors
5. Gate descriptors.
8. The limit field of the descriptor is of
a) 10 bits
b) 8 bits
c) 16 bits
d) 20 bits
Answer: d
Explanation: The limit field of the descriptor is of 20 bits.
a) physical memory
b) segment descriptors
c) operating system
d) base address
Answer: c
Explanation: The base address that marks the starting address of the segment in physical
memory is decided by the operating system and is of 32 bits.
a) 2K
b) 8K
c) 4K
d) 16K
Answer: d
Explanation: 80386 can handle total 16K descriptors and hence segments.
To practice all areas of Microprocessors, here is complete set of 1000+ Multiple Choice
Questions and Answers .
MCQs
focuses on “Paging”.
1. The advantage of pages in paging is
Answer: d
Explanation: The advantage of paging scheme is that the complete segment of a task need not
be in the physical memory at any time. Only a few pages of the segments, which are required
currently for the execution, need to be available in the physical memory.
a) variable
b) fixed
d) none
Answer: b
Explanation: The paging divides the memory into fixed size pages.
3. To convert linear addresses into physical addresses, the mechanism that the paging unit uses
is
Answer: d
Explanation: The paging unit of 80386 uses a two level table mechanism, to convert the linear
addresses provided by the segmentation unit, into physical addresses.
4. The control register that stores the 32-bit linear address, at which the previous page fault is
detected is
a) CR0
b) CR1
c) CR2
d) CR3
Answer: c
Explanation: The control register, CR2, is used to store the 32-bit linear address, at which the
previous page fault is detected.
a) page directory
c) page table
d) page
Answer: b
Explanation: The paging unit handles every task in terms of three components namely page
directory, page table and the page itself.
6. The control register that is used as page directory physical base address register is
a) CR0
b) CR1
c) CR2
d) CR3
Answer: d
Explanation: The control register, CR3, is used as page directory physical base address
register, to store the physical starting address of the page directory.
a) higher 4 bits
b) lower 8 bits
c) higher 10 bits
d) lower 12 bits
Answer: d
Explanation: The lower 12 bits of CR3 are always zero to ensure the page size aligned with the
directory.
a) 2 bytes
b) 4 bytes
c) 8 bytes
d) 16 bytes
Answer: b
Explanation: Each directory entry is of 4 bytes, thus a total of 1024 entries are allowed in a
directory.
a) 2 Kbytes
b) 2 bytes
c) 4 Kbytes
d) 4 bytes
Answer: c
Explanation: Each page table is of 4 Kbytes in size, and may contain a maximum of 1024
entries.
a) write
b) read
c) initialization
Answer: a
Explanation: The dirty bit
D
is set before a write operation to the page is carried out.
a) P-bit
b) A-bit
c) D-bit
Answer: c
Explanation: The D-bit is undefined for page directory entries.
a) User/Supervisor bit
b) Read bit
c) Write bit
Answer: d
Explanation: The User/Supervisor
U/S
bit and Read/Write
R/W
bit are used to provide protection.
13. The storage of 32 recently accessed page table entries to optimize the time, is known as
a) page table
Answer: c
Explanation: To optimize the considerable time taken for conversion, a page table cache is
provided, which stores the 32 recently accessed page table entries.
14. The page table cache is also known as
b) storage buffer
Answer: c
Explanation: The page table cache is also known as translation look aside buffer.
To practice all areas of Microprocessors, here is complete set of 1000+ Multiple Choice
Questions and Answers .
MCQs
1. If the 80386 enters the protected mode from the real address mode, then it returns back to
the real mode, by performing the operation of
a) read
b) write
c) terminate
d) reset
Answer: d
Explanation: If the 80386 enters the protected mode from the real address mode, then it cannot
return back to the real mode without a reset operation.
2. The unit that is needed for virtual mode 80386, only to run the 8086 programs, which require
more than 1 Mbyte of memory for memory management functions, is
a) execution unit
c) paging unit
d) segmentation unit
Answer: c
Explanation: Paging unit is not necessarily enabled in the virtual mode, but may be needed to
run the 8086 programs, which require more than 1 Mbyte of memory, for memory management
functions.
3. The number of pages that the paging unit allows, in the virtual mode of 80386 is
a) 64
b) 128
c) 256
d) 512
Answer: c
Explanation: In virtual mode, the paging unit allows only 256 pages, each of 4Kbytes size. Each
of the pages may be located anywhere within the maximum 4Gbytes physical memory.
4. The privilege level at which the real mode programs are executed is
a) level 0
b) level 1
c) level 2
d) level 3
Answer: a
Explanation: The real mode programs are executed at the highest privilege level i.e. level 0.
5. The instructions to prepare the processor for protected mode can only be executed at the
privilege level
a) level 0
b) level 1
c) level 2
d) level 3
Answer: a
Explanation: The instructions to prepare the processor for protected mode can only be executed
at the level 0.
bit is
a) PUSHF
b) IRET
c) POPF
Answer: d
Explanation: The PUSHF and POPF instructions are unable to set or read the VM
VirtualMode
bit, as they do not access it. The virtual mode can be entered by using IRET instruction.
b) protected mode
c) synchronous mode
d) asynchronous mode
Answer: c
Explanation: If the CKM pin of 80387 is high, then 80387 is operated in synchronous mode. If it
is low, then 80387 is operated in asynchronous mode.
8. The unit that handles the data and directs it to either FIFO or instruction decoder depending
on the bus control logic directive is
a) paging unit
c) segmentation unit
Answer: d
Explanation: The data interface and control unit handles the data, and direct it to either FIFO or
instruction decoder, depending on the bus control logic directive.
9. The unit that is responsible for carrying out all the floating point calculations, allotted to the
coprocessor by 80386, is
b) ALU
c) FPU
Answer: c
Explanation: The FPU
floatingpointunit
is responsible for carrying out all the floating point calculations, allotted to the coprocessor by
80386.
10. The sizes of instruction and data pointer registers of 80387 respectively are
a) 32-bit, 32-bit
b) 48-bit, 32-bit
c) 32-bit, 48-bit
d) 48-bit, 48-bit
Answer: d
Explanation: 80387 consists of two 48-bit registers, known as instruction and data pointer
registers.
11. To inform 80387 that the CPU wants to communicate with NPS1, the NPS1 line is directly
connected to
a) A31
b) A30
c) M/IO
d) D31
Answer: c
Explanation: The NPS1 and NPS2 lines are directly connected with M/IO and A31 respectively,
to inform 80387 that the CPU wants to communicate with it
NPS1
, and it is using one of the reserved I/O addresses for 80387
NPS2
.
To practice all areas of Microprocessors, here is complete set of 1000+ Multiple Choice
Questions and Answers .
MCQs
1. Which of the following is not a newly added instruction of 80386, that are not present in
80286?
Answer: d
Explanation: The newly added instructions of 80386 are categorized into
1. bit scan instructions
2. bit test instructions
3. conditional set byte instructions
4. shift double instructions
5. control transfer via gates instructions.
2. The BSF
bitscanforward
Answer: b
Explanation: The BSF
bitscanforward
instruction scans the operand from right to left.
3. The BSR
bitscanreverse
Answer: a
Explanation: The BSR
bitscanreverse
instruction scans the operand from left to right.
c) VM flag is set
d) RF flag is reset
Answer: b
Explanation: The BSF instruction scans the operand from right to left. If a ‘1’ is encountered
during the scan, zero flag is set, and the bit position of ‘1’ is stored into the destination operand.
c) VM flag is reset
d) RF flag is set
Answer: a
Explanation: The BSR instruction scans the operand from left to right. If a ‘1’ is not encountered
during the scan, zero flag is reset whether the scan is BSF or BSR.
a) BTC
b) BTS
c) BSF
d) BTR
Answer: c
Explanation: The instruction, BSF, is a bit scan instruction. The four bit test instructions are:
BT
TestaBit
, BTC
TestaBitandComplement
, BTR
TestandResetaBit
and BTS
TestandSetabit
.
7. In case of BT instruction, if the bit position in the destination operand specified by the source
operand, is ‘1’, then
c) VM flag is set
d) RF flag is reset
Answer: b
Explanation: In case of BT instruction, if the bit position in the destination operand specified by
the source operand, is ‘1’, the carry flag is set, otherwise it is cleared.
a) SETNP
b) SETO
c) SETNAE
d) SHRD
Answer: d
Explanation: The SHRD
ShiftRightDouble
is a shift double instruction.
9. The instruction that shifts the specified number of bits in the instruction, from the upper side
of the source operand into the lower side of the destination operand is
a) SHRD
b) SHLD
c) SETNS
Answer: b
Explanation: The SHLD instruction shifts the specified number of bits in the instruction, from the
upper side
i.e.MSB
of the source operand into the lower side
i.e.LSB
of the destination operand.
10. The instruction that shifts 8 LSB bits of ECX into the MSB positions of EAX, one by one
starting from LSB of ECX is
a) SHLD ECX,EAX,8
b) SHLD EAX,ECX,8
c) SHRD ECX,EAX,8
d) SHRD EAX,ECX,8
Answer: d
Explanation: The SHRD instruction shifts the specified number of bits in the instruction, from the
lower side
i.e.LSB
of the source operand into the upper side
i.e.MSB
of the destination operand.
To practice all areas of Microprocessors, here is complete set of 1000+ Multiple Choice
Questions and Answers .
MCQs
a) 80386
b) 80486
c) 80286
d) 8086
Answer: b
Explanation: The 32-bit CPU 80486 from Intel is the first processor with an inbuilt floating point
unit. 80486DX is the first CPU with an on chip floating point unit.
2. Which of the following signal is handled by bus control and request sequencer?
a) ADS#
b) PWT
c) RDY#
Answer: d
Explanation: The bus control and request sequencer handle the signals like ADS#, PWT, RDY#,
W/R#, INTR, NMI, LOCK#, HOLD, HLDA, RESET and M/IO# which basically controls the bus
access and operations.
3. The unit that subjects the processor operation to boundary scan tests is
b) prefetcher unit
d) segmentation unit
Answer: c
Explanation: The boundary scan and control unit subjects the processor operation to boundary
scan tests to ensure the correct operation of various components of the mother board.
4. The management of the virtual memory of the system and adequate protection to data or
codes in the physical memory is provided by
a) segmentation unit
b) paging unit
c) attribute PLA
Answer: d
Explanation: The segmentation unit, paging unit, attribute PLA, descriptor registers, translation
look aside buffer and limit work together to manage the virtual memory of the system and
provide the adequate protection to the codes or data in the physical memory.
5. The flag that is added to 80486 in additional to the flags similar to 80386 is
c) conditional flag
Answer: a
Explanation: The register set of 80486 is similar to that of the 80386 but only a flag called as
alignment check flag is added to the flag register of 80386 to obtain the flag register of 80486.
a) low speed
Answer: b
Explanation: The major limitation of 80386-387 system is that the 80386 sends instruction or
data to 80387 using an I/O handshake technique. To perform this handshaking and to carry
additional house keeping tasks, 80386 requires 15 clock cycles or more.
b) ASCII
c) Floating point
d) None
Answer: d
Explanation: The datatypes that 80486 supports are
1. Signed
2. Unsigned
3. Floating point
4. BCD
5. String
6. ASCII.
a) MSB is stored at lower memory address and LSB at higher memory address
b) LSB is stored at lower memory address and MSB at higher memory address
Answer: b
Explanation: In Little Endian data format, for a data of size bigger than 1 byte, the LSB is stored
at lower memory address and MSB at higher memory address.
a) addresses of data
a) Cache disable
CD
b) No write through
NW
Answer: c
Explanation: Cache disable
CD
and No write through
NW
bits of control register CR0. To completely disable cache, the CD and NW bits must be 11.
11. The on-chip cache can be flushed using external hardware using
a) FLUSH pin
b) TERMINATE pin
c) FLOW pin
Answer: d
Explanation: The on-chip cache can be flushed using external hardware using pin FLUSH# or
using the software. The flushing operation clears all the valid bits for all the cache lines.
To practice all areas of Microprocessors and Micro-controllers, here is complete set of 1000+
Multiple Choice Questions and Answers .
a) superscalar architecture
b) superpipelined architecture
Answer: c
Explanation: The salient feature of Pentium is its superscalar, superpipelined architecture.
a) 2
b) 4
c) 3
d) 6
Answer: b
Explanation: The Pentium has two integer pipelines, U and V, where each one is a 4-stage
pipeline.
a) data cache
c) instruction cache
Answer: b
Explanation: The Pentium has two separate caches. They are data cache and instruction cache.
c) 4-stage pipelines
Answer: c
Explanation: The Pentium has two integer pipelines, U and V, where each one is a 4-stage
pipeline. This enhances the speed of integer arithmetic of Pentium to a large extent.
5. For enhancement of processor performance, beyond one instruction per cycle, the computer
architects employ the technique of
Answer: b
Explanation: For enhancement of processor performance, beyond one instruction per cycle, the
computer architects employ the technique of multiple instruction issue.
multipleinstructionissue
Answer: d
Explanation: The MII architecture may again be classified into two categories:
1. Very long instruction word architecture
2. Superscalar architecture.
7. The compiler reorders the sequential stream of code that is coming from memory into a fixed
size instruction group in
a) super pipelined architecture
Answer: c
Explanation: In VLIW processors, the compiler reorders the sequential stream of code that is
coming from memory into a fixed size instruction group, and issues them in parallel for
execution.
8. The architecture in which the hardware decides which instructions are to be issued
concurrently at run time is
d) superscalar architecture
Answer: d
Explanation: In the superscalar architecture, the hardware decides which instructions are to be
issued concurrently at run time.
9. The CPU has to wait until the execution stage to determine whether the condition is met in
a) unconditional branch
b) conditional branch
Answer: b
Explanation: In conditional branch, the CPU has to wait until the execution stage to determine
whether the condition is met or not. When the condition satisfies, a branch is to be taken.
10. The memory device that holds branch target addresses for previously executed branches is
a) Tristate buffer
b) RAM
c) ROM
Answer: d
Explanation: The branch target buffer in Pentium CPU holds branch target addresses for
previously executed branches.
Answer: d
Explanation: The branch target buffer is a four-way set-associative memory. Whenever a branch
is taken, the CPU enters the branch instruction address, and also the destination address in the
branch target buffer.
To practice all areas of Microprocessors for online tests, here is complete set of 1000+ Multiple
Choice Questions and Answers .
MCQs
1. The stage in which the CPU fetches the instructions from the instruction cache in superscalar
organization is
a) Prefetch stage
b) D1
firstdecode
stage
c) D2
seconddecode
stage
d) Final stage
Answer: a
Explanation: In the prefetch stage of pipeline, the CPU fetches the instructions from the
instruction cache, which stores the instructions to be executed. In this stage, CPU also aligns
the codes appropriately.
a) Prefetch stage
b) D1
firstdecode
stage
c) D2
seconddecode
stage
d) Final stage
Answer: b
Explanation: In D1 stage, the CPU decodes the instructions and generates control words. For
simple RISC instructions, only single control word is enough for starting the execution.
Answer: c
Explanation: The fifth stage or final stage of pipeline is also known as “Write back
WB
stage”.
Answer: d
Explanation: In the execution stage, known as E-stage, the CPU accesses data cache,
executes arithmetic/logic computations, and floating point operations in execution unit.
5. The stage in which the CPU generates an address for data memory references in this stage
is
a) prefetch stage
b) D1
firstdecode
stage
c) D2
seconddecode
stage
d) execution stage
Answer: c
Explanation: In the D2
seconddecode
stage, CPU generates an address for data memory references in this stage. This stage is
required where the control word from D1 stage is again decoded for final execution.
b) high bandwidth
Answer: d
Explanation: The separated caches have low hit ratio compared to a unified cache, but have the
advantage of supporting the superscalar organization and high bandwidth.
FloatingPointUnit
b) instruction cache
Answer: c
Explanation: In the operand fetch stage, the FPU
FloatingPointUnit
fetches the operands from either floating point register file or data cache.
8. The FPU
FloatingPointUnit
a) X1 execution state
b) X2 execution state
Answer: c
Explanation: In the two execution stages of X1 and X2, the floating point unit reads the data
from the data cache and executes the floating point computation. In the “write back stage” of
pipeline, the FPU
FloatingPointUnit
writes the results to the floating point register file.
a) single precision
b) double precision
c) extended precision
Answer: d
Explanation: The floating point multiplier segment performs floating point multiplication in single
precision, double precision and extended precision.
10. The instruction or segment that executes the floating point square root instructions is
Answer: c
Explanation: The floating point divider segment executes the floating point division and square
root instructions.
11. The floating point rounder segment performs rounding off operation at
Answer: b
Explanation: The results of floating point addition or division process may be required to be
rounded off, before write back stage to the floating point registers.
12. Which of the following is a floating point exception that is generated in case of integer
arithmetic?
a) divide by zero
b) overflow
c) denormal operand
13. The mechanism that determines whether a floating point operation will be executed without
creating any exception is
Answer: c
Explanation: A mechanism known as Safe Exception Recognition
SER
had been employed in Pentium which determines whether a floating point operation will be
executed without creating any exception.
To practice all areas of Microprocessors, here is complete set of 1000+ Multiple Choice
Questions and Answers .
This set of Tricky Microprocessors Questions and Answers focuses on “Enhanced Instruction
Set of Pentium, Intel MMX Architecture”.
a) FSIN
b) FCOS
c) FMUL
d) FPTAN
Answer: c
Explanation: The FMUL instruction is a float point multiplication, which is not a transcendental
instruction.
b) FSNE
c) FSINFCOS
d) FSINCOS
Answer: d
Explanation: The instruction, FSINCOS, supports to compute sine and cosine.
is
a) FTAN
b) FTNGNT
c) FPTAN
d) FXTAN
Answer: c
Explanation: The instruction, FPTAN, computes tan
x
.
is
a) FTAN
b) FACTN
c) FARCTAN
d) FPATAN
Answer: d
Explanation: The instruction, FPATAN, computes arctan
x
which is arc tangent of x.
a) 2X
b) 2X-1
c) 2X+1
d) 2X+2
Answer: b
Explanation: The instruction, F2XMI, is used to compute 2X-1.
a) Y*logX
b) Y*log2X
c) Y*log
2X+1
d) Y*log2
X+1
Answer: d
Explanation: The instruction, FYL2XP, supports to compute the expression Y*log2
X+1
.
7. The size of a general purpose floating point register of floating point unit is
a) 4 bytes
b) 40 bytes
c) 8 bytes
d) 80 bits
Answer: d
Explanation: There are eight general purpose floating point registers in the floating point unit.
Each of these eight registers are of 80-bits width.
8. For floating point operations, the bits used by mantissa in a floating point register is
a) 32
b) 64
c) 72
d) 79
Answer: b
Explanation: For floating point operations, 64 bits are used for the mantissa, and the rest 16 bits
for exponent.
Answer: c
Explanation: Most of the multimedia applications mainly require the architecture of single
instruction stream multiple data stream.
MultimediaExtension
register is
a) 32 bits
b) 64 bits
c) 128 bits
d) 256 bits
Answer: b
Explanation: The MMX registers use only the 64-bit mantissa portion of the general purpose
floating point registers, to store MMX operands. Thus, the MMX programmers virtually get eight
new MMX registers, each of 64 bits.
11. After a sequence of MMX instructions is executed, the MMX registers should be cleared by
an instruction,
a) CLEAR
b) RESET
c) EMM
d) EMMS
Answer: d
Explanation: After a sequence of MMX instructions is executed, the MMX registers should be
cleared by an instruction, EMMS, which implies Empty the MMX Stack.
12. The number of pixels that can be manipulated in a single register by the CPU using MMX
architecture is
a) 4
b) 6
c) 8
d) 10
Answer: c
Explanation: Any CPU can manipulate only one pixel at a time. But by using MMX architecture,
we can manipulate eight such pixels, packed in a single 64-bit register.
13. After executing the floating point instructions, the floating point registers should be cleared
by an instruction,
a) CLEAR
b) EFPR
c) EMMF
d) EMMS
Answer: d
Explanation: After executing the floating point instructions, the floating point registers should be
cleared by an instruction, EMMS.
To practice tricky questions and answers on all areas of Microprocessors, here is complete set
of 1000+ Multiple Choice Questions and Answers .
This set of Microprocessors online quiz focuses on “MMX Data Types, Wrap-around and
Saturation Arithmetic, Multimedia Application Programming, Pentium III
P−III
CPU”.
1. In the data type, packed byte, the number of bytes that can be packed into one 64-bit quantity
is
a) 2
b) 4
c) 8
d) 16
Answer: c
Explanation: In packed byte data type, eight bytes can be packed into one 64-bit quantity.
2. Four words can be packed into 64-bit by using the data type,
a) unpacked word
b) packed word
Answer: b
Explanation: By using the packed word data type, four words can be packed into 64-bits.
3. The number of double words that can be packed into 64-bit register using packed double
word is
a) 2
b) 4
c) 6
d) 8
Answer: a
Explanation: Using packed double word, two double words can be packed into 64-bit.
4. The data type, “one quad word” packs __________ into 64-bit.
Answer: d
Explanation: The data type, “one quad word” packs one single 64-bit quantity into 64-bit register.
exceededthan16bits
or underflowed then, only the lower 16-bits of the result are stored in the register and this effect
is known as
a) overflow/underflow effect
b) wrap-around effect
d) none
Answer: b
Explanation: If the result of an operation is overflowed
exceededthan16bits
or underflowed then, only the lower 16-bits of the result are stored in the register, and this effect
is known as wrap-around effect.
6. In a multitasking operating system environment, each task should return to its own processor
state which is
Answer: d
Explanation: In a multitasking operating system environment, each task should return to its own
processor state, which should be saved when the task switching occurs. The processor state
here means the contents of the registers, both integer and floating point or MMX register.
7. Which of the following exception generated by MMX is the same type of memory access
exception as the X86 instructions?
a) page fault
c) limit violation
Answer: d
Explanation: The MMX instruction set generates the same type of memory access exception as
the X86 instructions namely; page fault, segment does not present and limit violation.
8. When an MMX instruction is getting executed, the floating-point tag word is marked
a) 11
b) 10
c) 00
d) 01
Answer: c
Explanation: When an MMX instruction is getting executed, the floating-point tag word is marked
valid i.e. 00.
9. In a preemptive multitasking O.S., the saving and restoring of FP and MMX states are
performed by
a) Control unit
b) O.S.
c) MMX instructions
d) MMX registers
Answer: b
Explanation: In a preemptive multitasking O.S., the application does not know when it is
preemptied. It is the job of the O.S. to save and restore the FP and MMX states, when
performing a context switch. Thus the user need not save or restore the state.
10. The instruction of MMX that is essential when a floating-point routine calls an MMX routine
or viceversa is
a) MOV
b) PADD
c) EMMS
Answer: c
Explanation: The EMMS instruction is imperative when a floating point routine calls an MMX
routine or vice-versa. If we do not use EMMS at the end of MMX routine, subsequent
floating-point instructions will produce erratic results.
11. Pentium III is used in computers which run on the operating system of
a) windows NT
b) windows 98
c) unix
Answer: d
Explanation: Pentium III is the best option to use in computers from high performance desktop
to workstations and servers, running on operating systems like Windows NT, Windows 98 and
UNIX.
a) multimedia
b) image processing
c) speech processing
Answer: d
Explanation: The architecture of CPU of Pentium III is suitable for applications like imaging,
image processing, speech processing, multimedia and internet applications.
a) 300MHz,350MHz,400MHz
b) 400MHz,450MHz,500MHz
c) 350MHz,400MHz,450MHz
d) 450MHz,500MHz,550MHz
Answer: d
Explanation: The Pentium III has three versions operating at frequencies, 450MHz, 500MHz and
550MHz, which are all commercially available.
Answer: d
Explanation: The Pentium III has dual independent bus architecture that increases the
bandwidth. It has a 512 Kbyte unified, non-blocking level2 cache and eight 64-wide Intel MMX
registers.
To practice all areas of Microprocessors for online Quizzes, here is complete set of 1000+
Multiple Choice Questions and Answers .
MCQs
1. The additional instructions that are designed especially for performing multimedia tasks are
known as
Answer: c
Explanation: The MMX technology adds 57 new instructions to the instruction set of processors.
These instructions are known as enhanced MMX instructions and are designed specifically for
performing multimedia tasks.
a) source operand
b) destination operand
Answer: d
Explanation: The instruction, EMMS, does not have any operand.
a) Memory
b) RAM
d) MMX register
Answer: d
Explanation: In all the MMX instructions, the source operand is found either in an MMX register
or in memory, and the destination operand resides in MMX register.
4. For the MMX instructions, the prefix, P, is used to represent the mode of
b) virtual mode
c) packed mode
d) programmable mode
Answer: c
Explanation: In the MMX instructions, if the operands are in the packed mode, the prefix, P, is
used to indicate packed data.
a) status
b) saturation
c) signed saturation
d) unsigned saturation
Answer: c
Explanation: For the MMX instructions, the suffix “S” indicates signed saturation, and “US”
indicates unsigned saturation, while executing arithmetic computation in saturation mode.
a) PADD
b) PCMPEQ
c) PAND
Answer: d
Explanation: The instructions, PADD, PCMPEQ and PAND are used for packed byte, word and
double word.
a) packed word
b) packed byte
d) unpacked word
Answer: b
Explanation: The instruction, PSUBB, performs subtraction in a packed byte.
8. The instruction, PCMPGT, is used to compare two data types and check
a) equal to condition
b) less than condition
Answer: c
Explanation: The instruction, PCMPGT, compares to check the greater than condition in packed
bytes, packed words and packed double words.
a) MOV
b) PSLL
c) PSRA
Answer: c
Explanation: The instruction, PSRA, performs arithmetic shift, right in a single cycle. It supports
only the shifting of packed word and double word data types.
10. When the instruction, PMULLW, is performed, then the lower order 16-bits of the 32 bit
products are stored in
a) source operand
b) destination operand
Answer: b
Explanation: In the instruction, PMULLW, four 16 X 16 multiplications are performed, and the
lower order 16 bits of the 32-bit products are stored in destination.
11. When the instruction, PMULHW, is performed, then the higher order 16-bits of the 32 bit
products are stored in
a) source operand
b) destination operand
Answer: b
Explanation: In the instruction, PMULHW, four 16 X 16 multiplications are performed, and the
higher order 16 bits of the 32-bit products are stored in destination.
12. The instruction in which both multiplication and addition are performed is
a) PAND
b) PMULHW
c) PADD
d) PMADDWD
Answer: d
Explanation: PMADDWD is an important multimedia instruction, which multiplies the four signed
words of the destination operand, with four signed words of source operand. This results in
32-bit double words which are added, and the result is stored in the higher double word of the
destination operand.
13. If the result of PCMPEQ, which is a comparison of two packed data types, is a success, then
the mask generated is
a) mask 0s
b) mask 1s
c) mask 2s
d) mask 3s
Answer: b
Explanation: If the result of PCMPEQ, which is a comparison of two packed data types is a
success, then the mask 1s is generated, otherwise a mask of 0s is generated, in the destination
operand.
To practice all areas of Microprocessors, here is complete set of 1000+ Multiple Choice
Questions and Answers .
MCQs
a) sequential instruction
Answer: c
Explanation: The linear instruction sequencing is the one in which the instructions that pass
through the fetch, decode and execution stages sequentially.
a) control unit
c) execution unit
d) cpu
Answer: b
Explanation: During the execution of instructions, only after the bus interface unit of CPU reads
the data from the main memory and returns it to the register, the next instruction execution will
commence.
3. Because of Pentium’s superscalar architecture, the number of instructions that are executed
per clock cycle is
a) 1
b) 2
c) 3
d) 4
Answer: b
Explanation: Pentium’s superscalar architecture employs five stage pipeline with U and V pipes.
Thus it can execute two instructions per clock.
4. The type of execution which means that the CPU should speculate which of the next
instructions can be executed earlier is
a) speculative execution
Answer: a
Explanation: The speculative execution is an execution which means that the CPU should
speculate which of the next instructions can be executed earlier.
5. The execution in which the consecutive instruction execution in a sequential flow is hampered
is
a) speculative execution
Answer: b
Explanation: In the out of turn execution, the consecutive instruction execution in a sequential
flow is hampered and the CPU should be able to execute out of turn instructions.
c) High throughput
Answer: d
Explanation: A dual independent bus architecture is incorporated by Pentium-Pro to get an
enhanced system bandwidth and it also yields high throughput. It has the CPU which can
access both main memory and the cache simultaneously.
7. The unit that is used to implement the multiple branch prediction in Pentium-Pro is
a) control unit
b) bus interface unit
Answer: c
Explanation: The processor uses an associative memory called branch target buffer for
implementing the algorithm, multiple branch prediction.
a) fetch-decode unit
b) dispatch-execute unit
c) control-execute unit
d) retire unit
Answer: c
Explanation: Pentium-Pro incorporates three independent engines, 1. Fetch-decode unit 2.
Dispatch-execute unit 3. Retire unit.
9. The unit that accepts the sequence of instructions from the instruction cache as input is
a) fetch-decode unit
b) dispatch-execute unit
c) retire unit
d) none
Answer: a
Explanation: The fetch-decode unit accepts the sequence of instructions from the instruction
cache as input and then decodes them.
10. In fetch-decode unit, the number of parallel decoders that accept the stream of fetched
instructions and decode them is
a) 1
b) 2
c) 3
d) 4
Answer: c
Explanation: A set of three parallel decoders accepts the stream of fetched instructions and
decode them.
To practice all areas of Microprocessors, here is complete set of 1000+ Multiple Choice
Questions and Answers .
This set of Microprocessors Question Bank focuses on “Pro and Pentium-II -2”.
a) executable statements
c) MMX instructions
d) micro operations
Answer: d
Explanation: The decoder unit converts the fetched instructions into micro operations.
a) 2,2
b) 1,3
c) 3,1
d) 3,2
Answer: c
Explanation: Each microoperation contains two logical sources and one logical destination.
a) decoder register
b) dispatch-execute unit
c) retire unit
Answer: d
Explanation: The microoperations are sent to the register alias table
RAT
. The RAT translates the logical register references to the physical register set actually available
in the CPU.
4. The pool of instructions that are fetched is stored in an addressable memory called
a) tristate buffer
c) reorder buffer
d) order buffer
Answer: c
Explanation: The pool of instructions that are fetched is stored in an array of content
addressable memory called reorder buffer.
5. The unit that performs scheduling of instructions by determining the data dependencies is
a) fetch-decode unit
b) dispatch-execute unit
c) retire unit
d) none
Answer: b
Explanation: The dispatch-execute unit performs scheduling of instructions by determining the
data dependencies after which the microoperations of the scheduled instructions are executed
in the execution unit.
6. The unit that reads the instruction pool and removes the microoperations which have been
executed instruction pool is
a) fetch-decode unit
b) dispatch-execute unit
c) retire unit
d) decoding unit
Answer: c
Explanation: The retire unit reads the instruction pool containing the instructions and removes
the microoperations which have been executed instruction pool.
a) equal
b) twice
c) thrice
d) two-third
Answer: b
Explanation: The features incorporated in Pentium-Pro enhances the speed of Pentium-Pro and
is twice as that of Pentium.
c) speculative execution
d) none
Answer: b
Explanation: The Pentium-Pro does not support the MMX instruction set.
a) high cache
Answer: d
Explanation: The Pentium II has a higher cache and it can operate at 2.8 volts, thereby reducing
power consumption. The most important change of Pentium II is that it can support Intel’s MMX
instructions.
10. The results of speculative instruction execution is stored in
b) permanent memory
c) temporary memory
d) none
Answer: c
Explanation: The results of speculative instruction execution should not be stored in CPU
registers and are temporarily stored, since they may have to be discarded, in case if there is a
branch instruction before these speculative instruction executions.
To practice Microprocessors Question Bank, here is complete set of 1000+ Multiple Choice
Questions and Answers .
MCQs
Answer: d
Explanation: Pentium 4 is based on NetBurst microarchitecture. Clock speed varies from
1.4GHz to 1.7GHz. It has hyper-pipelined technology.
b) execution module
c) control module
d) none
Answer: c
Explanation: Pentium 4 architecture may be viewed having four basic modules.
1. Front end module
2. Out of order execution engine
3. Execution module
4. Memory subsystem module.
a) trace cache
b) microcode ROM
Answer: d
Explanation: The front module of Pentium 4 contains
1. IA 32 Instruction decoder
2. Trace cache
3. Microcode ROM
4. Front end branch predictor.
4. The unit that decodes the instructions concurrently and translate them into micro-operations
is
a) trace cache
b) instruction decoder
c) execution module
Answer: b
Explanation: The role of instruction decoder is to decode the instructions concurrently and
translate them into micro-operations known as micro-ops.
5. In complex instructions, when the instruction needs to be translated into more than 4
micro-operations, then the decoder transfers the task to
a) trace cache
c) microcode ROM
d) none
Answer: c
Explanation: In case of complex instructions, when the instruction needs to be translated into
more than 4 micro-operations, then the decoder transfers the task to microcode ROM.
6. The unit that does not store the instructions, but the decoded stream of instructions is
a) trace cache
c) microcode ROM
d) none
Answer: a
Explanation: The trace cache is a special instruction cache because it does not store the
instructions, but the decoded stream of instructions.
a) 6 K decoded micro-ops
b) 8 K decoded micro-ops
c) 10 K decoded micro-ops
d) 12 K decoded micro-ops
Answer: d
Explanation: Trace cache can store upto 12K micro-ops. The cache assembles the decoded
micro-ops into ordered sequence of micro-ops called traces.
8. The unit that predicts the locations from where the next instruction bytes are fetched is
a) trace cache
c) execution module
d) instruction decoder
Answer: b
Explanation: The front end branch predictor predicts the locations from where the next
instruction bytes are fetched.
9. If complex instructions like interrupt handling, string manipulation appear, then the control
from trace cache transfers to
a) microcode ROM
c) execution module
d) instruction decoder
Answer: a
Explanation: When some complex instructions like interrupt handling, string manipulation
appear, then the control from trace cache transfers to microcode ROM.
10. After the micro-ops are issued by the microcode ROM, the control goes to
a) trace cache
c) execution module
d) instruction decoder
Answer: a
Explanation: After the micro-ops are issued by the microcode ROM, the control goes to Trace
cache once again. The micro-ops delivered by the trace cache and the microcode ROM are
buffered in a queue in an orderly fashion.
To practice all areas of Microprocessors, here is complete set of 1000+ Multiple Choice
Questions and Answers .
This set of Microprocessors Questions and Answers for Entrance exams focuses on “Netburst
Microarchitecture For Pentium4 -2, Instruction Translation Lookaside Buffer
ITLB
1. If the logical processors want to execute complex IA-32 instructions simultaneously then the
number of microcode instruction pointers required is
a) 1
b) 2
c) 3
d) 4
Answer: b
Explanation: If both the logical processors want to execute complex IA-32 instructions
simultaneously then two microcode instruction pointers are required, which will access the
microcode ROM.
a) static prediction
b) dynamic prediction
d) none
Answer: c
Explanation: There are two types of branch prediction namely static prediction and dynamic
prediction.
3. The prediction that is based on a statistical assumption that the majority of backward
branches occur in repetitive loops is
a) static prediction
b) dynamic prediction
c) branch prediction
d) none
Answer: a
Explanation: The static prediction is based on a statistical assumption that the majority of
backward branches occur in the context of repetitive loops.
Answer: d
Explanation: The static prediction is simple and fast. It does not require table lookups or
calculations. In case if a program contains a number of loops, static prediction performs without
much degradation.
BHT
BTB
d) None
Answer: c
Explanation: The dynamic branch prediction algorithms use two types of tables, namely Branch
History Table
BHT
and Branch Target Buffer
BTB
.
BTB
BHT
c) Static prediction
d) Dynamic prediction
Answer: b
Explanation: The Branch History Table
BHT
preserves the history of each conditional branch that the speculative branch prediction unit
encounters during the last several cycles.
7. The BHT keeps a record that indicates the likelihood of the branches grouped as
a) strongly taken
b) taken
c) not taken
Answer: d
Explanation: The BHT keeps a record that indicates the likelihood that the branch will be taken
based on its past history. The branches may be grouped as ‘strongly taken’, ‘taken’, ‘not taken’
and ‘strongly not taken’.
Answer: c
Explanation: Each logic processor has its own set of two 64-byte streaming buffers, which store
the instruction bytes and subsequently they are dispatched to the instruction decode stage.
9. If there is a trace cache miss, then the instruction bytes are required to be fetched from the
a) instruction decoder
b) Level2 cache
c) execution module
Answer: b
Explanation: If there is a trace cache miss, then the instruction bytes are required to be fetched
from the Level2 cache.
ITLB
is present in
a) trace cache
b) instruction decoder
c) logical processors
Answer: c
Explanation: Since there are two logical processors, there are two ITLBs. Thus each logical
processor has its own ITLB and its own instruction pointer to track the progress of instruction
fetch for each of them.
To practice all areas of Microprocessors for Entrance exams, here is complete set of 1000+
Multiple Choice Questions and Answers .
This set of Tough Microprocessors Questions and Answers focuses on “Rapid Execution
Module, Memory Subsystem, Hyperthreading Technology”.
1. The units that are primarily used to resolve indirect mode of memory addressing is called
a) ALU
b) AGU
d) NONE
Answer: b
Explanation: The AGUs
AddressGenerationUnits
are primarily used to resolve indirect mode of memory addressing.
d) none
Answer: b
Explanation: The AGUs run at twice the processor speed.
3. Pentium 4 consists of
a) 4 ALUs
b) 4 AGUs
Answer: c
Explanation: Pentium 4 consists of 2 ALUs and 2 AGUs.
4. The number of instructions that can be executed per clock cycle by the ALU or AGU is
a) 1
b) 2
c) 3
d) 4
Answer: b
Explanation: As the speed of the units, ALU and AGU are doubled, which means that twice the
number of instructions being executed per clock cycle.
Answer: c
Explanation: IA-32 architecture’s paging mechanism includes an extension that support
1. Page address extension to address space greater than 4GB.
2. Page size extension to map linear address to physical address in 4MB.
6. The linear address space is mapped into the processors physical address space either
directly or through paging by
d) none
Answer: c
Explanation: With the flat or segmented memory model, linear address space is mapped into
the processors physical address space either directly or through paging.
Answer: d
Explanation: Threads may be bunched together in a process. Threads are independent, simple
in structure and are lightweight in the sense that they may enhance the speed of operation of an
overall process.
8. The process in which multiple threads correspond to the tracking of each individual object is
known as
Answer: c
Explanation: The mutiple threads correspond to the tracking of each individual object. This kind
of parallelism is known as thread level parallelism
TLP
.
9. Which of the following is not a type of context switching?
a) time-slice multithreading
b) on chip multiprocessing
c) hyperthreading
d) none
Answer: d
Explanation: A single processor can execute multiple threads by switching between them. The
scheme of context switching may be several types. They are
1. Time-slice multithreading
2. On chip multiprocessing
3. Hyperthreading.
Answer: d
Explanation: The thread level parallelism is a process of
1. Saving the context of currently executing process.
2. Flushing the CPU of the same process.
3. Loading the context of new next process is called a context switch.
To practice tough questions and answers on all areas of Microprocessors, here is complete set
of 1000+ Multiple Choice Questions and Answers .
MCQs
1. Which of the following is a resource sharing strategy that had been investigated by the
developers?
a) partitioned resources
b) threshold sharing
c) full sharing
Answer: d
Explanation: Several resource sharing strategies have been investigated by the developers.
Some of these are
1. Partitioned resources
2. Threshold sharing
3. Full sharing.
a) simultaneous multithreading
Answer: d
Explanation: Hyperthreading used the concept of simultaneous multithreading, where multiple
threads can be executed on a single processor without switching.
Answer: d
Explanation: Each logical processor maintains a set of architecture state which consists of
1. Registers including the general purpose registers
2. The control register
3. Advanced programmed interrupt controller
4. Machine state register.
Answer: d
Explanation: A logical processor may be temporarily stalled for a variety of reasons like
including servicing cache misses, handling branch mispredictions and waiting for results of
previous instructions.
d) none
Answer: b
Explanation: The hyperthreading technology automatically involves the increase of die area.
6. The instruction that is used when either of the logical processors is idle is
a) HOLD
b) HLDA
c) HALT
d) NONE
Answer: c
Explanation: An optimization may require the use of HALT instruction, when either of the two
logical processors is idle.
7. The mode that is available when there is only one software thread to execute is
Answer: c
Explanation: When there is only one software thread to execute, there are two modes namely
single task mode and multi task mode.
a) execution unit
b) operating system
c) control unit
d) memory unit
Answer: b
Explanation: The HALT instruction is a privileged instruction that can be only used by operating
system.
9. When the operating system uses HALT instruction on a processor which supports
multithreading, the operation moves from
b) ST1 to ST0
d) None
Answer: c
Explanation: When the operating system uses HALT instruction on a processor which supports
multithreading, the operation moves from multi tasking mode to single tasking mode.
10. The Xeon TM processor on which hyperthreading technology was first implemented consists
of
Answer: b
Explanation: The Xeon TM processor on which hyperthreading technology was first
implemented consists of two logical processor per physical processor.
To practice all areas of Microprocessors, here is complete set of 1000+ Multiple Choice
Questions and Answers .
This set of Basic Microprocessors Questions and Answers focuses on “Extended Instruction Set
In Advanced Pentium Processors, Formal Verification”.
Answer: c
Explanation: The MMX instructions support only integer data type.
2. For single precision floating point numbers, the SSE instructions are
a) MMX instructions
b) SIMD instructions
d) None
Answer: b
Explanation: The SSE instructions are SIMD
SingleInstructionMultipleDataStream
instructions for single precision floating point numbers.
Answer: d
Explanation: The features of SSE
StreamingSIMDextensions
are
1. SSE instructions are SIMD instructions for single precision floating point numbers.
2. They operate on four 32-bit floating points.
3. The register size is of 128 bits
4. No necessity to switch from one mode to other.
4. The new instructions that are added in SSE for floating point operations are of
a) 72
b) 50
c) 25
d) 8
Answer: b
Explanation: The new instructions that are added in SSE for floating point operations are 50.
a) packed data
b) unpacked data
c) dynamic data
Answer: a
Explanation: The SSE instructions can operate on packed data or scalar data.
c) shuffle instructions
Answer: d
Explanation: The SSE instructions can be grouped to many types. Some of them are
1. Data transfer instructions
2. Arithmetic, logic and comparison group of instruction
3. shuffle instructions
4. Cacheability instructions.
7. Which of the following is true about SSE2 instructions in Pentium III and Pentium 4?
Answer: d
Explanation: The SSE new instruction set increases the accuracy of double precision floating
point operations, supports new formats of packed data.
Answer: d
Explanation: The SSE2 instructions support new data types such as double precision floating
points along with single precision floating points.
a) video encoding
c) thread synchronization
Answer: d
Explanation: The SSE3 contains 13 additional SIMD instructions over SSE2. These instructions
comprise five types.
i. floating point to integer conversion
ii. complex arithmetic operation
iii. video encoding
iv. SIMD floating point operations using array of structures format
v. thread synchronization.
10. The unit that may acts as an interface between the Front end and the Out of order execution
engine in the pipeline flow is
a) micro-op queue
b) micro-op stack
c) micro-ops
d) none
Answer: a
Explanation: The micro-op queue acts as an interface between the Front end and the Out of
order execution engine in the pipeline flow.
11. The verification of the logic using formal mathematical tools is called
a) arithmetic verification
b) formal verification
c) mathematical verification
d) logical verification
Answer: b
Explanation: The verification of the logic using formal mathematical tools is called formal
verification.
Answer: d
Explanation: The formal verification is important to develop the tools and methodologies to
handle a large number of proofs using which it will be possible to detect the bugs in the design.
13. By using the techniques of formal verification, one can detect the logical bugs of
a) more than 50
b) less than 50
Answer: c
Explanation: By using the techniques of formal verification, one can detect more than 100
logical bugs.
a) high speed
Answer: d
Explanation: The modern processors are designed to operate at a very high speed and even
with the lower operating voltages, the power consumption is high enough to require expensive
cooling technology.
To practice basic questions and answers on all areas of Microprocessors, here is complete set
of 1000+ Multiple Choice Questions and Answers .
MCQs
focuses on “Hybrid Architecture -RISC and CISC Convergence, Advantages of RISC, Design
Issues of RISC Processors -1”.
c) complex in nature
d) none
Answer: c
Explanation: Some computers are used in preference to CISC design due to its low burden on
compiler developers and wide availability of existing software. But they are complex in nature.
2. The RISC architecture is preferred to CISC because RISC architecture has
a) simplicity
b) efficiency
c) high speed
Answer: d
Explanation: The RISC architecture is preferred to CISC because RISC architecture is simple,
highly efficient and the processors using RISC architecture have high speed.
a) branch prediction
b) pipelining
d) none
Answer: c
Explanation: A RISC core allows performance enhancing features, such as branch prediction
and pipelining. Traditionally, these have only been possible in RISC designs.
Answer: d
Explanation: The CISC-RISC hybrids continue to consume a lot of power and are not best
candidates for mobile and embedded applications.
a) multimedia applications
b) telecommunication encoding
c) image conversion
Answer: d
Explanation: By adding more instructions to the RISC architecture, some applications can be
run much faster like multimedia applications, telecommunication encoding/decoding, image
conversion and video processing.
b) Intel Itanium 64
c) AMD’s X86-64
Answer: d
Explanation: The processors, Intel Pentium III, Intel Itanium 64 and AMD’s X86-64 consists of
hybrid RISC-CISC architecture.
a) macroprogramming
b) hardwire
c) microprogramming
d) none
Answer: c
Explanation: In order to implement complex instructions, CISC architectures use
microprogramming.
Answer: d
Explanation: The advantages of RISC processors are that they can work at high clock
frequency, can be designed, developed and tested more quickly with a high speed.
9. The additional functionality that can be placed on the same chip of RISC is
d) RAM, ROM
Answer: c
Explanation: Several extra functionalities, such as memory management units or floating point
arithmetic units, can also be placed on the same chip of RISC.
10. The number of clockcycles that take to wait until the length of the instruction is known in
order to start decoding is
a) 0
b) 1
c) 2
d) 3
Answer: a
Explanation: The loading and decoding the instructions in a RISC processor is simple and fast.
It is not needed to wait until the length of the instruction is known in order to start the decoding.
To practice all areas of Microprocessors, here is complete set of 1000+ Multiple Choice
Questions and Answers .
This set of Microprocessors Problems focuses on “Hybrid Architecture -RISC and CISC
Convergence, Advantages of RISC, Design Issues of RISC Processors -2”.
ClockPerInstruction
a) 0
b) 1
c) 2
d) 3
Answer: b
Explanation: RISC processors have unity CPI
ClockPerInstruction
, which is due to the optimization of each instruction on the CPU and massive pipelining
embedded in a RISC processor.
c) microcoding is required
Answer: c
Explanation: Unlike the CISC, in RISC architecture, instruction microcoding is not required.
3. The RISC processors that support variable length instructions are from
a) Intel
b) Motorola
c) AMD
Answer: d
Explanation: In RISC, each instruction is of the same length, so that it may be fetched in a
single operation. The traditional microprocessors from Intel or Motorola support variable length
instructions.
a) high speed
Answer: d
Explanation: It is impossible to predict when the register file will overflow or underflow, so
performance is unpredictable. It generates a software fault, which the operating system has to
handle, consuming more cycles.
a) infinite
c) finite
Answer: c
Explanation: The register window only helps us to point the number of physical registers is finite.
Answer: b
Explanation: There are 5 stages in pipelining. They are
1. Fetch instructions from memory
2. Read registers and decode the instructions
3. Execute the instructions or calculate an address
4. Access an operand in data memory
5. Write result into a register.
a) error occurs
Answer: c
Explanation: A data dependency occurs when an instruction depends on the results of the
previous instructions.
9. The instructions that instruct the processor to make a decision about the next instruction to be
executed are
b) branch instructions
d) none
Answer: b
Explanation: The branch instructions are those which instruct the processor to make a decision
about the next instruction to be executed, depending upon whether the condition is satisfied or
not.
10. The reason for which the RISC processor goes to idle state
orstall
is
MCQs
a) Accumulator
b) B register
c) Data register
Answer: d
Explanation: In some instructions, the Accumulator and B register are used to store the
operands.
a) Accumulator
b) B register
c) Data register
Answer: b
Explanation: B register is used to store one of the operands for multiply and divide instructions.
In other instructions, it may just be used as a scratch pad.
a) control registers
b) instruction registers
c) program status word
Answer: c
Explanation: The set of flags of program status word contains the status information and is
considered as one of the special function registers.
4. Which of the processor’s stack does not contain the top-down data structure?
a) 8086
b) 80286
c) 8051
d) 80386
Answer: c
Explanation: The 8051 stack is not a top-down data structure, like other Intel processors.
a) 4 latches
b) 2 timer registers
Answer: d
Explanation: The architecture of 8051 consists of 4 latches and driver pairs are allotted to each
of the four on-chip I/O ports. It contains two 16-bit timer registers.
Answer: b
Explanation: The transmit buffer of serial data buffer is a parallel-in serial-out register.
7. The receive buffer of serial data buffer is a
Answer: a
Explanation: The serial data register has two buffers. The transmit buffer is a parallel-in
serial-out register and receive buffer is a parallel-in serial-out register.
8. The register that provides control and status information about counters is
a) IP
b) TMOD
c) TSCON
d) PCON
Answer: b
Explanation: The registers, TMOD and TCON contain control and status information about
timers/counters.
9. The register that provides control and status information about serial port is
a) IP
b) IE
c) TSCON
Answer: d
Explanation: The registers, PCON and SCON contain control and status information about serial
port.
10. The device that generates the basic timing clock signal for the operation of the circuit using
crystal oscillator is
a) timing unit
d) clock generator
Answer: c
Explanation: The oscillator circuit generates the basic timing clock signal for the operation of the
circuit using crystal oscillator.
11. The registers that are not accessible by the user are
b) IP and IE
c) Instruction registers
Answer: d
Explanation: The arithmetic operations are performed over the operands held by the temporary
registers, TMP1 and TMP2. Users cannot access these temporary registers.
To practice all areas of Microprocessors, here is complete set of 1000+ Multiple Choice
Questions and Answers .
MCQs
a) PSW
ProgramStatusWord
b) TCON
TimerControlRegister
c) Accumulator
a) P1
b) SCON
c) TMOD
d) TCON
Answer: c
Explanation: The registers, TMOD, SP, TH0, TH1, TL0, TL1 are to be addressed as bytes.
a) SBUF
b) PCON
c) TMOD
d) SCON
Answer: d
Explanation: The registers, accumulator, PSW, B, P0, P1, P2, P3, IP, IE, TCON and SCON are
all bit-addressable registers.
4. The higher and lower bytes of a 16-bit register DPTR are represented respectively as
Answer: c
Explanation: The registers, DPH and DPL are the higher and lower bytes of a 16-bit register
DPTR.
a) DPH
b) DPL
c) DPTR
d) NONE
Answer: c
Explanation: The Data Pointer
DPTR
is used for accessing external data memory which means that it includes both DPH and DPL.
6. Among the four groups of register banks, the number of groups that can be accessed at a
time is
a) 1
b) 2
c) 3
Answer: a
Explanation: At a time, only one of the four register banks can be accessed.
a) 2
b) 4
c) 6
d) 8
Answer: d
Explanation: The 32, 8-bit registers are divided into four groups of 8 registers each, called
register banks.
a) register bank 0
b) register bank 1
c) register bank 2
d) register bank 3
Answer: c
Explanation: If RS1=1, RS0=0, then the register bank selected is register bank 2.
a) register bank 0
b) register bank 1
c) register bank 2
d) register bank 3
Answer: d
Explanation: If RS1=1, RS0=1, then the register bank selected is register bank 3. If RS1=0,
RS0=0, then selected bank is register bank 0.
Answer: d
Explanation: The power control register, PCON consists of power down bit and idle bit which
activate the power down mode and idle mode in 80C51BH.
a) power mode
c) idle mode
d) ideal mode
Answer: b
Explanation: In power down mode, the on-chip oscillator is stopped.
a) serial port
b) timer block
c) clock to CPU
Answer: c
Explanation: In idle mode, the oscillator continues to run and the interrupt, serial port and timer
blocks are active but the clock to the CPU is disabled.
a) CLEAR
b) RESET
c) HOLD
d) HLT
Answer: b
Explanation: The only way to terminate the power down mode is hardware reset. The reset
redefines all the SFRs but the RAM contents are left unchanged.
a) PRESET
b) CLEAR
c) Interrupt
d) Interrupt or reset
Answer: d
Explanation: The idle mode can be terminated with a hardware interrupt or hardware reset
signal.
To practice all areas of Microprocessors, here is complete set of 1000+ Multiple Choice
Questions and Answers .
MCQs
activelow
b) INT2
activelow
c) Timer0 interrupt
d) Timer1 interrupt
Answer: a
Explanation: INT0
activelow
and INT1
activelow
are two external interrupt inputs provided by 8051.
activelow
and INT1
activelow
Answer: a
Explanation: The interrupts, INT0
activelow
and INT1
activelow
are processed internally by the flags IE0 and IE1.
3. The flags IE0 and IE1, are automatically cleared after the control is transferred to respective
vector if the interrupt is
a) level-sensitive
b) edge-sensitive
c) in serial port
d) in parallel port
Answer: b
Explanation: If the interrupts are programmed as edge sensitive, the flags IE0 and IE1 are
automatically cleared after the control is transferred to respective vector.
4. If the external interrupt sources control the flags IE0 and IE1, then the interrupt programmed
is
a) level-sensitive
b) edge-sensitive
c) in serial port
d) in parallel port
Answer: a
Explanation: If the interrupts are programmed as level sensitive, then the flags IE0 and IE1 are
controlled by external interrupt sources themselves.
a) timer mode
b) counter mode
c) idle mode
Answer: b
Explanation: In counter mode, the pulses are counted at T0 or T1 pin.
a)
1/8
b)
1/4
c)
1/16
d)
1/32
Answer: d
Explanation: In timer mode, the oscillator clock is divided by a prescalar
1/32
and then given to the timer.
a) RI is set
c) Either RI or TI is set
Answer: c
Explanation: The serial port interrupt is generated if atleast one of the two bits, RI and TI is set.
8. In serial port interrupt, after the control is transferred to the interrupt service routine, the flag
that is cleared is
a) RI
b) TI
c) RI and TI
d) None
Answer: d
Explanation: In serial port interrupt, after the control is transferred to the interrupt service
routine, neither of the flags are cleared.
9. The atleast number of machine cycles for which the external interrupts that are programmed
level-sensitive should remain high is
a) 1
b) 2
c) 3
d) 0
Answer: b
Explanation: The external interrupts, programmed level-sensitive should remain high for atleast
2 machine cycles.
10. If the external interrupts are programmed edge sensitive, then they should remain high for
atleast
a) 0 machine cycle
b) 2 machine cycles
c) 1 machine cycle
d) 3 machine cycles
Answer: c
Explanation: If the external interrupts are programmed edge sensitive, then they should remain
high for atleast one machine cycle and low for atleast one machine cycle, for being sensed.
To practice all areas of Microprocessors, here is complete set of 1000+ Multiple Choice
Questions and Answers .
This set of Microprocessors Assessment Questions and Answers focuses on “Interrupt and
Stack of 8051 – 2”.
a) 00FFH
b) FF00H
c) 0FFFH
d) FFFFH
Answer: d
Explanation: The timer is an up-counter and generates an interrupt when the count has reached
FFFFH.
2. The external interrupt that has the lowest priority among the following is
a) TF0
b) TF1
c) IE1
d) NONE
Answer: c
Explanation: The order of given interrupts from high to low priority is TF0, IE1 and TF1.
3. Among the five interrupts generated by 8051, the lowest priority is given to the interrupt
a) IE0
b) TF1
c) TF0
d) RI
Answer: d
Explanation: The interrupt, RI=TI
serialport
is given the lowest priority among all the interrupts.
4. Among the five interrupts generated by 8051, the highest priority is given to the interrupt
a) IE0
b) TF1
c) TF0
d) IE1
Answer: a
Explanation: The interrupt, IE0
ExternalINT0
is given the highest priority among all the interrupts.
5. All the interrupts are enabled using a special function register called
b) interrupt register
Answer: d
Explanation: All the interrupts are enabled using a special function register called interrupt
enable register
IE
and their priorities are programmed using another special function register called interrupt
priority register
IP
.
6. The number of bytes stored on the stack during one operation of PUSH or POP is
a) 1
b) 2
c) 3
d) 4
Answer: a
Explanation: As 8051 stack operations are 8-bit wide i.e. in an operation using PUSH or POP
instruction, one byte of data is stored on a stack or retrieved from the stack. For implementing
16-bit operations, two 8-bit operations are cascaded.
Answer: c
Explanation: The PUSH instruction follows two steps.
1. Increment stack by 1
2. Store 8-bit content of the 8-bit address specified in the instruction to the address pointed to by
SP.
d) store content of top of stack to address pointed to by SP and then decrement stack by 1
Answer: d
Explanation: The POP instruction follows two steps.
1. Store the contents of top of stack pointed to by SP register to the 8-bit memory specified in
the instruction.
2. Decrement stack by 1.
Answer: d
Explanation: The 8051 stack is opposite to that in 8085 or 8086 i.e. in 8085 it is auto-decrement
while in 8051 it is auto-increment during PUSH operations.
SP
a) internal ROM
b) internal RAM
c) external ROM
d) external RAM
Answer: b
Explanation: The stack pointer
SP
is an 8-bit register and is initialized to internal RAM address 07H after reset.
To practice all areas of Microprocessors Assessment Questions, here is complete set of 1000+
Multiple Choice Questions and Answers .
MCQs
a) register instructions
c) indexed addressing
d) none
Answer: d
Explanation: The six addressing modes of 8051 are
1. Direct addressing
2. Indirect addressing
3. Register instructions
4. Register specific
RegisterImplicit
instructions
5. Immediate mode
6. Indexed addressing.
2. The symbol, ‘addr 16’ represents the 16-bit address which is used by the instructions to
specify the
Answer: c
Explanation: The symbol, ‘addr 16’ represents the 16-bit destination address which is used by
the LCALL or LJMP instruction to specify the call or jump destination address, within 64 Kbytes
program memory.
Answer: c
Explanation: Only internal data RAM and SFRS can be directly addressed in direct addressing
mode.
4. The address register for storing the 16-bit addresses can only be
a) stack pointer
b) data pointer
c) instruction register
d) accumulator
Answer: b
Explanation: The address register for storing the 16-bit addresses can only be data pointer.
c) Stack pointer
Answer: d
Explanation: The registers R0 and R1 of the selected bank of registers or stack pointer can be
used as address registers for storing the 8-bit addresses.
6. The instruction, ADD A, R7 is an example of
a) register instructions
c) indexed addressing
d) none
Answer: a
Explanation: In register instructions addressing mode, operands are stored in the registers
R0-R7 of the selected register bank. One of these registers is specified in the instruction.
7. The addressing mode, in which the instructions has no source and destination operands is
a) register instructions
c) direct addressing
d) indirect addressing
Answer: b
Explanation: In register specific instructions addressing mode, the instructions don’t have
source and destination operands. Some of the instructions always operate only on a specific
register.
Answer: b
Explanation: The instruction, RLA rotates accumulator left.
a) 100
decimal
is added to contents of address register
b) 100
decimal
c) 100
decimal
d) none
Answer: c
Explanation: Immediate data 100
decimal
is added to the contents of the accumulator.
10. In which of these addressing modes, a constant is specified in the instruction, after the
opcode byte?
a) register instructions
c) direct addressing
d) immediate mode
Answer: d
Explanation: In immediate mode, an immediate data, i.e. a constant is specified in the
instruction, after the opcode byte.
11. The only memory which can be accessed using indexed addressing mode is
a) RAM
b) ROM
c) Main memory
d) Program memory
Answer: d
Explanation: Only program memory can be accessed using the indexed addressing mode.
12. The data address of look-up table is found by adding the contents of
Answer: b
Explanation: The look-up table data address is found out by adding the contents of register
accumulator with that of the program counter or data pointer.
To practice all areas of Microprocessors, here is complete set of 1000+ Multiple Choice
Questions and Answers .
MCQs
a) arithmetic instructions
b) boolean instructions
c) logical instructions
d) none
Answer: d
Explanation: The 8051 instructions are categorized as
1. Data transfer instructions
2. Arithmetic instructions
3. Logical instructions
4. Boolean instructions
5. Control transfer instructions.
a) bit data
b) byte data
c) 16-bit data
Answer: d
Explanation: The data transfer instructions implement a bit, byte, 16-bit data transfer operations
between the SRC
source
and DST
destination
operands.
Answer: c
Explanation: In data transfer instructions,
1. Program counter is not accessible.
2. Restricted bit-transfer operations are allowed.
3. Both operands can be direct/indirect register operands.
4. BOth operands can be internal direct data memory operands.
4. The logical instruction that affects the carry flag during its execution is
a) XRL A;
b) ANL A;
c) ORL A;
d) RLC A;
Answer: d
Explanation: The logical instructions that doesn’t affect the carry flag are, ANL, ORL and XRL.
The logical instructions that affect the carry flag during its execution are RL, RLC, RRC and RR.
5. The instruction that is used to complement or invert the bit of a bit addressable SFR is
a) CLR C
b) CPL C
c) CPL Bit
d) ANL Bit
Answer: c
Explanation: The instruction, CPL Bit is used to complement or invert the bit of a bit addressable
SFR or RAM.
a) conditional instructions
b) logical instructions
Answer: c
Explanation: The control transfer instructions transfer the control of execution or change the
sequence of execution conditionally or unconditionally.
Answer: b
Explanation: The control transfer instructions are divided into conditional and unconditional
control transfer instructions.
8. The conditional control transfer instructions check a bit condition which includes any bit of
c) content of accumulator
a) absolute jumps
b) long jumps
c) short jumps
d) none
Answer: c
Explanation: All conditional jumps are short jumps.
a) opcode byte
b) relative address
c) opcode field
d) none
Answer: a
Explanation: The short jump instruction has two byte instruction. The first byte represents
opcode byte and second byte represents an 8-bit relative address.
a) increment operation
b) decrement operation
d) none
Answer: d
Explanation: In logical instructions, the immediate data can’t be an operand for
increment/decrement or any other single operand instruction.
To practice all areas of Microprocessors, here is complete set of 1000+ Multiple Choice
Questions and Answers .
This set of Microprocessors Questions and Answers for Aptitude test focuses on “8051
Instruction Set -2”.
1. If the most significant bit of relative address byte is 1, then the short jump instruction is
a) forward jump
b) back jump
d) none
Answer: b
Explanation: If the most significant bit of relative address byte is 1, then the short jump
instruction is back jump, else it is considered as forward jump.
Answer: d
Explanation: The first byte of an absolute jump instruction consists of 5 LSBs of opcode and 3
MSBs of 11-bit address. The next byte carries the least significant 8 bits of the 11-bit address.
a) opcode
b) 5 LSBs of opcode
Answer: c
Explanation: The third byte of the long jump instruction is a higher byte of jump location or
subroutine.
4. The absolute jump instruction is intended mainly for a jump within a memory space of
a) 2 bytes
b) 2 Kbytes
c) 2 Mbytes
d) none
Answer: b
Explanation: The absolute jump instruction is intended mainly for a jump within a memory space
of 2 Kbytes.
5. The LJMP instruction is very useful in programming in the external code memory space of
a) 32 MB
b) 64 MB
c) 32 KB
d) 64 KB
Answer: d
Explanation: The LJMP instruction is very useful in programming in the external code memory
space of 64 KB.
a) JMP
b) RET
c) JNC
d) CALL
Answer: c
Explanation: The instructions, JMP, RET, RETI, CALL are the unconditional control transfer
instructions.
a) status flags
a) JC
b) JBC
c) JNC
d) NONE
Answer: d
Explanation: The instructions, JC, JBC, JNC, JB and JNB are the conditional control transfer
instructions.
9. The mnemonic used to perform a subtraction of source with an 8-bit data and jumps to
specified relative address if subtraction is non-zero is
a) DJNZ
b) CJNE
c) JZ
d) JNC
Answer: b
Explanation: The CJNE instruction perform a subtraction of source with an 8-bit data and jumps
to specified relative address only if the result of the subtraction is non-zero, else continues to
the next instruction.
10. The mnemonic, JNB is used to jump to the specified relative address only if
a) specified bit=1
b) specified bit=0
d) none
Answer: a
Explanation: The mnemonic, JNB is used to jump to the specified relative address only if
specified bit=1, else continues to the next instruction.
11. The type of operand that is not allowed to use in boolean instructions of 8051 is
c) immediate bit
d) none
Answer: c
Explanation: In boolean instructions, the immediate bit is not allowed as an operand.
12. In boolean instructions, the flag that is the only allowed destination operand for two operand
instructions is
a) overflow flag
b) underflow flag
c) auxiliary flag
d) carry flag
Answer: d
Explanation: Carry flag
C
is the only allowed destination operand for two operand instructions in boolean instructions.
To practice all areas of Microprocessors for Aptitude test, here is complete set of 1000+ Multiple
Choice Questions and Answers .
MCQs
1. Which of the following is not one of the SFR addresses of the ports of 8051?
a) 80H
b) 90H
c) A0H
d) NONE
Answer: d
Explanation: The SFR addresses of the ports P0, P1, P2 and P3 are 80H, 90H, A0H and B0H
respectively.
a) 0.2 mA
b) 0.25 mA
c) 0.5 mA
d) 0.75 mA
Answer: c
Explanation: Each port line of a port can individually source a current of upto 0.5 mA.
a) 2 mA
b) 8 mA
c) 5 mA
d) 1 mA
Answer: b
Explanation: Each port line of a port can individually sink a current of upto 8 mA.
4. The number of TTL inputs that can be sinked by the port 0 when a logic 0 is sent to a port line
as an output port is
a) 2
b) 4
c) 6
d) 8
Answer: d
Explanation: When a logic 0 is sent to a port line as an output port, it can sink 8 LS TTL inputs.
Port 0 is used as data bus during external interfacing whenever required.
inputoroutput
port with internal pullups is
a) Port 0
b) Port 1
c) Port 2
d) Port 3
Answer: a
Explanation: Port 0 is an open drain bidirectional
inputoroutput
port with internal pullups. Port 1, Port 2, Port 3 are 8-bit bidirectional ports.
6. The port that can source or sink 4 LS TTL inputs when being used as an output port on each
of its line is
a) Port 1
b) Port 2
c) Port 3
Answer: d
Explanation: The ports P1, P2 and P3 can source or sink 4 LS TTL inputs when being used as
an output port on each of its line.
7. The port that will source a current of 500 micro amperes when being used as input ports is
a) 0.5 mA
b) 0.25 mA
Answer: d
Explanation: Port 3 pins which are externally pulled low when being used as input pins will
source current of 500 micro amperes.
8. If the EA
activelow
signal is grounded then the execution
Answer: c
Explanation: For interfacing external program memory, EA
activelow
pin must be grounded. If the EA
activelow
signal is grounded then the execution will start directly from the 16-bit address 0000H in
external program memory.
9. When the port lines of a port are to be used as input lines then the value that must be written
to the port address is
a) F0H
b) 0FH
c) FFH
d) 00H
Answer: c
Explanation: When the port lines of a port are to be used as input lines then ‘FF’H must be
written to the port address.
Answer: d
Explanation: Port 1 lines are used as lower byte of 16-bit address bus during programming of
internal EPROM or EEPROM.
11. The configuration in which each LED receives operating current of 8 mA from power supply
while the port lines sink the current on each port line is
Answer: b
Explanation: The common anode configuration is preferred to that of other configurations as in
common anode configuration, each LED receives operating current of 8 mA from power supply
while the port lines sink the current on each port line.
To practice all areas of Microprocessors, here is complete set of 1000+ Multiple Choice
Questions and Answers .
This set of Microprocessors Questions and Answers for Campus interviews focuses on
“Interfacing With 8051 Ports -2”.
1. If EA
activelow
a) internal EPROM
b) flash RAM
d) none
Answer: c
Explanation: If EA
activelow
signal =1, then the execution starts from an internal EPROM or flash RAM address 000H, can
continue upto FFFH address and then for higher addresses it will go into external memory.
a) EA
activelow
b) PSEN
activelow
c) OE
activelow
Answer: a
Explanation: The EA
activelow
pin is grounded for interfacing external EPROM. The PSEN
activelow
is used for interfacing EPROM i.e. it acts as an OE
activelow
input to EPROM.
3. The step that is involved in the procedure of memory interfacing with 8051 is
b) PSEN
activelow
is connected to OE
activelow
of EPROM chips
Answer: d
Explanation: The procedure of memory interfacing with 8051 includes, data bus connection to
data lines of memory chips, PSEN
activelow
connected to OE
activelow
of EPROM chips and writing address map of memory chip in bit form.
a) Logic gates
b) Multiplexers
Answer: d
Explanation: The logic gates and multiplexers are most commonly used for deriving chip select
signals. The advanced circuits like PLAs and EPROMs are also used for deriving chip select
signals.
5. For deriving chip selects of isolated memory or IO devices, the gates that are traditionally
used are
Answer: b
Explanation: For deriving chip selects of isolated memory or IO devices, the NAND and NOT
gates are traditionally used.
a) 6-8 mA
b) 4-6 mA
c) 8-10 mA
d) 10-12 mA
Answer: c
Explanation: For appropriate glow, a LED typically requires 8-10 mA with around 1.6 Volts.
7. The maximum current that can be sinked totally by all the ports of 8051 is
a) 61 mA
b) 81 mA
c) 91 mA
d) 71 mA
Answer: d
Explanation: All the ports together
4ports
should not be made to sink more than 71 mA.
8. The number of LEDs that can be connected to a port of 8051, if all are expected to glow
simultaneously is
a) 6
b) 8
c) 10
d) 12
Answer: b
Explanation: If 8 LEDs are connected to a port of 8051, and if all are expected to glow
simultaneously, the total current sinked by the 8051 port will be 8×8=64 mA
sinceminvoltageforanLEDtoglow=8mA
which is less than the maximum 71 mA.
Answer: c
Explanation: The 7-segment code of a digit is transmitted by the first port and the display is
selected by second port. As soon as the display is selected by the second port, the digit starts
glowing on that display position.
10. After the display is selected by second port, then the digit
LED
a) 5 msec
b) 10 msec
c) 2 msec
d) 6 msec
Answer: a
Explanation: The unit
LED
glows for a duration of 5 msec.
11. The number of scans of the complete 8-digit display that can be carried out in one second is
a) 15
b) 25
c) 35
d) 55
Answer: b
Explanation: Starting from either right most or left most digit, every digit glows for 5 msec one by
one. Thus one scan of the 8 digit display requires 40 msec. Thus in one second, 25 scans of the
complete 8-digit display can be carried out.
12. To convert its current output into a voltage, the DAC 0808 is connected with
a) Transistor
BJT
externally
b) FET externally
c) OPAMP externally
d) OPAMP internally
Answer: c
Explanation: the DAC 0808 is connected with OPAMP externally, to convert its current output
into voltage.
To practice all areas of Microprocessors for Campus Interviews, here is complete set of 1000+
Multiple Choice Questions and Answers .
MCQs
b) Interrupt enable
c) priority register
Answer: d
Explanation: The external interrupts namely INT0
activelow
and INT1
activelow
can be enabled and programmed using the least significant four bits of TCON register and the
Interrupt enable and priority registers.
Answer: c
Explanation: The bits, EX0 and EX1 individually control the external interrupts, INT0
activelow
and INT1
activelow
. If INT0
activelow
and INT1
activelow
interrupts are to be enabled then the bits EX0 and EX1 must be set respectively.
3. EA bit is used to
Answer: c
Explanation: Using EA bit, all the interrupts can be enabled or disabled. Using the individual
respective bit, the respective interrupt can be enabled or disabled.
a) 1
b) 2
c) 3
d) 4
Answer: b
Explanation: Each interrupts level of 8051 can have two levels of priority namely level 0 and
level 1. Level 1 is considered as a higher priority level compared to level 0.
serialinterrupt
interrupt is programmed is
a) level 0
b) level 1
c) level 0 or level 1
d) none
Answer: b
Explanation: SI interrupt is programmed for level 1 priority.
6. The interrupt bit that when set works at level 1, and otherwise at level 0 is
a) PT1
b) PT0
c) PX1
Answer: d
Explanation: The bits, PT1, PT0, PX0 and PX1 when set, work at level 1, otherwise at level 0.
7. All the interrupts at level 1 are polled in the second clock cycle of the
a) forth T state
b) fifth T state
c) third T state
d) none
Answer: b
Explanation: All the interrupts at level 1 are polled or sensed in the second clock cycle of the
fifth T state or 9th clock cycle out of 12 clock cycles. Then all the interrupts at level 0 are also
polled in the same cycle.
8. The minimum duration of the active low interrupt pulse for being sensed without being lost
must be
Answer: b
Explanation: The minimum duration of the active low interrupt pulse should be equal to the
duration of one machine cycle for being sensed, else it will be lost.
9. If two interrupts, of higher priority and lower priority occur simultaneously, then the service
provided is for
a) interrupt of lower priority
Answer: b
Explanation: If two interrupts, occur simultaneously, then the one with higher priority level and
early polling sequence will receive service. The other one with lower priority may get lost there,
as there is no mechanism for storing the interrupt requests.
Answer: c
Explanation: For an interrupt to be guaranteed served it should have duration of two machine
cycles.
11. The service to an interrupt will be delayed if it appears during the execution of
a) RETI instruction
Answer: d
Explanation: The service to an interrupt will be delayed if it appears during the execution of
RETI instruction or the instruction that writes to IE/IP registers.
To practice all areas of Microprocessors, here is complete set of 1000+ Multiple Choice
Questions and Answers .
MCQs
focuses on “Serial Communication Unit”.
a) cheaper communication
Answer: d
Explanation: The serial communication requires less number of conductors and thus it is
cheaper. It is slow as the bits are transmitted one by one along with start, stop and parity bits.
Answer: b
Explanation: Serial communication is more popular for communication over longer distances as
it requires less number of conductors.
Answer: d
Explanation: The mcs 51 architecture supports simultaneous transmission and reception of
binary data byte by byte i.e. full duplex mode of communication. It supports serial transmission
and reception of data using standard serial communication interface and baud rates.
a) transmission rate
b) reception rate
c) transceiver rate
d) baud rate
Answer: d
Explanation: Here, baud rate can be defined as the number of bits transmitted or received per
second.
5. The task of converting the byte into serial form and transmitting it bit by bit along with start,
stop and parity bits is carried out by
a) reception unit
c) transmission unit
Answer: c
Explanation: the serial communication unit consists of transmission unit and reception unit. The
task of converting the byte into serial form and transmitting it bit by bit along with start, stop and
parity bits is carried out by transmission unit.
6. The transmission unit does not require assistance from processor if once a byte for
transmission is written to
a) SCON register
b) SBUF register
c) SFR address
Answer: b
Explanation: once a byte for transmission is written to the serial buffer
SBUF
register, the transmission unit does not require assistance from a processor.
7. The common unit shared by the receiver unit and transmission unit of serial communication
unit is
a) SCON
SerialPortControl
Register
b) SBUF
SerialBuffer
register
Answer: d
Explanation: The transmission unit and receiver unit both are controlled by using a common
SCON
SerialPortControl
Register. Also both units share a common serial buffer
SBUF
register which is a common 8-bit serial data interface.
8. During serial reception, the buffer that receives serial bits and converts to a byte is
a) receive buffer 0
b) receive buffer 1
c) receive buffer 2
d) none
Answer: b
Explanation: During serial reception, the receive buffer 1 receives serial bits and converts to a
byte, it then transfers the received parallel byte in receive buffer 2.
a) 8-bit synchronous
b) 9-bit synchronous
c) 8-bit asynchronous
d) 9-bit asynchronous
Answer: d
Explanation: If SM0=1, SM1=0, then the 9-bit asynchronous transceiver is selected.
a) SM0 is set
b) SM1 is set
c) SM2 is set
d) REN is set
Answer: c
Explanation: The bit, SM2 is set if the microcontroller is expected to communicate in a
multiprocessor system.
a) SMOD bit
b) SCON bit
Answer: d
Explanation: In mode 2, the baud rate depends only on SMOD bit and oscillator clock frequency.
12. The mode that offers the most secured parity enabled data communication at lower baud
rates is
a) mode 2
b) mode 1
c) mode 0
Answer: a
Explanation: The mode 3 offers the most secured parity enabled data communication at lower
baud rates of mode 1.
To practice all areas of Microprocessors, here is complete set of 1000+ Multiple Choice
Questions and Answers .
Answer: d
Explanation: The power control register is used for power saving during idle state of the
microcontroller and eventual power off to the microcontroller chip. It has SMOD bit which is used
to double the baud rate.
a) ALE is high
b) PSEN is high
c) PSEN
activelow
is high
activelow
are high
Answer: d
Explanation: ALE and PSEN
activelow
remain high in Idle mode.
a) SI
serial
b) INT0
c) INT1
Answer: d
Explanation: To come out of idle mode, any external interrupt that is enabled like SI
Serial
, INT0 and INT1.
Answer: c
Explanation: If the PD bit of PCON register is set, it enters power down mode.
a) normal mode
b) idle mode
d) addressing mode
Answer: c
Explanation: In power down mode, the clock signal to all parts of 8051 chip is disabled.
6. During power down to save battery, the supply voltage can be reduced to a value of
a) 4 volts
b) 2 volts
c) 8 volts
d) 1 volt
Answer: b
Explanation: The supply voltage can be reduced to a value of around 2 volts, during power
down to save battery.
8051
a) CLEAR
b) LEAVE
c) RESET
d) EXIT
Answer: c
Explanation: Only Reset signal can pull 8051 out of the power down mode.
a) ALE is high
b) PSEN is low
activelow
are high
activelow
are low
Answer: d
Explanation: ALE and PSEN
activelow
remain low in power down mode of 8051.
Answer: d
Explanation: In power down mode, the clock signal is disabled and all the port pins and
respective SFRs maintain their logic levels.
Answer: c
Explanation: The SMOD bit is used to double the baud rate.
To practice all areas of Microprocessors, here is complete set of 1000+ Multiple Choice
Questions and Answers .
Unit 1 quiz
Identify the register that holds the instruction that is currently being executed or decoded
a. Instruction Register
b. MDR
c. Program Counter
d. MAR
Find a group of circuits that performs all the computations in the computer
a. Arithmetic Logic Unit
b. Control Unit
c. I/O Unit
d. memory
Select the program that converts mnemonic based language into microprocessor language
a. Interpreter
b. Translator
c. Compiler
d. Assembler
When the data itself present in the instruction then the addressing mode is referred to as
a. Immediate Addressing Mode
b. Direct Addressing Mode
c. Indirect Addressing Mode
d. Register Addressing Mode
Differentiate between D-flip flop and D-latch by selecting the statement given below:
a. D-FF is level triggered and D-latch is edge triggered
b. D-FF is edge triggered and D-latch is level triggered
The addressing mode which uses the PC instead of a general-purpose register is ______
a. Relative
b. Indexed with offset
c. Direct
d. Both Indexed with offset and direct
In the following data transfer technique, the CPU enters in a loop until the I/O device indicates that it is ready to
transfer the data
a. All of the mentioned techniques
b. DMA technique
c. Interrupt Driven I/O technique
d. Programmed I/O
In the case of, Zero-address instruction method the operands are stored in _____
a. Accumulators
b. Registers
c. Stack
d. Cache
_____ addressing mode is most suitable to change the normal sequence of execution of instructions.
a. Immediate
b. Index with Offset
c. Indirect
d. Relative
…….defines the time required by the microprocessor to complete one operation of accessing memory or I/O
devices
a. Instruction cycle
b. Cycle
c. Machine cycle
d. T-state
Define the purpose of the interfacing devices by selecting the best statement matching with your definition
a. All of the mentioned
b. Interfacing devices are necessary to interconnect the components of a bus oriented system
c. Interfacing devices are the semiconductor chips that are needed to connect peripheral to the bus
d. Encoders and decoders can be used as the interfacing devices
Calculate the number of t-states to read the complete instruction LXI, A, 2050H from the main memory
a. 3
b. 4
c. 7
d. 10
Evaluate the memory addressed by the 8-bit microprocessor having 16 bit address lines
a. None of the mentioned
b. 216 bits
c. 216 bytes
d. 216 word
The register that holds the information about the nature of the result of arithmetic and logical operations is
called as …….
a. Stack Pointer
b. Program counter
c. Accumulator
d. Flag register
The following control and status signal represents the memory write operation:
a. S0=1, S1=1, I/O/M’=0, WR’=0
b. S0=1, S1=0, I/O/M’=0, WR’=1
c. S0=1, S1=0, I/O/M’=0, WR’=0
d. S0=0, S1=1, I/O/M’=0, WR’=0
Identify the register pair that can be used as a valid pair of registers in 8085 microprocessor
a. BD
b. BH
c. BE
d. BC
The following control and status signal represents the opcode fetching operation:
a. S0=1, S1=0, I/O/M’=0, RD’=1
b. S0=1, S1=1, I/O/M’=0, RD’=0
c. S0=1, S1=0, I/O/M’=0, RD’=0
d. S0=0, S1=1, I/O/M’=0, RD’=0
Calculate the number of bytes used to represent the LDA 2050H instruction.
a. 3
b. 2
c. 4
d. 1
………………is an input signal to the processor indicating an event that needs immediate attention of
microprocessor?
a. Addressing modes
b. Reset
c. Interrupt
d. Hold
Analyze the purpose of the Maskable interrupts in the system. And select the correct form the following:
a. To handle the lower priority tasks
b. None of the mentioned
c. Both the mentioned
d. To handle the higher priority tasks
Group A
A. 4-bit
B. 8-bit
C. 16-bit
D. 32 bit
Group B
1. 4004
2. 8088
3. 80486
4. 8008
Select one:
a. A-4, B-3, C-2, D-1
b. A-4, B-3, C-1, D-2
c. A-1, B-4, C-2, D-3
d. A-1, B-2, C-3, D-4
Identify the type of address and data buses used in 8085 microprocessor:
a. Dedicated Buses
b. Both the mentioned
c. None of the mentioned
d. Multiplexed buses
Group 1:
X: Indirect addressing
Y: Immediate addressing
Z: Auto decrement addressing
Group-2:
1. Loops
2. Pointers
3. Constants
Analyze the scenario where an instruction is stored at location 300 with its address fields at location 301. The
address field has the value 400. A processor register RI contain the number 200.
Evaluate the effective address if the addressing mode of the instruction is Register indirect Addressing Mode:
a. 301
b. 300
c. 400
d. 200
The following control and status signal represents the output write operation:
a. S0=0, S1=1, I/O/M’=1, WR’=0
b. S0=1, S1=0, I/O/M’=1, WR’=1
c. S0=1, S1=1, I/O/M’=1, WR’=0
d. S0=1, S1=0, I/O/M’=1, WR’=0
The following control and status signal represents the memory read operation:
a. S0=0, S1=1, I/O/M’=0, RD’=0
b. S0=1, S1=1, I/O/M’=0, RD’=0
c. S0=1, S1=0, I/O/M’=0, RD’=0
d. S0=1, S1=0, I/O/M’=0, RD’=1
Unit 3 Quiz
The work of EU
a) Encoding
b) Decoding
c) Calculation
d) Processing
BIU prefetches the instruction from the memory and srore them in the
a) Queue
b) Stack
c) Register
d) Memory
The labels or constants that can be used by any module in the program is possible when they are declared as
a) PUBLIC
b) LOCAL
c) GLOBAL
d) Either PUBLIC or GLOBAL
The interrupt for which the processor has the highest priority among all the external interrupts is
a) keyboard interrupt
b) TRAP
c) NMI
d) INT
The interrupt for which the processor has highest priority among all the internal interrupts is
a) keyboard interrupt
b) TRAP
c) NMI
d) INT
The instruction that is used to transfer the data from source operand to destination operand is
a. String instruction
b. branch instruction
c. arithmetic/logical instruction
a. POP PSW
b. POP 30 H
c. POP B
d. POP D
The instruction that loads the flag register completely from the word contents of the memory location is
a. PUSH
b. POPF
c. POP
d. PUSHF
a. ADC
b. ADD
a. zero flag
b. sign flag
c. carry flag
d. Borrow Flag
How many T-states are required for execution of OUT 80H instruction?
a. 11
b. 12
c. 10
d. 13
How many machine cycles are required for the execution of IN 30H INSTRUCTION?
a. 3
b. 6
c. 4
d. 5
Which flag will be affected by the execution of RLC /RRC/ RAL/ CMC instruction?
A good assembly language programmers should use general-purpose registers rather than memory in the
maximum possible ways for data processing. This is because:
a. Data processing with registers takes fewer cycles than that with memory
c. Data processing with memory requires more instructions in the program than that with registers
………….used to implement the hardware interrupts (RST 7.5, RST 6.5, RST 5.5) by setting various bits to
form masks or generate output data via the Serial Output Data (SOD) line.
a. RIM
b. SIM
c. DI
d. EI
Interrupts are recognized during the execution of EI instruction
a. True
b. False
................is used to read the status of the hardware interrupts (RST 7.5, RST 6.5, RST 5.5) by loading into the A
register a byte which defines the condition of the mask bits for the interrupts.
a. SIM
b. DI
c. EI
d. RIM
a. False
b. True
Placing an EI instruction on the bus in response to INTA’ during an INA cycles is prohibited
a. False
b. True
a. 4
b. 5
c. 2
d. 3
a. 5
b. 4
c. 2
d. 3
How many T-states is taken by the EI/ DI/ RIM/ SIM instructions in 8085 microprocessor
a. 4
b. 3
c. 2
d. 5
a. HLT
b. NOP
c. Delay
d. Time delay
In which of the following addressing mode, the offset is obtained by adding displacement and contents of one of
the base registers?
The block of 8237 that decodes the various commands given to the 8237 by the CPU is
a) timing and control block
b) program command control block
c) priority block
d) none of the mentioned
In 8237, which block generates the internal timings and external control signals.
a. Bus interface unit
b. Execution unit
c. Timing and control block
d. None of the above
____ register keeps the track of all DMA channel pending requests and the status of terminal counts
a. Temporary register
b. Command register
c. Mode register
d. Status register
8251 is a
(A) UART
(B) USART
(C) Programmable Interrupt controller
(D) Programmable interval timer/counter Ans. B
Which is the commonly used programmable interface and particular used to provide handshaking:
A 8251
B 8254
C 8259
D 8255
The processor of knowing the status of device and transferring the data with matching speeds is called:
a. Handshaking
b. Peripheral
c. Ports
d. None of these
In automatic rotation , the device , after being serviced , receives the ________ priority
A Lowest
B Highest
C Intermediate
D Cannot predict
The register that stores all the interrupt requests in it in order to serve them one by one on a priority basis is
a) Interrupt Request Register
b) In-Service Register
c) Priority resolver
d) Interrupt Mask Register
In 8259, The register that stores the bits required to mask the interrupt inputs is
a) In-service register
b) Priority resolver
c) Interrupt Mask register
d) None
When the PS(active low)/EN(active low) pin of 8259A used in buffered mode, then it can be used as a
a) input to designate chip is master or slave
b) buffer enable
c) buffer disable
d) none
In 8259 application where all the interrupting devices are of equal priority, the mode used is
a) Automatic rotation
b) Automatic EOI mode
c) Specific rotation
d) EOI
8086 is interfaced to two 8259s. If 8259s are in master slave configuration, the number of interrupts available to
the 8086 microprocessor are_____.
A8
B 16
C 15
D 64
In 8254, in control word register, if SC1=0 and SC0=1, then the counter selected is
a) counter 0
b) counter 1
c) counter 2
d) none
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
1. Oper When referring to instruction words, a mnemonic is
a short abbreviation for the data word stored at the operand address-right option
Correct
All instructions are consists of opcode and operand where opcode indicates operation to be performed
and opcode is on which operation to be done. Opcodes are always expressed as a short abbreviation
which is nothing but mnemonic.
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
Answer: c
Explanation: If W-bit is ‘1’ then the operand is of 16-bits, and if it is ‘0’ then the operand is of 8-
bits.
9. The instructions which after execution transfer control to the next instruction in the sequence
are called
a) Sequential control flow instructions
b) control transfer instructions
c) Sequential control flow & control transfer instructions
d) none of the mentioned
View Answer
Answer: a
Explanation: The sequential control flow instructions follow sequence order in their execution.
10. The instructions that transfer the control to some predefined address or the address specified
in the instruction are called as
a) sequential control flow instructions
b) control transfer instructions
c) sequential control flow & control transfer instructions
d) none of the mentioned
View Answer
Answer: b
Explanation: The control transfer instructions transfer control to the specified address.
11. The instruction “JUMP” belongs to
a) sequential control flow instructions
b) control transfer instructions
c) branch instructions
d) control transfer & branch instructions
View Answer
Answer: d
Explanation: The JUMP instruction transfers the control to the address located in the instruction.
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
Answer: c
Explanation: Since immediate data is present in the instruction.
3. The instruction, MOV AX, [2500H] is an example of
a) immediate addressing mode
b) direct addressing mode
c) indirect addressing mode
d) register addressing mode
View Answer
Answer: b
Explanation: Since the address is directly specified in the instruction as a part of it.
advertisement
4. If the data is present in a register and it is referred using the particular register, then it is
a) direct addressing mode
b) register addressing mode
c) indexed addressing mode
d) immediate addressing mode
View Answer
Answer: b
Explanation: Since register is used to refer the address.
5. The instruction, MOV AX,[BX] is an example of
a) direct addressing mode
b) register addressing mode
c) register relative addressing mode
d) register indirect addressing mode
View Answer
Answer: d
Explanation: Since the register used to refer to the address is accessed indirectly.
6. If the offset of the operand is stored in one of the index registers, then it is
a) based indexed addressing mode
b) relative based indexed addressing mode
c) indexed addressing mode
d) none of the mentioned
View Answer
Answer: c
Explanation: In the indexed addressing mode, the offset of an operand is stored and in the rest of
them, address is stored.
7. The addressing mode that is used in unconditional branch instructions is
a) intrasegment direct addressing mode
b) intrasegment indirect addressing mode
c) intrasegment direct and indirect addressing mode
d) intersegment direct addressing mode
View Answer
Answer: b
Explanation: In intrasegment indirect mode, the branch address is found as the content of a
register or a memory location.
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
8. If the location to which the control is to be transferred lies in a different segment other than the
current one, then the mode is called
a) intrasegment mode
b) intersegment direct mode
c) intersegment indirect mode
d) intersegment direct and indirect mode
View Answer
Answer: d
Explanation: In intersegment mode, the control to be transferred lies in a different segment.
9. The instruction, JMP 5000H:2000H;
is an example of
a) intrasegment direct mode
b) intrasegment indirect mode
c) intersegment direct mode
d) intersegment indirect mode
View Answer
Answer: c
Explanation: Since in intersegment direct mode, the address to which the control is to be
transferred is in a different segment.
10. The contents of a base register are added to the contents of index register in
a) indexed addressing mode
b) based indexed addressing mode
c) relative based indexed addressing mode
d) based indexed and relative based indexed addressing mode
View Answer
Answer: d
Explanation: The effective address is formed by adding the contents of both base and index
registers to a default segment.
1. The instruction that is used to transfer the data from source operand to destination operand is
a) data copy/transfer instruction
b) branch instruction
c) arithmetic/logical instruction
d) string instruction
View Answer
Answer: a
Explanation: These instructions are used to copy and transfer the instructions.
2. Which of the following is not a data copy/transfer instruction?
a) MOV
b) PUSH
c) DAS
d) POP
View Answer
Answer: c
Explanation: DAS (Decimal Adjust after Subtraction) is an arithmetic instruction.
3. The instructions that involve various string manipulation operations are
a) branch instructions
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
b) flag manipulation instructions
c) shift and rotate instructions
d) string instructions
View Answer
Answer: d
Explanation: The string instructions perform operations on strings such as load, move, scan,
compare etc.
advertisement
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
8. The instructions that are used for reading an input port and writing an output port respectively
are
a) MOV, XCHG
b) MOV, IN
c) IN, MOV
d) IN, OUT
View Answer
Answer: d
Explanation: The address of the input/output port may be specified directly or indirectly.
Example for input port: IN AX, DX; This instruction reads data from a 16-bit port whose address is
in DX and stores it in AX
Example for output port: OUT 03H, AL; This sends data available in AL to a port whose address
is 03H.
9. The instruction that is used for finding out the codes in case of code conversion problems is
a) XCHG
b) XLAT
c) XOR
d) JCXZ
View Answer
Answer: b
Explanation: The translate(XLAT) instruction is used to find codes.
10. The instruction that loads effective address formed by destination operand into the specified
source register is
a) LEA
b) LDS
c) LES
d) LAHF
View Answer
Answer: a
Explanation: The instruction, LEA loads effective address and is more useful for assembly
language rather than for machine language.
11. The instruction that loads the AH register with the lower byte of the flag register is
a) SAHF
b) AH
c) LAHF
d) PUSHF
View Answer
Answer: c
Explanation: The instruction LAHF(Load AH from a lower byte of Flag) may be used to observe
the status of all the condition code flags(except overflow flag) at a time.
12. The instruction that pushes the flag register on to the stack is
a) PUSH
b) POP
c) PUSHF
d) POPF
View Answer
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
Answer: c
Explanation: The instruction PUSHF(push flags to stack) pushes the flag register on to the stack.
13. The instruction that loads the flag register completely from the word contents of the memory
location is
a) PUSH
b) POP
c) PUSHF
d) POPF
View Answer
Answer: d
Explanation: POPF is pop flags to stack.
14. The instruction that adds immediate data/contents of the memory location specified in an
instruction/register to the contents of another register/memory location is
a) SUB
b) ADD
c) MUL
d) DIV
View Answer
Answer: b
Explanation: ADD instruction adds the data.
15. The instruction that supports addition when carry exists is
a) ADD
b) ADC
c) ADD & ADC
d) None of the mentioned
View Answer
Answer: b
Explanation: ADC(Add with Carry) instruction performs the same operation as ADD operation, but
adds the carry flag bit to the result
1. The instruction, “INC” increases the contents of the specified register or memory location by
a) 2
b) 0
c) 1
d) 3
View Answer
Answer: c
Explanation: This instruction adds 1 to the contents of the operand and so increments by 1.
2. The instruction that subtracts 1 from the contents of the specified register/memory location is
a) INC
b) SUBB
c) SUB
d) DEC
View Answer
Answer: d
Explanation: The DEC instruction decrements the contents of a specified register/memory location
by 1.
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
3. The instruction that enables subtraction with borrow is
a) DEC
b) SUB
c) SBB
d) None of the mentioned
View Answer
Answer: c
Explanation: The SBB instruction subtracts the source operand and the borrow flag from the
destination operand.
advertisement
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
8. During comparison operation, the result of comparing or subtraction is stored in
a) memory
b) registers
c) stack
d) no where
View Answer
Answer: d
Explanation: The result of subtraction operation is not stored anywhere during a comparison.
9. The instruction that converts the result in an unpacked decimal digits is
a) AAA
b) AAS
c) AAM
d) All of the mentioned
View Answer
Answer: d
Explanation: All the ASCII adjust instructions give result in unpacked decimal form and so are
called as “Unpacked BCD arithmetic instructions”.
10. Which of the following is a mnemonic?
a) ADD
b) ADC
c) AAA
d) ADD & ADC
View Answer
Answer: c
Explanation: AAA is a mnemonic. It doesn’t have either a source or destination operand.
11. The instruction in which adjustment is made before performing the operation is
a) AAA
b) AAS
c) AAM
d) AAD
View Answer
Answer: d
Explanation: The AAD instruction converts two unpacked BCD digits in AH and AL to the
equivalent binary number in AL. This adjustment must be made before dividing the two unpacked
BCD digits.
12. The expansion of DAA is
a) decimal adjust after addition
b) decimal adjust before addition
c) decimal adjust accumulator
d) decimal adjust auxiliary
View Answer
Answer: c
Explanation: This instruction performs conversion operation.
13. The instruction that is used to convert the result of the addition of two packed BCD numbers
to a valid BCD number is
a) DAA
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
b) DAS
c) AAA
d) AAS
View Answer
Answer: a
Explanation: In this conversion, the result has to be only in AL.
14. The ROR instruction rotates the contents of the destination operand to
a) left
b) right
c) left and then right
d) right and then left
View Answer
Answer: b
Explanation: ROR stands for Rotate Right without carry. so, the instruction rotates right
1. The mnemonic that is placed before the arithmetic operation is performed is
a) AAA
b) AAS
c) AAM
d) AAD
View Answer
Answer: d
Explanation: The AAD instruction converts two unpacked BCD digits in AH and AL to the
equivalent binary number in AL.
2. The Carry flag is undefined after performing the operation
a) AAA
b) ADC
c) AAM
d) AAD
View Answer
Answer: d
Explanation: Since the operation, AAD is performed before division operation is performed, the
carry flag, auxiliary flag and overflow flag are undefined.
3. The instruction that performs logical AND operation and the result of the operation is not
available is
a) AAA
b) AND
c) TEST
d) XOR
View Answer
Answer: c
Explanation: In the TEST instruction, the logical AND operation is performed and the result is not
stored but flags are affected.
advertisement
4. In the RCL instruction, the contents of the destination operand undergo function as
a) carry flag is pushed into LSB & MSB is pushed into the carry flag
b) carry flag is pushed into MSB & LSB is pushed into the carry flag
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
c) auxiliary flag is pushed into LSB & MSB is pushed into the carry flag
d) parity flag is pushed into MSB & LSB is pushed into the carry flag
View Answer
Answer: a
Explanation: In RCL(Rotate right through carry), for each operation, the carry flag is pushed into
LSB and the MSB of the operand is pushed into carry flag.
5. The instruction that is used as prefix to an instruction to execute it repeatedly until the CX
register becomes zero is
a) SCAS
b) REP
c) CMPS
d) STOS
View Answer
Answer: b
Explanation: The instruction to which the REP is prefix, is executed repeatedly until CX register
becomes zero. When CX becomes zero, the execution proceeds to the next instruction in
sequence.
6. Match the following
a) A-3,B-4,C-2,D-1
b) A-2,B-1,C-4,D-3
c) A-2,B-3,C-1,D-4
d) A-2,B-3,C-4,D-1
View Answer
Answer: d
Explanation: By using the string instructions, the operations on strings can be performed.
7. The instructions that are used to call a subroutine from the main program and return to the main
program after execution of called function are
a) CALL, JMP
b) JMP, IRET
c) CALL, RET
d) JMP, RET
View Answer
Answer: c
Explanation: At each CALL instruction, the IP and CS of the next instruction are pushed onto the
stack, before the control is transferred to the procedure. At the end of the procedure, the RET
instruction must be executed to retrieve the stored contents of IP & CS registers from a stack.
8. The instruction that unconditionally transfers the control of execution to the specified address
is
a) CALL
b) JMP
c) RET
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
d) IRET
View Answer
Answer: b
Explanation: In this the control transfers to the address specified in the instruction and flags are
not affected by this instruction.
9. Which instruction cannot force the 8086 processor out of ‘halt’ state?
a) Interrupt request
b) Reset
c) Both interrupt request and reset
d) Hold
View Answer
Answer: d
Explanation: Only an interrupt request or Reset will force the 8086 processor to come out of the
‘halt’ state.
10. NOP instruction introduces
a) Address
b) Delay
c) Memory location
d) None of the mentioned
View Answer
Answer: b
Explanation: NOP is the No operation. It means that the processor performs no operation for the
clock cycle and thus there exists a delay.
11. Which of the following is not a machine controlled instruction?
a) HLT
b) CLC
c) LOCK
d) ESC
View Answer
Answer: b
Explanation: Since CLC is a flag manipulation instruction where CLC stands for Clear Carry Flag
1. The assembler directives which are the hints using some predefined alphabetical strings are
given to
a) processor
b) memory
c) assembler
d) processor & assembler
View Answer
Answer: c
Explanation: These directives help the assembler to correctly understand the assembly language
programs to prepare the codes.
2. The directive used to inform the assembler, the names of the logical segments to be assumed
for different segments used in the program is
a) ASSUME
b) SEGMENT
c) SHORT
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
d) DB
View Answer
Answer: a
Explanation: In ALP, each segment is given a name by using the directive ASSUME
SYNTAX: ASSUME segment:segment_name
Eg: ASSUME CS:Code
here CS is the Code segment and code is the name assumed to the segment.
3. Match the following
advertisement
a) DB 1) used to direct the assembler to reserve only 10-bytes
b) DT 2) used to direct the assembler to reserve only 4 words
c) DW 3) used to direct the assembler to reserve byte or bytes
d) DQ 4) used to direct the assembler to reserve words
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
Answer: b
Explanation: The directive updates location counter to next even address if the current location
counter contents are not even.
7. The directive that directs the assembler to start the memory allotment for a particular
segment/block/code from the declared address is
a) OFFSET
b) LABEL
c) ORG
d) GROUP
View Answer
Answer: c
Explanation: If an ORG is written then the assembler initiates the location counter to keep the
track of allotted address for the module as mentioned in the directive.
If the directive is not present, then the location counter is initialized to 0000H.
8. The directive that marks the starting of the logical segment is
a) SEG
b) SEGMENT
c) SEG & SEGMENT
d) PROC
View Answer
Answer: b
Explanation: The directive SEGMENT indicates the beginning of the segment.
9. The recurrence of the numerical values or constants in a program code is reduced by
a) ASSUME
b) LOCAL
c) LABEL
d) EQU
View Answer
Answer: d
Explanation: In this, the recurring/repeating value is assigned with a label. The label is placed
instead of the numerical value in the entire program code.
10. The labels or constants that can be used by any module in the program is possible when they
are declared as
a) PUBLIC
b) LOCAL
c) GLOBAL
d) Either PUBLIC or GLOBAL
View Answer
Answer: c
Explanation: The labels, constants, variables, procedures declared as GLOBAL can be used by
any module in the program.
1. The logic required for implementing a program can be expressed in terms of
a) flowchart
b) algorithm
c) flowchart & algorithm
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
d) none of the mentioned
View Answer
Answer: c
Explanation: The logic required for implementing a program must be visualized clearly which is
possible by flowchart and algorithm.
2. The operands, source and destination in an instruction cannot be
a) register, register
b) memory location, memory location
c) memory location, register
d) immediate data, register
View Answer
Answer: b
Explanation: Only one memory operand can be specified in one instruction.
3. The instruction that is not possible among the following is
a) MOV AX, BX
b) MOV AX, [BX].
c) MOV 55H, BL
d) MOV AL, 55H
View Answer
Answer: c
Explanation: 8-bit or 16-bit operand cannot be used as a destination operand.
advertisement
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
d) sequential flow and uses stack
View Answer
Answer: d
Explanation: Since PID temperature controller has steps that need to be sequentially executed
such as sampling the output, conversion of a signal with ADC, finding errors, deriving control
signals and applying the control signal to control flow of energy.
1. The stack pointer register contains
a) address of the stack segment
b) pointer address of the stack segment
c) offset of address of stack segment
d) data present in the stack segment
View Answer
Answer: c
Explanation: The stack pointer register contains the offset of the address of the stack segment.
2. The stack segment register contains
a) address of the stack segment
b) base address of the stack segment
c) pointer address of the stack segment
d) data in the stack segment
View Answer
Answer: b
Explanation: The stack segment register contains base address of the stack segment in the
memory. The stack pointer register (sP) and stack segment register (SS) together address the
stack-top.
3. PUSH operation
a) decrements SP
b) increments SP
c) decrements SS
d) increments SS
View Answer
Answer: a
Explanation: Each PUSH operation decrements the SP ( Stack Pointer) register.
advertisement
4. POP operation
a) decrements SP
b) increments SP
c) decrements SS
d) increments SS
View Answer
Answer: b
Explanation: Each POP operation increments the SP ( Stack Pointer) register.
5. The register or memory location that is pushed into the stack at the end must be
a) popped off last
b) pushed off first
c) popped off first
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
d) pushed off last
View Answer
Answer: c
Explanation: The data can be retrieved by POP operation and as in stack, the data that is pushed
at the end must be popped off first.
6. In the instruction, ASSUME CS : CODE, DS : DATA, SS : STACK
the ASSUME directive directs to the assembler the
a) address of the stack segment
b) pointer address of the stack segment
c) name of the stack segment
d) name of the stack, code and data segments
View Answer
Answer: d
Explanation: The directive ASSUME facilitates to name the segments with the desired name that
is not a mnemonic or keyword.
7. When a stack segment is initialised then
a) SS and SP are initialised
b) only SS is initialised
c) only SP is initialised
d) SS and SP need not be initialised
View Answer
Answer: a
Explanation: Though the Stack segment is initialised, the SS and SP pointers must be initialised.
8. The number of PUSH instructions and POP instructions in a subroutine must be
a) PUSH instructions must be greater than POP instructions
b) POP instructions must be greater than PUSH instructions
c) Both must be equal
d) Instructions may be any kind
View Answer
Answer: c
Explanation: The number of PUSH instructions must be equal to the number of POP instructions.
9. 8086 does not support
a) Arithmetic operations
b) logical operations
c) BCD operations
d) Direct BCD packed multiplication
View Answer
Answer: d
Explanation: The 8086 microprocessor does not support direct BCD packed operations.
10. For 8086 microprocessor, the stack segment may have a memory block of a maximum of
a) 32K bytes
b) 64K bytes
c) 16K bytes
d) NONE
View Answer
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
Answer: b
Explanation: In 8086 microprocessor, the memory segments each have a memory of 64K bytes.
1. While CPU is executing a program, an interrupt exists then it
a) follows the next instruction in the program
b) jumps to instruction in other registers
c) breaks the normal sequence of execution of instructions
d) stops executing the program
View Answer
Answer: c
Explanation: An interrupt function is to break the sequence of operation.
2. An interrupt breaks the execution of instructions and diverts its execution to
a) Interrupt service routine
b) Counter word register
c) Execution unit
d) control unit
View Answer
Answer: a
Explanation: An interrupt transfers the control to interrupt service routine (ISR). After executing
ISR, the control is transferred back again to the main program.
3. While executing the main program, if two or more interrupts occur, then the sequence of
appearance of interrupts is called
a) multi-interrupt
b) nested interrupt
c) interrupt within interrupt
d) nested interrupt and interrupt within interrupt
View Answer
Answer: d
Explanation: If an interrupt occurs while executing a program, and the processor is executing the
interrupt, if one more interrupt occurs again, then it is called a nested interrupt.
advertisement
4. Whenever a number of devices interrupt a CPU at a time, and if the processor is able to handle
them properly, it is said to have
a) interrupt handling ability
b) interrupt processing ability
c) multiple interrupt processing ability
d) multiple interrupt executing ability
View Answer
Answer: c
Explanation: The processor if handles more devices as interrupts then it has multiple interrupt
processing ability.
5. NMI stands for
a) nonmaskable interrupt
b) nonmultiple interrupt
c) nonmovable interrupt
d) none of the mentioned
View Answer
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
Answer: a
Explanation: NMI is the acronym for nonmaskable interrupt.
7. If any interrupt request given to an input pin cannot be disabled by any means then the input
pin is called
a) maskable interrupt
b) nonmaskable interrupt
c) maskable interrupt and nonmaskable interrupt
d) none of the mentioned
View Answer
Answer: b
Explanation: A nonmaskable interrupt input pin is one which means that any interrupt request at
NMI (nonmaskable interrupt) input cannot be masked or disabled by any means.
8. The INTR interrupt may be
a) maskable
b) nonmaskable
c) maskable and nonmaskable
d) none of the mentioned
View Answer
Answer: a
Explanation: the INTR (interrupt request) is maskable or can be disabled.
9. The Programmable interrupt controller is required to
a) handle one interrupt request
b) handle one or more interrupt requests at a time
c) handle one or more interrupt requests with a delay
d) handle no interrupt request
View Answer
Answer: b
Explanation: If more than one interrupt request (INTR) occurs at a time, then an external chip
called programmable interrupt controller is required to handle them.
10. The INTR interrupt may be masked using the flag
a) direction flag
b) overflow flag
c) interrupt flag
d) sign flag
View Answer
Answer: c
Explanation: If a microprocessor wants to serve any interrupt then interrupt flag, IF=1. If interrupt
flag, IF=0, then the processor ignores the service.
1. If an interrupt is generated from outside the processor then it is an
a) internal interrupt
b) external interrupt
c) interrupt
d) none of the mentioned
View Answer
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
Answer: b
Explanation: If an external device or a signal interrupts the processor from outside then it is an
external interrupt.
2. If the interrupt is generated by the execution of an interrupt instruction then it is
a) internal interrupt
b) external interrupt
c) interrupt-in-interrupt
d) none of the mentioned
View Answer
Answer: a
Explanation: The internal interrupt is generated internally by the processor circuit or by the
execution of an interrupt instruction.
3. Example of an external interrupt is
a) divide by zero interrupt
b) keyboard interrupt
c) overflow interrupt
d) type2 interrupt
View Answer
Answer: b
Explanation: Since the keyboard is external to the processor, it is an external interrupt.
advertisement
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
Answer: c
Explanation: The Non-Maskable Interrupt input pin has the highest priority among all the external
interrupts.
2. The interrupt for which the processor has highest priority among all the internal interrupts is
a) keyboard interrupt
b) TRAP
c) NMI
d) INT
View Answer
Answer: b
Explanation: TRAP is the internal interrupt that has highest priority among all the interrupts except
the Divide By Zero (Type 0) exception.
3. In case of string instructions, the NMI interrupt will be served only after
a) initialisation of string
b) execution of some part of the string
c) complete string is manipulated
d) the occurrence of the interrupt
View Answer
Answer: c
Explanation: When NMI is activated, the current instruction being executed is completed and then
NMI is served. In the case of string instructions, it is served after the complete string is
manipulated.
advertisement
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
d) unchanged
View Answer
Answer: a
Explanation: The INTR signal must go high in the clock cycle of the current instruction in order to
respond in the next instruction cycle.
7. The status of the pending interrupts is checked at
a) the end of main program
b) the end of all the interrupts executed
c) the beginning of every interrupt
d) the end of each instruction cycle
View Answer
Answer: d
Explanation: At the end of each instruction, the status of the pending interrupts is checked.
8. Once the processor responds to an INTR signal, the IF is automatically
a) set
b) reset
c) high
d) low
View Answer
Answer: b
Explanation: The IF is automatically reset when the processor responds to an INTR signal. If the
processor wants to respond to any type of INTR signal further then, the IF should again be set.
9. If the pin LOCK (active low based) is low at the trailing edge of the first ALE pulse, then till the
start of the next machine cycle, the pin LOCK (active low) is
a) low
b) high
c) low or high
d) none of the mentioned
View Answer
Answer: a
Explanation: The pin LOCK (active low) remains low till the start of the next machine cycle.
10. With the trailing edge of the LOCK (active low), the INTA (active low) goes low and remains in
it for
a) 0 clock cycle
b) 1 clock cycle
c) 2 clock cycles
d) 3 clock cycles
View Answer
Answer: c
Explanation: The INTA (active low) goes low and remains low for two clock cycles before returning
back to the high state.
1. The method of defining the interrupt service routine for software is
a) same as that of hardware
b) difficult than hardware
c) easier than software
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
d) none of the mentioned
View Answer
Answer: a
Explanation: For both software and hardware, the method of defining the interrupt service routine
is the same.
2. While programming for any type of interrupt, the interrupt vector table is set
a) externally
b) through a program
c) either externally or through the program
d) externally and through the program
View Answer
Answer: c
Explanation: The programmer must, either externally or through the program, set the interrupt
vector table for that type preferably with the CS and IP addresses of the interrupt service routine.
3. To execute a program one should
a) assemble the program
b) link the program
c) apply external pulse
d) all of the mentioned
View Answer
Answer: d
Explanation: To execute a program, first assemble it, link it and then execute it. After execution, a
new file RESULT is created in the directory. Then external pulse is applied to IRQ2 pin, and this
will again cause the execution of ISR into the file.
advertisement
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
1. If a number of instructions are repeating through the main program, then to reduce the length
of the program, __________ is used.
a) procedure
b) subroutine
c) macro
d) none of the mentioned
View Answer
Answer: c
Explanation: For a certain number of instructions that are repeated in the main program, when
macro is defined then the code of a program is reduced by placing the name of the macro at which
the set of instructions are needed to be repeated.
2. The process of assigning a label or macroname to the string is called
a) initialising macro
b) initialising string macro
c) defining a string macro
d) defining a macro
View Answer
Answer: d
Explanation: The process of assigning a label to the string is called defining a macro.
3. A macro within a macro is called
a) macro-within-macro
b) nested macro
c) macro-in-macro
d) none of the mentioned
View Answer
Answer: b
Explanation: A macro may be called from inside a macro. This type of macro is called nested
macro.
advertisement
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
6. The end of a macro can be represented by the directive.
a) END
b) ENDS
c) ENDM
d) ENDD
View Answer
Answer: c
Explanation: The ENDM directive marks the end of the instructions or statements sequence
assigned with the macro name.
7. Inserting the statements and instructions represented by macro, directly at the place of the
macroname, in the program, is known as
a) calling a macro
b) inserting a macro
c) initializing a macro
d) none of the mentioned
View Answer
Answer: a
Explanation: Inserting the statements and instructions at the place of macroname, in the program,
is known as calling a macro.
8. The time required for execution of a macro is ________ that of the procedure.
a) greater than
b) less than
c) equal to
d) none of the mentioned
View Answer
Answer: b
Explanation: The time required for execution of a macro is less than that of procedure as it does
not contain CALL and RET instructions as the procedures do.
9. Which of the following statements is incorrect?
a) complete code of instruction string is inserted at each place, wherever the macroname appears
b) macro requires less time of execution than that of procedure
c) macro uses stack memory
d) macroname can be anything except registers and mnemonics
View Answer
Answer: c
Explanation: Macro does not require stack memory and hence has less time for execution.
10. The beginning of the macro can be represented as
a) START
b) BEGIN
c) MACRO
d) None of the mentioned
View Answer
Answer: c
Explanation: The beginning of the macro is represented as macroname followed by the directive
MACRO.
SYNTAX: macroname MACRO
EXAMPLE: STRINGS MACRO.
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
1. If ‘n’ denotes the number of clock cycles and ‘T’ denotes period of the clock at which the
microprocessor is running, then the duration of execution of loop once can be denoted by
a) n+T
b) n-T
c) n*T
d) n/T
View Answer
Answer: c
Explanation: The duration of execution of the loop is the product of number of clock cycles and
the period of the clock cycle at which microprocessor is running.
2. The number of instructions actually executed by the microprocessor depends on the
a) stack
b) loop count
c) program counter
d) time duration
View Answer
Answer: b
Explanation: As the microprocessor executes each instruction corresponding loop counter value
decreases and the microprocessor executes the instructions till the loop counter becomes zero.
3. In case of subroutines, the actual number of instructions executed by the processor depends
on
a) loop count
b) length of interrupt service routine
c) length of procedure
d) none
View Answer
Answer: c
Explanation: In case of subroutines or interrupt service routines, the number of instructions
executed by the processor depends on the length of procedure (or subroutine) or length of interrupt
service routine along with the main calling program.
advertisement
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
Answer: a
Explanation: The count N can be defined as the required time delay by the duration for execution
of the loop once.
Count, N = required delay (Td)/duration for execution of the loop once (n*T).
6. In the instruction set,
if the zeroth condition is satisfied then, for execution, the JNZ instruction takes
a) 1 clock cycle
b) 2 clock cycles
c) 3 clock cycles
d) 4 clock cycles
View Answer
Answer: d
Explanation: The JNZ instruction takes only 4 clock cycles if the zeroth condition is satisfied.
7. In the instruction set,
if the zeroth condition is not satisfied, then the JNZ instruction takes
a) 2 clock cycles
b) 8 clock cycles
c) 16 clock cycles
d) 64 clock cycles
View Answer
Answer: c
Explanation: The JNZ instruction takes 16 clock cycles if the zeroth condition is not satisfied.
8. The maximum count value of 16-bit count register puts a limitation on
a) memory usage
b) storage of address of registers
c) to generate clock pulse
d) to generate maximum delay
View Answer
Answer: d
Explanation: The maximum count value of 16-bit count register is FFFFH. This may put the
limitation on the maximum delay that can be generated using the instructions.
9. When large delays are required, then to serve the purpose
a) one or more count registers can be used
b) one or more shift registers can be used
c) one or more pointer registers can be used
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
d) one or more index registers can be used
View Answer
Answer: a
Explanation: One or more count registers can be used to serve large delays.
4. If the microprocessor has 10 address lines, then the number of memory locations it is able to
address is
a) 512
b) 1024
c) 2048
d) none
View Answer
Answer: b
Explanation: Since for n address lines, the number of memory locations able to address is 2^n.
5. In static memory, the upper 8-bit bank of an available 16-bit memory chip is called
a) upper address memory bank
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
b) even address memory bank
c) static upper memory
d) odd address memory bank
View Answer
Answer: d
Explanation: In static memory, the upper 8-bit bank is called odd address memory bank.
6. In static memory, the lower 8-bit bank of an available 16-bit memory chip is called
a) lower address memory bank
b) even address memory bank
c) static lower memory bank
d) odd address memory bank
View Answer
Answer: b
Explanation: In static memory, the lower 8-bit bank is called even address memory bank.
7. In most of the cases, the method used for decoding that may be used to minimise the required
hardware is
a) absolute decoding
b) non-linear decoding
c) linear decoding
d) none
View Answer
Answer: c
Explanation: In general, linear decoding is used to minimise the required hardware.
8. To obtain 16-bit data bus width, the two 4K*8 chips of RAM and ROM are arranged in
a) parallel
b) serial
c) both serial and parallel
d) neither serial nor parallel
View Answer
Answer: a
Explanation: The two 4K*8 chips of RAM and ROM are arranged in parallel.
9. If (address line) Ao=0 then, the status of address and memory are
a) address is even and memory is in ROM
b) address is odd and memory is in ROM
c) address is even and memory is in RAM
d) address is odd and memory is in RAM
View Answer
Answer: c
Explanation: If Ao=0 then address is even and is in RAM. If Ao=1 then, address is odd and is in
RAM.
10. If at a time Ao and BHE(active low) both are zero then, the chip(s) selected will be
a) RAM
b) ROM
c) RAM and ROM
d) ONLY RAM
View Answer
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
Answer: c
Explanation: If at a time Ao and BHE(active low) both are zero, then both RAM and ROM are
selected
1. The advantage of dynamic RAM is
a) high packing density
b) low cost
c) less power consumption
d) all of the mentioned
View Answer
Answer: d
Explanation: The dynamic RAM is advantageous than the static RAM as it has a higher packing
density, lower cost and less power consumption.
2. Whenever a large memory is required in a microcomputer system, the memory subsystem is
generally designed using
a) Static RAM
b) Dynamic RAM
c) Both static and dynamic RAM
d) ROM
View Answer
Answer: b
Explanation: Dynamic RAM is preferred for large memory.
3. If a typical static RAM cell requires 6 transistors then corresponding dynamic RAM requires
a) 1 transistor along with capacitance
b) 2 transistors along with resistance
c) 3 transistors along with diode
d) 2 transistors along with capacitance
View Answer
Answer: a
Explanation: The hardware complexity of dynamic RAM is lesser than that of static RAM.
advertisement
4. To store the charge as a representation of data, the basic dynamic RAM cell uses
a) resistor
b) capacitor
c) diode
d) transistor
View Answer
Answer: c
Explanation: The basic dynamic RAM cell uses capacitance to store the charge as a
representation of data. This capacitor is manufactured as a diode that is reverse biased so that
the storage capacitance is obtained.
5. The process of refreshing the data in the RAM to reduce the possibility of data loss is known as
a) data cycle
b) regain cycle
c) retain cycle
d) refresh cycle
View Answer
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
Answer: d
Explanation: The data storage in RAM which is capacitance (reverse-biased diode) may have a
leakage current that tends to discharge the capacitor giving rise to possibility of data loss. To avoid
this, the data must be refreshed after a fixed time interval regularly.
6. The field in which dynamic RAM is more complicated than static RAM is
a) complexity
b) interfacing circuit
c) execution unit
d) cost
View Answer
Answer: b
Explanation: The refresh mechanism and the additional hardware required makes the interfacing
circuit of dynamic RAM more complicated than that of static RAM.
7. Memory refresh activity is
a) initialised by processor
b) initialised by external bus master
c) initialised by refresh mechanism
d) initialised either by processor or by external bus
View Answer
Answer: c
Explanation: The refresh operation is independent regular activity that is initialised and carried out
by the refresh mechanism.
8. The number of memory chips that are enabled at a time for refresh activity is
a) 2
b) 4
c) 8
d) more than 1
View Answer
Answer: d
Explanation: More than one memory chip can be enabled at a time to refresh activity to reduce
the number of total memory refresh cycles.
9. A timer that derives pulse for refreshing action or time for which a dynamic RAM cell can hold
data charge level practically constant is
a) constant timer
b) data managing timer
c) refresh timer
d) qualitative timer
View Answer
Answer: c
Explanation: Refresh timer derives a pulse for refreshing action after each refresh interval which
can be qualitatively defined as the time for which a dynamic RAM cell can hold data charge level
practically constant.
10. If ‘n’ denotes the number of rows that are to be refreshed in a single refresh interval, ‘td’
denotes the range of time it may take then, refresh time (tr) can be defined as
a) n*td
b) td/n
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
c) n/td
d) tdn
View Answer
Answer: b
Explanation: Refresh time is the ratio of time duration taken for refreshing to the number of rows
that are refreshed. Refresh frequency is the reciprocal of refresh time.
1. The device that enables the microprocessor to read data from the external devices is
a) printer
b) joystick
c) display
d) reader
View Answer
Answer: b
Explanation: Since joystick is an input device, it reads data from the external devices.
2. The example of output device is
a) CRT display
b) 7-segment display
c) Printer
d) All of the mentioned
View Answer
Answer: d
Explanation: The output device transfers data from the microprocessor to the external devices.
3. The input and output operations are respectively similar to the operations,
a) read, read
b) write, write
c) read, write
d) write, read
View Answer
Answer: c
Explanation: The input activity is similar to read operation and the output activity is similar to write
operation.
advertisement
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
d) bad output port
View Answer
Answer: c
Explanation: If the output port is to source large currents, the port lines must be buffered. So, the
latch is used as it acts as a good output port.
6. While performing read operation, one must take care that much current should not be
a) sourced from data lines
b) sinked from data lines
c) sourced or sinked from data lines
d) sinked from address lines
View Answer
Answer: c
Explanation: More current should not be sourced or sinked from data lines while reading to avoid
loading.
7. To avoid loading during read operation, the device used is
a) latch
b) flipflop
c) buffer
d) tristate buffer
View Answer
Answer: d
Explanation: A tristate buffer is used as an input device to overcome loading.
8. The chip 74LS245 is
a) bidirectional buffer
b) 8-bit input port
c) one that has 8 buffers
d) all of the mentioned
View Answer
Answer: d
Explanation: The chip 74LS245 is a bidirectional buffer that contains 8 buffers and may be used
as an 8-bit input port. But while using as an input device, only one direction is useful.
9. In 74LS245, if DIR is 1, then the direction is from
a) inputs to outputs
b) outputs to inputs
c) source to sink
d) sink to source
View Answer
Answer: a
Explanation: If DIR is 1, then the direction is from A(inputs) to B(outputs).
10. In memory-mapped scheme, the devices are viewed as
a) distinct I/O devices
b) memory locations
c) only input devices
d) only output devices
View Answer
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
Answer: b
Explanation: In memory-mapped scheme, the devices are viewed as memory locations and are
addressed likewise.
1. Programmable peripheral input-output port is another name for
a) serial input-output port
b) parallel input-output port
c) serial input port
d) parallel output port
View Answer
Answer: b
Explanation: The parallel input-output port chip 8255 is also known as programmable peripheral
input-output port.
2. Port C of 8255 can function independently as
a) input port
b) output port
c) either input or output ports
d) both input and output ports
View Answer
Answer: c
Explanation: Port C can function independently either as input or as output ports.
3. All the functions of the ports of 8255 are achieved by programming the bits of an internal register
called
a) data bus control
b) read logic control
c) control word register
d) none of the mentioned
View Answer
Answer: c
Explanation: By programming the bits of control word register, the operations of the ports are
specified.
advertisement
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
Answer: d
Explanation: RD(ACTIVE LOW), WR(ACTIVE LOW), A1, A0, RESET are the inputs provided by
the microprocessor to the read/write control logic of 8255.
6. The device that receives or transmits data upon the execution of input or output instructions by
the microprocessor is
a) control word register
b) read/write control logic
c) 3-state bidirectional buffer
d) none of the mentioned
View Answer
Answer: c
Explanation: 3-state bidirectional buffer is used to receives or transmits data upon the execution
of input or output instructions by the microprocessor.
7. The port that is used for the generation of handshake lines in mode 1 or mode 2 is
a) port A
b) port B
c) port C Lower
d) port C Upper
View Answer
Answer: d
Explanation: Port C upper is used for the generation of handshake lines in mode 1 or mode 2.
8. If A1=0, A0=1 then the input read cycle is performed from
a) port A to data bus
b) port B to data bus
c) port C to data bus
d) CWR to data bus
View Answer
Answer: b
Explanation: If A1=0, A0=1 then the input read cycle is performed from port B to data bus.
9. The function, ‘data bus tristated’ is performed when
a) CS(active low) = 1
b) CS(active low) = 0
c) CS(active low) = 0, RD(active low) = 1, WR(active low) = 1
d) CS(active low) = 1 OR CS(active low) = 0, RD(active low) = 1, WR(active low) = 1
View Answer
Answer: d
Explanation: The data bus is tristated when chip select pin=1 or chip select pin=0 and read and
write signals are high i.e 1.
10. The pin that clears the control word register of 8255 when enabled is
a) CLEAR
b) SET
c) RESET
d) CLK
View Answer
Answer: c
Explanation: If reset pin is enabled then the control word register is cleared.
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
6. The signal, SLCT in the direction of signal flow, OUT, indicates the selection of
a) Control word register
b) CPU
c) Printer
d) Ports
View Answer
Answer: c
Explanation: This signal indicates that the printer is selected.
7. The pulse width of the signal INIT at the receiving terminal must be more than
a) 10 microseconds
b) 20 microseconds
c) 40 microseconds
d) 50 microseconds
View Answer
Answer: d
Explanation: The pulse width of the signal must be more than 50microseconds at the receiving
terminal.
8. The level of the signal ERROR(active low) becomes ‘low’ when the printer is in
a) Paper end state
b) Offline state
c) Error state
d) All of the mentioned
View Answer
Answer: d
Explanation: The level of the signal ERROR(active low) becomes ‘low’ when the printer is in the
Paper end state, Offline state and Error state.
9. The signals that are provided to maintain proper data flow and synchronization between the
data transmitter and receiver are
a) handshaking signals
b) control signals
c) input signals
d) none
View Answer
Answer: a
Explanation: Handshaking signals maintain proper data flow and synchronization.
10. The feature of mode 2 of 8255 is
a) single 8-bit port is available
b) both inputs and outputs are latched
c) port C is used for generating handshake signals
d) all of the mentioned
View Answer
Answer: d
Explanation: In mode 2 of 8255, a single 8-bit port is available i.e group A.
1. The time taken by the ADC from the active edge of SOC(start of conversion) pulse till the active
edge of EOC(end of conversion) signal is called
a) edge time
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
b) conversion time
c) conversion delay
d) time delay
View Answer
Answer: c
Explanation: Broadly speaking, the time taken by the converter to calculate the equivalent digital
data output from the moment of the start of conversion is called conversion delay.
2. The popular technique that is used in the integration of ADC chips is
a) successive approximation
b) dual slope integration
c) successive approximation and dual slope integration
d) none
View Answer
Answer: c
Explanation: Successive approximation and dual slope integration are the most popular
techniques that are used in the integrated ADC chips.
3. The procedure of algorithm for interfacing ADC contain
a) ensuring stability of analog input
b) issuing start of conversion pulse to ADC
c) reading digital data output of ADC as equivalent digital output
d) all of the mentioned
View Answer
Answer: d
Explanation: The general algorithm for interfacing ADC contains ensuring the stability of analog
input, issuing start of conversion pulse to ADC, reading end of conversion signal to mark the end
of a conversion process, reading digital data output of ADC as equivalent digital output.
advertisement
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
6. The number of inputs that can be connected at a time to an ADC that is integrated with
successive approximation is
a) 4
b) 2
c) 8
d) 16
View Answer
Answer: c
Explanation: As these converters internally have 3:8 analog multiplexer, at a time 8 different
analog inputs can be connected to the chip.
7. ADC 7109 integrated by Dual slope integration technique is used for
a) low cost option
b) slow practical applications
c) low complexity
d) all of the mentioned
View Answer
Answer: d
Explanation: Compared to other 12-bit ADCs, it is of very low cost and useful for slow practical
applications.
8. Which of the following is not one of the phases of the total conversion cycle?
a) autozero phase
b) conversion phase
c) signal integrate phase
d) disintegrate phase
View Answer
Answer: b
Explanation: Autozero phase, signal integrate phase and disintegrate phase are the three phases
of total conversion cycle.
9. Which of the following phase contain feedback loop in it?
a) autozero phase
b) signal integrate phase
c) disintegrate phase
d) none
View Answer
Answer: a
Explanation: A feedback loop is closed around the system to charge the autozero capacitor to
compensate for the offset voltages in the buffer amplifier, integrator and comparator.
10. In the signal integrate phase, the differential input voltage between IN LO(input low) and IN
HI(input high) pins is integrated by the internal integrator for a fixed period of
a) 256 clock cycles
b) 1024 clock cycles
c) 2048 clock cycles
d) 4096 clock cycles
View Answer
Answer: c
Explanation: The internal integrator needs 2048 clock cycles to integrate voltage difference
between input low and input high.
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
1. DAC (Digital to Analog Converter) finds application in
a) digitally controlled gains
b) motor speed controls
c) programmable gain amplifiers
d) all of the mentioned
View Answer
Answer: d
Explanation: DAC is used in digitally controlled gains, motor speed controls and programmable
gain amplifiers.
2. To save the DAC from negative transients the device connected between OUT1 and OUT2 of
AD 7523 is
a) p-n junction diode
b) Zener
c) FET
d) BJT (Bipolar Junction transistor)
View Answer
Answer: b
Explanation: Zener is connected between OUT1 and OUT2 pins of AD7523 to save from negative
transients.
3. An operational amplifier connected to the output of AD 7523 is used
a) to convert current output to output voltage
b) to provide additional driving capability
c) as current-to-voltage converter
d) all of the mentioned
View Answer
Answer: d
Explanation: An operational amplifier is used as a current-to-voltage converter to convert the
current output to output voltage and also provides additional driving capability to the DAC.
advertisement
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
Answer: c
Explanation: Stepper motor employs rotation of its shaft in terms of steps, rather than continuous
rotation as in case of AC or DC motors.
6. The internal schematic of a typical stepper motor has
a) 1 winding
b) 2 windings
c) 3 windings
d) 4 windings
View Answer
Answer: d
Explanation: The internal schematic of a typical stepper motor has 4 windings.
7. The number of pulses required for one complete rotation of the shaft of the stepper motor is
equal to the
a) number of internal teeth on a rotor
b) number of internal teeth on a stator
c) number of internal teeth on a rotor and stator
d) number of external teeth on a stator
View Answer
Answer: a
Explanation: The number of pulses required for one complete rotation of the shaft of the stepper
motor is equal to the number of internal teeth on its rotor.
8. A simple scheme for rotating the shaft of a stepper motor is called
a) rotating scheme
b) shaft scheme
c) wave scheme
d) none
View Answer
Answer: c
Explanation: In this scheme, the windings are applied with the required voltage pulses, in a cyclic
fashion.
9. The firing angles of thyristors are controlled by
a) pulse generating circuits
b) relaxation oscillators
c) microprocessor
d) all of the mentioned
View Answer
Answer: d
Explanation: In early days, the firing angles were controlled by a pulse generating circuits like
relaxation oscillators and now, they are accurately fired using a microprocessor.
10. The Isolation transformers are generally used for
a) protecting low power circuit
b) isolation
c) protecting low power circuit and isolation
d) none
View Answer
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
Answer: c
Explanation: Any switching component of a high power circuit may be sufficient to damage the
microprocessor system. So, to protect the low power circuit isolation transformers are used. They
are also used if isolation is necessary.
1. The number of counters that are present in the programmable timer device 8254 is
a) 1
b) 2
c) 3
d) 4
View Answer
Answer: c
Explanation: There are three counters that can be used as either counters or delay generators.
2. The operation that can be performed on control word register is
a) read operation
b) write operation
c) read and write operations
d) none
View Answer
Answer: b
Explanation: The control word register can only be written and cannot be read.
3. The mode that is used to interrupt the processor by setting a suitable terminal count is
a) mode 0
b) mode 1
c) mode 2
d) mode 3
View Answer
Answer: a
Explanation: Mode 0 is also called as an interrupt on the terminal count.
advertisement
4. In mode 2, if N is loaded as the count value, then after (N-1) cycles, the output becomes low for
a) 1 clockcycle
b) 2 clockcycles
c) 3 clockcycles
d) 4 clockcycles
View Answer
Answer: a
Explanation: After (N-1) cycles, the output becomes low for only 1 clockcycle. If the count N is
reloaded and again the output becomes high and remains so for (N-1) clock pulses.
5. The generation of a square wave is possible in the mode
a) mode 1
b) mode 2
c) mode 3
d) mode 4
View Answer
Answer: c
Explanation: When the count N loaded is even, then for half of the count, the output remains high
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
and for the remaining half it remains low. If the count loaded is odd, the first clock pulse decrements
it by 1 resulting in an even count value.
6. In control word register, if SC1=0 and SC0=1, then the counter selected is
a) counter 0
b) counter 1
c) counter 2
d) none
View Answer
Answer: b
Explanation: SC denotes select counter.
7. In control word format, if RL1=1, RL0=1 then the operation performed is
a) read/load least significant byte only
b) read/load most significant byte only
c) read/load LSB first and then MSB
d) read/load MSB first and then LSB
View Answer
Answer: c
Explanation: To access 16 bit, first LSB is loaded first, and then MSB.
8. If BCD=0, then the operation is
a) decimal count
b) hexadecimal count
c) binary count
d) octal count
View Answer
Answer: b
Explanation: If BCD=0 then hexadecimal count. If BCD=1, then the operation is BCD count.
9. The counter starts counting only if
a) GATE signal is low
b) GATE signal is high
c) CLK signal is low
d) CLK signal is high
View Answer
Answer: b
Explanation: If the GATE signal is enabled, then the counter starts counting.
10. The control word register contents are used for
a) initializing the operating modes
b) selection of counters
c) choosing binary/BCD counters
d) all of the mentioned
View Answer
Answer: d
Explanation: The control word register contents are used for
i) initializing the operating modes (mode 0-mode 4)
ii) selection of counters (counter0-counter2)
iii) choosing binary or BCD counters
iv) loading of the counter registers.
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
1. The number of hardware interrupts that the processor 8085 consists of is
a) 1
b) 3
c) 5
d) 7
View Answer
Answer: c
Explanation: The processor 8085 has five hardware interrupt pins. Out of these five, four pins were
alloted fixed vector addresses but the pin INTR was not alloted by vector address, rather an
external device was supposed to hand over the type of the interrupt to the microprocessor.
2. The register that stores all the interrupt requests in it in order to serve them one by one on a
priority basis is
a) Interrupt Request Register
b) In-Service Register
c) Priority resolver
d) Interrupt Mask Register
View Answer
Answer: a
Explanation: The interrupts at IRQ input lines are handled by Interrupt Request Register internally.
3. The register that stores the bits required to mask the interrupt inputs is
a) In-service register
b) Priority resolver
c) Interrupt Mask register
d) None
View Answer
Answer: c
Explanation: Also, Interrupt Mask Register operates on IRR(Interrupt Request Register) at the
direction of the Priority Resolver.
advertisement
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
Answer: d
Explanation: A single 8259A provides 8 vectored interrupts. In cascade mode, 64 vectored
interrupts can be provided.
6. When the PS(active low)/EN(active low) pin of 8259A used in buffered mode, then it can be
used as a
a) input to designate chip is master or slave
b) buffer enable
c) buffer disable
d) none
View Answer
Answer: b
Explanation: When the pin is used in buffered mode, then it can be used as a buffer enable to
control buffer transreceivers. If it is not used in buffered mode, then the pin is used as input to
designate whether the chip is used as a master or a slave.
7. Once the ICW1 is loaded, then the initialization procedure involves
a) edge sense circuit is reset
b) IMR is cleared
c) slave mode address is set to 7
d) all of the mentioned
View Answer
Answer: d
Explanation: The initialization procedure involves
i) edge sense circuit is reset.
ii) IMR is cleared.
iii) IR7 input is assigned the lowest priority.
iv) slave mode address is set to 7
v) special mask mode is cleared and the status read is set to IRR.
8. When non-specific EOI command is issued to 8259A it will automatically
a) set the ISR
b) reset the ISR
c) set the INTR
d) reset the INTR
View Answer
Answer: b
Explanation: When non-specific EOI command is issued to 8259A it will automatically reset the
highest ISR.
9. In the application where all the interrupting devices are of equal priority, the mode used is
a) Automatic rotation
b) Automatic EOI mode
c) Specific rotation
d) EOI
View Answer
Answer: a
Explanation: The automatic rotation is used in the applications where all the interrupting devices
are of equal priority.
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
1. The registers that store the keyboard and display modes and operations programmed by CPU
are
a) I/O control and data buffers
b) Control and timing registers
c) Return buffers
d) Display address registers
View Answer
Answer: b
Explanation: The control and timing register to store the keyboard and display modes and other
operations programmed by CPU.
2. The sensor RAM acts as 8-byte first-in-first-out RAM in
a) keyboard mode
b) strobed input mode
c) keyboard and strobed input mode
d) scanned sensor matrix mode
View Answer
Answer: c
Explanation: In this mode, each key code of the pressed key is entered in the order of the entry,
and in the meantime, read by the CPU, till the RAM becomes empty.
3. The registers that hold the address of the word currently being written by the CPU from the
display RAM are
a) control and timing register
b) control and timing register and timing control
c) display RAM
d) display address registers
View Answer
Answer: d
Explanation: The display address registers holds the address of the word currently being written
or read by the CPU to or from the display RAM.
advertisement
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
d) sensor matrix mode
View Answer
Answer: a
Explanation: The scanned keyboard special error mode is programmed using end interrupt/error
mode set command. This mode is valid only under the N-key rollover mode.
6. When a key is pressed, the debounce circuit waits for 2 keyboard scans and then checks
whether the key is still depressed in
a) scanned keyboard special error mode
b) scanned keyboard with N-key rollover
c) scanned keyboard mode with 2 key lockout
d) sensor matrix mode
View Answer
Answer: b
Explanation: In this mode, When a key is pressed, the debounce circuit waits for 2 keyboard scans
and then checks whether the key is still depressed. If it is still depressed, the code is entered in
FIFO RAM.
7. The data that is entered from the left side of the display unit is of
a) left entry mode
b) right entry mode
c) left and right entry modes
d) none
View Answer
Answer: a
Explanation: The data that is entered from the left side of the display unit is of left entry mode, as
in a type-writer the first character typed appears at the left-most position, while the subsequent
characters appear successively to the right of the first one.
8. The FIFO status word is used to indicate the error in
a) keyboard mode
b) strobed input mode
c) keyboard and strobed input mode
d) scanned sensor matrix mode
View Answer
Answer: c
Explanation: Overrun error occurs when an already full FIFO has attempted an entry. Underrun
error occurs when an empty FIFO read is attempted.
9. The flag that increments automatically after each read or write operation to the display RAM is
a) IF
b) RF
c) AI
d) WF
View Answer
Answer: c
Explanation: AI refers to auto increment flag.
10. If any change in sensor value is detected at the end of a sensor matrix scan, then the IRQ line
a) goes low
b) goes high
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
c) remains unchanged
d) none
View Answer
Answer: b
Explanation: In sensor matrix mode, the IRQ line goes high, if any change in sensor value is
detected at the end of a sensor matrix scan or the sensor RAM has a previous entry to be read by
the CPU.
1. Which of the following is not a mode of data transmission?
a) simplex
b) duplex
c) semi duplex
d) half duplex
View Answer
Answer: c
Explanation: Basically, there are three modes of data transmission. simplex, duplex and half
duplex.
2. If the data is transmitted only in one direction over a single communication channel, then it is of
a) simplex mode
b) duplex mode
c) semi duplex mode
d) half duplex mode
View Answer
Answer: a
Explanation: In simplex mode, the data transmission is unidirectional. For example, a CPU may
transmit data for a CRT display unit in this mode.
3. If the data transmission takes place in either direction, but at a time data may be transmitted
only in one direction then, it is of
a) simplex mode
b) duplex mode
c) semi duplex mode
d) half duplex mode
View Answer
Answer: d
Explanation: In half duplex mode, data transmission is bidirectional but not at a time. For example,
Walkie-Talkie.
advertisement
4. In 8251A, the pin that controls the rate at which the character is to be transmitted is
a) TXC(active low)
b) TXC(active high)
c) TXD(active low)
d) RXC(active low)
View Answer
Answer: a
Explanation: Transmitter Clock Input (TXC(active low)) is a pin that controls the rate at which the
character is to be transmitted.
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
5. TXD(Transmitted Data Output) pin carries serial stream of the transmitted data bits along with
a) start bit
b) stop bit
c) parity bit
d) all of the mentioned
View Answer
Answer: d
Explanation: Transmitted Data Output pin carries a serial stream of the transmitted data bits along
with other information like start bits, stop bits and parity bits etc.
6. The signal that may be used either to interrupt the CPU or polled by the CPU is
a) TXRDY(Transmitter ready)
b) RXRDY(Receiver ready output)
c) DSR(active low)
d) DTR(active low)
View Answer
Answer: b
Explanation: RXRDY(Receiver ready output) may be used either to interrupt the CPU or polled by
the CPU.
7. The disadvantage of RS-232C is
a) limited speed of communication
b) high-voltage level signaling
c) big-size communication adapters
d) all of the mentioned
View Answer
Answer: d
Explanation: RS232C has been used for long and has a few disadvantages like limited speed of
communication, high-voltage level signaling and big-size communication adapters.
8. The USB supports the signaling rate of
a) full-speed USB 1.0 at rate of 12 Mbps
b) high-speed USB 2.0 at rate of 480 Mbps
c) super-speed USB 3.0 at rate of 596 Mbps
d) all of the mentioned
View Answer
Answer: d
Explanation: The USB standards support the signaling rates. Also, USB signaling is implemented
in a differential in low- and full-speed options.
9. The bit packet that commands the device either to receive data or transmit data in transmission
of USB asynchronous communication is
a) Handshake packet
b) Token packet
c) PRE packet
d) Data packet
View Answer
Answer: b
Explanation: The token packet is the second type of packet which commands the device either to
receive data or transmit data.
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
10. High speed USB devices neglect
a) Handshake packet
b) Token packet
c) PRE packet
d) Data packet
View Answer
Answer: c
Explanation: PRE packets are only of importance to low-speed USB devices.
This set of Microprocessor Multiple Choice Questions & Answers (MCQs) focuses on “DMA
Controller 8257”.
4. In 8257 register format, the selected channel is disabled after the terminal count condition is
reached when
a) Auto load is set
b) Auto load is reset
c) TC STOP bit is reset
d) TC STOP bit is set
View Answer
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
Answer: d
Explanation: If the TC STOP bit is set, the selected channel is disabled after the terminal count
condition is reached, and it further prevents any DMA cycle on the channel.
5. The IOR (active low) input line acts as output in
a) slave mode
b) master mode
c) master and slave mode
d) none of the mentioned
View Answer
Answer: b
Explanation: The IOR (active low) is an active low bidirectional tristate input line, that acts as input
in the slave mode, and acts as output in the master mode. In master mode, this signal is used to
read data from a peripheral during a memory write cycle.
6. The IOW (active low) in its slave mode loads the contents of a data bus to
a) 8-bit mode register
b) upper/lower byte of 16-bit DMA address register
c) terminal count register
d) all of the mentioned
View Answer
Answer: d
Explanation: In its slave mode, the IOW (active low) loads the contents of a data bus to 8-bit mode
register, upper/lower byte of 16-bit DMA address register or terminal count register.
7. The pin that disables all the DMA channels by clearing the mode registers is
a) MARK
b) CLEAR
c) RESET
d) READY
View Answer
Answer: c
Explanation: The RESET pin which is asynchronous input disables all the DMA channels by
clearing the mode registers, and tristate all the control lines.
8. The pin that requests the access of the system bus is
a) HLDA
b) HRQ
c) ADSTB
d) None of the mentioned
View Answer
Answer: b
Explanation: The hold request output requests the access of the system bus.
9. The pin that is used to write data to the addressed memory location, during DMA write operation
is
a) MEMR (active low)
b) AEN
c) MEMW (active low)
d) IOW (active low)
View Answer
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
Answer: c
Explanation: The MEMW (active low) is used to write data to the addressed memory location,
during DMA write operation.
10. The pin that strobes the higher byte of the memory address, generated by the DMA controller
into the latches is
a) AEN
b) ADSTB
c) TC
d) None of the mentioned
View Answer
Answer: b
Explanation: The pin ADSTB strobes the higher byte of the memory address, generated by the
DMA controller into the latches.
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
4. If more than one channel requests service simultaneously, the transfer will occur as
a) multi transfer
b) simultaneous transfer
c) burst transfer
d) none of the mentioned
View Answer
5. The continuous transfer may be interrupted by an external device by pulling down the signal
a) HRQ
b) DACK (active low)
c) DACK (active high)
d) HLDA
View Answer
Answer: d
Explanation: The burst or continuous transfer may be interrupted by an external device by pulling
down the HLDA line.
6. The number of clock cycles required for an 8257 to complete a transfer is
a) 2
b) 4
c) 8
d) none of the mentioned
View Answer
Answer: b
Explanation: The 8257 uses four clock cycles to complete a transfer.
7. In 8257, if each device connected to a channel is assigned to a fixed priority then it is said to be
in
a) rotating priority scheme
b) fixed priority scheme
c) rotating priority and fixed priority scheme
d) none of the mentioned
View Answer
Answer: b
Explanation: In this scheme, the DRQ3 has the lowest priority followed by DRQ2 and DRQ1. The
DRQ0 has the highest priority.
8. The priority of the channels varies frequently in
a) rotating priority scheme
b) fixed priority scheme
c) rotating priority and fixed priority scheme
d) none of the mentioned
View Answer
Answer: a
Explanation: In this scheme, the priorities assigned to the channels are not fixed.
9. The register of 8257 that can only be written in is
a) DMA address register
b) Terminal count register
c) Mode set register
d) Status register
View Answer
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
Answer: c
Explanation: The selected register may be read or written depending on the instruction executed
by the CPU. But only write operation can be performed on the mode set register.
10. The operation that can be performed on the status register is
a) write operation
b) read operation
c) read and write operations
d) none of the mentioned
View Answer
Answer: b
Explanation: The status register can only be read.
1. The block of 8237 that decodes the various commands given to the 8237 by the CPU is
a) timing and control block
b) program command control block
c) priority block
d) none of the mentioned
View Answer
Answer: b
Explanation: The program control block decodes various commands given to the 8237 by the CPU
before servicing a DMA request.
2. The priority between the DMA channels requesting the services can be resolved by
a) timing and control block
b) program command control block
c) priority block
d) none of the mentioned
View Answer
Answer: c
Explanation: The priority encoder block resolves the priority between the DMA channels
requesting the services.
3. The register that holds the current memory address is
a) current word register
b) current address register
c) base address register
d) command register
View Answer
Answer: b
Explanation: The current address register holds the current memory address. The current address
register is accessed during the DMA transfer.
advertisement
4. The register that holds the data byte transfers to be carried out is
a) current word register
b) current address register
c) base address register
d) command register
View Answer
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
5. When the count becomes zero in the current word register then
a) Input signal is enabled
b) Output signal is enabled
c) EOP (end of process) is generated
d) Start of process is generated
View Answer
Answer: c
Explanation: When the count becomes zero, the EOP signal is generated. This can be written in
successive bytes by the CPU, in program mode.
6. The current address register is programmed by the CPU as
a) bit-wise
b) byte-wise
c) bit-wise and byte-wise
d) none of the mentioned
View Answer
Answer: b
Explanation: The current address register is byte-wise programmed by the CPU, i.e. lower byte
first and the higher byte later.
7. Which of these register’s contents is used for auto-initialization (internally)?
a) current word register
b) current address register
c) base address register
d) command register
View Answer
Answer: c
Explanation: The contents of base address register cannot be read by the CPU. These contents
are used internally for auto-initialization.
8. The register that maintains an original copy of the respective initial current address register and
current word register is
a) mode register
b) base address register
c) command register
d) mask register
View Answer
Answer: b
Explanation: The base address register maintains an original copy of the current address register
and current word register, before incrementing or decrementing.
9. The register that can be automatically incremented or decremented, after each DMA transfer is
a) mask register
b) mode register
c) command register
d) current address register
View Answer
Answer: d
Explanation: The address is automatically incremented or decremented after each DMA transfer,
and the resulting address value is again stored in the current address register.
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
10. Which of the following is a type of DMA transfer?
a) memory read
b) memory write
c) verify transfer
d) all of the mentioned
View Answer
Answer: d
Explanation: Memory read, memory write and verify transfer are the three types of DMA transfer.
1. Each bit in the request register is cleared by
a) under program control
b) generation of TC
c) generation of an external EOP
d) all of the mentioned
View Answer
2. The register that holds the data during memory to memory data transfer is
a) mode register
b) temporary register
c) command register
d) mask register
View Answer
Answer: b
Explanation: The temporary register holds the data during memory to memory data transfers. After
the completion of the transfer operation, the last word transferred remains in the temporary
register, until it is cleared by a reset operation.
3. The register that keeps track of all the DMA channel pending requests and status of their
terminal counts is
a) mask register
b) request register
c) status register
d) count register
View Answer
Answer: c
Explanation: The status register keeps track of all the DMA channel pending requests, and status
of their terminal counts. These are cleared upon reset.
advertisement
4. The pin that clears the command, request and temporary registers, and internal first/last flipflop
when it is set is
a) CLEAR
b) SET
c) HLDA
d) RESET
View Answer
Answer: d
Explanation: A high on the reset pin clears the command, status, request and temporary registers,
and also clears the internal first/last flipflop.
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
5. The DMA request input pin that has the highest priority is
a) DREQ0
b) DREQ1
c) DREQ2
d) DREQ3
View Answer
Answer: a
Explanation: DREQ0 has the highest priority while DREQ3 has the lowest one. The priorities of
the DREQ lines is programmable.
6. When interface 8237 does not have any valid pending DMA request then it is said to be in
a) active state
b) passive state
c) idle state
d) none of the mentioned
View Answer
Answer: c
Explanation: If 8237 is in idle state, then CPU may program it in this state.
7. To complete a DMA transfer, a memory to memory transfer requires
a) a read from memory cycle
b) a write to memory cycle
c) a read-from and write-to memory cycle
d) none of the mentioned
View Answer
Answer: c
Explanation: A memory to memory transfer is a two cycle operation and requires a read from and
write-to memory cycle, to complete each DMA transfer.
8. In demand transfer mode of 8237, the device stops data transfer when
a) a TC (terminal count) is reached
b) an external EOP (active low) is detected
c) the DREQ signal goes inactive
d) all of the mentioned
View Answer
Answer: d
Explanation: In demand transfer mode, the device continues transfers till a TC is reached or an
external EOP is detected or the DREQ signal goes inactive.
9. The mode of 8237 in which the device transfers only one byte per request is
a) block transfer mode
b) single transfer mode
c) demand transfer mode
d) cascade mode
View Answer
Answer: b
Explanation: In single mode, the device transfers only one byte per request. For each transfer, the
DREQ must be active until the DACK is activated.
10. The transfer of a block of data from one set of memory address to another takes place in
a) block transfer mode
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
b) demand transfer mode
c) memory to memory transfer mode
d) cascade mode
View Answer
Answer: c
Explanation: To perform the transfer of a block of data from one set of a memory address to
another one, this transfer mode is used.
11. Which of the following command is used to make all the internal registers of 8237 clear?
a) clear first/last flipflop
b) master clear command
c) clear mask register
d) none of the mentioned
View Answer
Answer: b
Explanation: Using master clear command, all the internal registers of 8237 are cleared, while all
the bits of the mask register are set.
1. The basic principle of floppy disks involve
a) magnetic data reading
b) magnetic data recording
c) magnetic data recording and reading
d) none of the mentioned
View Answer
Answer: c
Explanation: Whatever their physical sizes and storage formats, all the floppies incorporate the
basic principles of magnetic data recording and reading.
2. In floppy disk, the small hole that enables the drive to identify the beginning of a track and its
first sector is
a) inner hole
b) key hole
c) index hole
d) start hole
View Answer
Answer: c
Explanation: The small hole called index hole, enables the drive to identify the beginning of a track
and its first sector.
3. Inside its jacket, the floppy media is rotated at the speed of
a) 200 RPM
b) 300 RPM
c) 150 RPM
d) 50 RPM
View Answer
Answer: b
Explanation: The floppy media is rotated at the speed of 300 RPM (Revolution Per Minute) inside
its jacket.
advertisement
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
4. The Double Density Double Sided disks on each side are organized with
a) 20 tracks
b) 30 tracks
c) 40 tracks
d) 50 tracks
View Answer
Answer: c
Explanation: The Double Density Double Sided (DDDS) disks are organized with 40 tracks on
each side of the disk.
5. The magnetic recording technique used for storing data onto the disks (floppy disks) is called
a) return to zero
b) non-return to zero
c) return to zero and Non-return to zero
d) none of the mentioned
View Answer
Answer: b
Explanation: In this technique, the magnetic flux on the disk surface never returns to zero, i.e. no
erase operation is carried out.
6. For reading the disks DVD uses
a) blue laser
b) white laser
c) red laser
d) green laser
View Answer
Answer: c
Explanation: A DVD is an optical disk that uses a red laser for reading the disks.
7. For reading the disks, the blue ray disk uses
a) high frequency red laser
b) low frequency red laser
c) high frequency blue laser
d) low frequency blue laser
View Answer
Answer: c
Explanation: The blue ray disk uses a high frequency blue laser with a small wavelength to read
the disk.
8. A blue ray disk can store data upto _________ per layer.
a) 25 KB
b) 25 MB
c) 25 TB
d) 25 GB
View Answer
Answer: d
Explanation: A blue ray disk can store data upto 25 GB per layer and is popularly used for storing
long duration videos like movies.
9. DVDRW is for
a) read-write DVD
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
b) rewriteable DVD
c) recordable DVD
d) none of the mentioned
View Answer
Answer: b
Explanation: DVDRW is for rewriteable DVD and DVDR is for recordable DVD.
10. The HDD is also called as
a) hard disk
b) hard drive
c) fixed disk
d) all of the mentioned
View Answer
Answer: d
Explanation: The Hard Disk Drive is also called as a hard disk, hard drive, fixed drive, fixed disk
or fixed disk drive.
1. The memory of a microprocessor serves as
a) storage of individual instructions
b) temporary storage for the data
c) storing common instructions or data for all processors
d) all of the mentioned
View Answer
Answer: d
Explanation: The memory serves the microprocessor in the same way, whether it is a single
microprocessor or a multi microprocessor.
2. In shared bus architecture, the required processor(s) to perform a bus cycle, for fetching data
or instructions is
a) one processor
b) two processors
c) more than two processors
d) none of the mentioned
View Answer
Answer: a
Explanation: In a shared bus architecture, only one processor performs bus cycle to fetch
instructions or data from the memory.
3. In multiport memory configuration, the processor(s) that address the multiport memory is(are)
a) 1
b) 2
c) 3
d) many
View Answer
Answer: b
Explanation: The processors P1 and P2 address a multiport memory, which can be accessed at
a time by both the processors.
advertisement
4. The memory space of a processor that is mapped to other processor/processors and vice-versa
is known as
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
a) multi microprocessor system
b) memory technique
c) bus window technique
d) mapping technique
View Answer
Answer: c
Explanation: The bus window technique is the correct method of interconnection between the
processors.
5. The disadvantage of the bus window technique is
a) both processors must know about bus window
b) both processors must know the address map
c) loss of effective local memory space
d) all of the mentioned
View Answer
Answer: d
Explanation: The disadvantage of bus window technique is that both processors must know
implicitly about the existence of a bus window, its size and the address map. It also results in loss
of effective local memory space.
6. Bus switches are present in
a) bus window technique
b) crossbar switching
c) linked input/output
d) shared bus
View Answer
Answer: b
Explanation: In crossbar switching type of interconnection topology, several parallel data paths
are possible. Each node of the crossbar represents a bus switch.
7. Which of the following is not a type of configuration that is based on physical interconnections
between the processors?
a) star configuration
b) loop configuration
c) regular topologies
d) incomplete interconnection
View Answer
Answer: d
Explanation: Based on the physical interconnections between the processors, the configurations
are
i) star configuration
ii) loop or ring configuration
iii) complete interconnection
iv) regular topologies
v) irregular topologies.
8. The configuration, in which all the processing elements are connected to a central switching
element, that may be independent processor via dedicated paths is
a) star
b) loop
c) complete
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
d) irregular
View Answer
Answer: a
Explanation: The switching element controls the interconnections between the processing
elements.
9. The configuration that is not suitable for a large number of processors is
a) star
b) loop
c) complete
d) regular
View Answer
Answer: c
Explanation: For a large number of processors, the complete interconnection is impractical due to
a large number of interconnection paths.
10. The array processor architecture is an example of
a) star
b) loop
c) complete
d) regular
View Answer
Answer: d
Explanation: In array processor architecture, the processing elements are arranged in a regular
fashion.
1. The interconnection topologies are implemented using _________ as a node.
a) control unit
b) microprocessor
c) processing unit
d) microprocessor or processing unit
View Answer
Answer: d
Explanation: The microprocessors or processing unit is used as a node in interconnection
topologies. They may also work as stand-alone processors or subprocessing units, under the
control of other microprocessors or processing units.
2. The feature of the multi-microprocessor architecture is
a) task dependent
b) single bus provider for many processors
c) design is for a specific task
d) all of the mentioned
View Answer
Answer: d
Explanation: The main feature of multi-microprocessor is that it is task dependent. If it is designed
for a specific task, then it may not be useful for other tasks.
3. The main objective in building the multi-microprocessor is
a) greater throughput
b) enhanced fault tolerance
c) greater throughput and enhanced fault tolerance
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
d) none of the mentioned
View Answer
Answer: c
Explanation: Greater throughput and enhanced fault tolerance are the main objectives of the multi-
microprocessor system. These systems incorporate a multiplicity of hardware and software, for
the purpose.
advertisement
4. An interface between the user or an application program, and the system resources are
a) microprocessor
b) microcontroller
c) multi-microprocessor
d) operating system
View Answer
Answer: d
Explanation: The operating system acts as an interface, and is an important program that resides
in the computer memory.
5. An operating system provides
a) hardware and software resource management
b) input/output management
c) memory management
d) all of the mentioned
View Answer
Answer: d
Explanation: An operating system provides a means of hardware and software resource
management including input/output and memory management.
6. Distributed systems are designed to run
a) serial process
b) parallel process
c) serial and parallel process
d) none of the mentioned
View Answer
Answer: d
Explanation: Distributed systems are designed to run a parallel process. It is essential that a proper
environment exists for concurrent processes to communicate and cooperate, in order to complete
the allotted task.
7. A distributed operating system must provide a mechanism for
a) intraprocessor communication
b) intraprocess and intraprocessor communication
c) interprocess and interprocessor communication
d) interprocessor communication
View Answer
Answer: c
Explanation: A distributed operating system must provide a mechanism for interprocess and
interprocessor communication.
8. A multiprocessor operating system should perform
a) a mechanism to split a task into concurrent subtasks
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
b) optimize the system performance
c) handling structural or architectural changes
d) all of the mentioned
View Answer
Answer: d
Explanation: A multiprocessor operating system should have a mechanism to split a task, optimise
system performance, and should handle structural changes.
9. An operating system must possess
a) process-processor allocation strategies
b) mechanism to collect results of subtasks
c) software to improve overall performance
d) all of the mentioned
View Answer
Answer: d
Explanation: An operating system must have process-processor allocation strategies, a
mechanism to collect results of subtasks and software to improve overall performance.
10. A multiprocessor operating system must take care of
a) authorized data access and data protection
b) unauthorized data access and data protection
c) authorized data access
d) data protection
View Answer
Answer: b
Explanation: A multiprocessor operating system must take care of unauthorized data access and
data protection.
1. The unit that executes all the numeric processor instructions in 8087 is
a) Control unit
b) ALU
c) Numeric extension unit
d) None of the mentioned
View Answer
Answer: c
Explanation: The 8087 is divided into two sections namely control unit and numeric extension unit
in which the numeric extension unit executes all the numeric processor instructions.
2. The unit that receives and decodes the instructions in 8087 is
a) Control unit
b) ALU
c) Numeric extension unit
d) None of the mentioned
View Answer
Answer: a
Explanation: The control unit receives, decodes the instructions, and executes the 8087 control
instructions.
3. The control unit functions in
a) establishing communication between CPU and memory
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
b) coordinating the internal coprocessor execution
c) reads and writes memory operands
d) all of the mentioned
View Answer
Answer: d
Explanation: The control unit is used for establishing communication between CPU and memory
and coordinating the internal coprocessor execution.
advertisement
4. When the numeric extension unit (NEU) begins its execution, then the signal that is active is
a) BUSY (active high)
b) BUSY (active low)
c) READY (active low)
d) RESET (active high)
View Answer
Answer: a
Explanation: When NEU begins its execution, the BUSY signal is pulled up. Also, this output signal
when high, indicates to the CPU that it is busy with the execution of an allotted instruction.
5. The register that allows the register programmer to select the required processing options is
a) significant
b) exponent
c) control word register
d) none of the mentioned
View Answer
Answer: c
Explanation: The control word register allows the register programmer to select the required
processing options out of available ones. It is used to control the operation of 8087.
6. Invalid operation is the exception generated due to
a) stack overflow
b) stack underflow
c) indeterminate form as result
d) all of the mentioned
View Answer
Answer: d
Explanation: Invalid operation is generated due to stack overflow, stack underflow, indeterminate
form as result, or non-number (NAN) as operand.
7. The exception generated for a too big result to fit in the format is
a) invalid operation
b) overflow
c) denormalized operand
d) result overflow
View Answer
Answer: b
Explanation: A too big result to fit in the format generates this exception. The condition code bits
indicate that the result is prohibitively large.
8. If the result is infinity, then the exception generated is
a) overflow
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
b) invalid operation
c) denormalized operand
d) zero divide
View Answer
Answer: d
Explanation: If any non-zero finite operand is divided by zero, the zero divide exception is
generated. The resulting condition code bits indicate that the result is infinity, even if the exception
is masked.
9. To operate 8087 in maximum mode, the pin MN/MX (active low) is
a) connected to Vcc or power supply
b) connected to ground
c) left unconnected
d) none of the mentioned
View Answer
Answer: b
Explanation: The 8087 can operate in a maximum mode, only when the MN/MX (active low) pin
of the CPU is grounded. In maximum mode, all the control signals are derived using a sequence
chip known as a bus controller.
10. If the result is rounded according to the rounding control bits, then the exception generated is
a) denormalized operand
b) underflow
c) inexact result
d) invalid operation
View Answer
Answer: c
Explanation: If it is impossible to fit the actual result in the specified format, the result is rounded
according to the rounding control bits, and an exception is generated. This sets the precision
exception flag.
11. The instruction that stores a copy of top of the stack into the memory, and pops the top of the
stack is
a) FST
b) FSTP
c) FIST
d) FLD
View Answer
Answer: b
Explanation: FSTP (store floating point number and pop) stores a copy of top of the stack into
memory or any coprocessor register, and then pops the top of the stack.
12. The instruction that multiplies the content of the stack top by 2n is
a) FMUL
b) FPREM
c) FSCAL
d) FCSH
View Answer
Answer: c
Explanation: FSCAL instruction multiplies the content of the stack top by 2n, where n is an integral
part of stack and stores the result in stack.
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
13. If the opcode bit is D=1, then the source and destination operands are
a) incremented
b) decremented
c) cleared
d) interchanged
View Answer
Answer: d
Explanation: If D=1, then it interchanges the source and destination operands.
4. When the instruction, FPREM, is performed, the data stored on to the stack top is
a) dividend
b) divisor
c) quotient
d) remainder
View Answer
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
Answer: d
Explanation: The instruction divides the stack top (ST) by ST(1), and then stores the remainder to
the stack top (ST).
5. If ‘x’ is the value stored at the top of the stack, then the instruction F2XMI calculates the
expression
a) 2x
b) 2x+1
c) 2x-1
d) log(2x)
View Answer
Answer: c
Explanation: The instruction F2XMI calculates the expression, 2x-1, where the value ‘x’ is stored
at the top of the stack. The result is stored back at the top of the stack.
6. The content of the stack is compared with zero to check whether the content is zero, using the
instruction
a) FCOM
b) FIST
c) FCOMP
d) FXAM
View Answer
Answer: b
Explanation: The instruction FIST tests if the contents of the stack top is zero, and the condition
code flags are accordingly modified.
7. The instruction that loads log 10 (to the base 2) to stack top is
a) FLDPI
b) FLDLG2
c) FLD2T
d) FLDLN2
View Answer
Answer: c
Explanation: The instruction FLD2T loads the specified constant, log 10 (to the base 2) to the top
of the stack.
8. The instructions that are used to program the numeric processor or to handle the internal
housekeeping functions are
a) transcendental operations
b) comparison instructions
c) constant operations
d) coprocessor control instructions
View Answer
Answer: d
Explanation: The coprocessor control instructions are used either to program the numeric
processor or to handle the internal housekeeping functions like exception handling, flags
manipulations, and processor environment maintenance.
9. When the instruction FINIT performs its function, then the TAG status is
a) set
b) empty
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
c) reset
d) zero
View Answer
Answer: b
Explanation: This instruction performs the same function as the hardware reset. The control word
is set to 03FF, and the TAG status is set to empty.
10. The instruction that enables the interrupt structure and response mechanism is
a) FINIT
b) FDISI
c) FENI
d) FLDCW
View Answer
Answer: c
Explanation: The instruction FENI enables the interrupt structure and response mechanism of
8087.
11. The instruction that is used to store the environment of the coprocessor to a destination
memory location is
a) FINCSTP
b) FLDENV
c) FFREE
d) FSTENV
View Answer
Answer: d
Explanation: The instruction FSTENV is used to store the environment of the coprocessor to a
destination memory location, specified in the instruction using any of the 8086 addressing modes.
12. The instruction that is the NOP instruction of the coprocessor is
a) CNOP
b) FNOP
c) SNOP
d) PNOP
View Answer
Answer: b
Explanation: The FNOP is a NOP instruction of the coprocessor. No internal status or control flag
bits change.
1. The 8089 shares the system bus and memory with the host CPU in
a) tightly coupled configuration
b) loosely coupled configuration
c) tightly and loosely coupled configurations
d) none of the mentioned
View Answer
Answer: a
Explanation: In a tightly coupled configuration, the 8089 shares the system bus and memory with
the host CPU using its RQ (active low) or GT (active low) pins.
2. The 8089 communicates with the host CPU using bus arbiter and controller in
a) tightly coupled configuration
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
b) loosely coupled configuration
c) tightly and loosely coupled configurations
d) none of the mentioned
View Answer
Answer: b
Explanation: In a loosely coupled configuration, the 8089 has its own local bus and communicates
with the host CPU using bus arbiter and controller.
3. The number of address lines used by the I/O processor in 8089 is
a) 20
b) 12
c) 16
d) 8
View Answer
Answer: c
Explanation: The 8089 I/O processor uses only 16 address lines, and thus it can address only
64KB of IO space.
advertisement
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
2. The device that deals with the bus access control functions and bus handshake activities is
a) bus allotment controller
b) bus arbiter
c) priority resolver
d) none of the mentioned
View Answer
Answer: b
Explanation: The bus arbiter or 8289 takes care of bus access control functions and bus
handshake activities.
3. The clock generator delays the READY signal until the signal _________ goes low
a) DEN (active high)
b) DEN (active low)
c) AEN (active low)
d) AEN (active high)
View Answer
Answer: c
Explanation: If AEN (active low) is high, the clock generator delays the READY signal till the AEN
(active low) goes low.
advertisement
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
accepts the bus request inputs from all the masters and derives the priority outputs which further
drive the BPRN (active low) inputs of all the masters.
7. Which of the following is the simplest and cheapest method of bus arbitration?
a) daisy chaining
b) independent request
c) polling
d) none of the mentioned
View Answer
Answer: a
Explanation: The daisy chaining method is the simplest one, as it has less hardware complexity.
8. The method of bus arbitration that does not contain priority resolving network in it is
a) daisy chaining
b) independent request
c) polling
d) none
View Answer
Answer: a
Explanation: The daisy chaining method does not contain any priority resolving network, rather
the priorities of all the devices are essentially assumed to be in sequence.
9. Which of the following is the fastest method of bus arbitration?
a) daisy chaining
b) independent request
c) polling
d) none of the mentioned
View Answer
Answer: b
Explanation: The independent request scheme is quite fast because each of the masters can
independently communicate with the controller.
10. A set of address lines is driven by the controller in
a) daisy chaining
b) independent request
c) polling
d) none of the mentioned
View Answer
Answer: c
Explanation: In a polling scheme, a set of address lines is driven by the controller to address each
of the masters in sequence.
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
Answer: c
Explanation: The processors used in the multi-microprocessor are either coprocessors or
independent processors.
2. The processor that executes the instructions fetched for it by the host processor is
a) microprocessor
b) coprocessor
c) independent processor
d) coprocessor and independent processor
View Answer
Answer: b
Explanation: The coprocessor executes the instructions fetched for it by the host processor.
3. The processor that asks for bus access or may itself fetch the instructions and execute them is
a) microprocessor
b) coprocessor
c) independent processor
d) coprocessor and independent processor
View Answer
Answer: c
Explanation: The independent processor may ask for bus access, may fetch the instructions itself,
and execute them independently.
advertisement
1. The files that reside in the current drive and directory of the hard disk is
a) OBJ files
b) EXE files
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
c) SRC files
d) DEST files
View Answer
Answer: b
Explanation: The files that reside in the current drive and directory of the hard disk is EXE files.
2. The master processor stores the result buffers on to the hard disk with the filename as
a) .EXE file
b) .OBJ file
c) .EXE file with extension .RES
d) .OBJ file with extension .RES
View Answer
Answer: c
Explanation: The master processor stores the result buffers on to the hard disk with the filename
as .EXE file with extension .RES.
3. The 8288 bus controller chip derives the signals
a) ALE
b) DEN
c) DT/R(active low)
d) All of the mentioned
View Answer
Answer: d
Explanation: The latches are enabled by ALE signal and data will be enabled by DEN signal. The
ALE, DEN and DT/R(active low) signals are derived by a separate 8288 bus controller chip.
advertisement
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
4. The fetching of the program from secondary memory to place it in physical memory, during the
execution of CPU is called
a) mapping
b) swapping in
c) swapping out
d) pipelining
View Answer
Answer: b
Explanation: Whenever the portion of a program is required for execution by the CPU, it is fetched
from the secondary memory and placed in the physical memory. This is called swapping in of the
program.
5. The process of making the physical memory free by storing the portion of program and partial
results in the secondary storage called
a) mapping
b) swapping in
c) swapping out
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
d) pipelining
View Answer
Answer: c
Explanation: In swapping out, a portion of the program or important partial results required for
further execution, may be saved back on secondary storage to make the physical memory free,
for further execution of another required portion of the program.
6. The memory that is considered as a large logical memory space, that is not available physically
is
a) logical memory
b) auxiliary memory
c) imaginary memory
d) virtual memory
View Answer
Answer: d
Explanation: To the user, there exists a very large logical memory space, which is actually not
available called virtual memory. This does not exist physically in a system. It is however, possible
to map a large virtual memory space onto the real physical memory.
7. Memory management deals with
a) data protection
b) unauthorized access prevention
c) segmented memory
d) all of the mentioned
View Answer
Answer: d
Explanation: The important aspects of memory management are data protection, unauthorized
access prevention, and segmented memory.
8. The memory management and protection mechanisms are disabled when the 80286 is
operated in
a) normal mode
b) real address mode
c) virtual address mode
d) all of the mentioned
View Answer
Answer: b
Explanation: In real address mode of 80286, all the memory management and protection
mechanisms are disabled.
9. The memory management and protection mechanisms are enabled with advanced instruction
set when 80286 is operated in
a) normal mode
b) real address mode
c) virtual address mode
d) all of the mentioned
View Answer
Answer: c
Explanation: In virtual address mode, 80286 works with all of its memory management and
protection capabilities, with the advanced instruction set.
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
10. The 80286 is an upward object code compatible with 8086 or 8088 when operated in
a) normal mode
b) real address mode
c) virtual address mode
d) real and virtual address mode
View Answer
Answer: d
Explanation: The 80286 is operated in two modes, namely real address mode and virtual address
mode. In both the modes, the 80286 is compatible with 8086/8088.
1. The CPU of 80286 contains
a) 16-bit general purpose registers
b) 16-bit segment registers
c) status and control register
d) all of the mentioned
View Answer
Answer: d
Explanation: The CPU of 80286 contains the same set of registers as in 8086.
2. The bits that are modified according to the result of the execution of logical and arithmetic
instructions are called
a) byte addressable bit
b) control flag bits
c) status flag bit
d) none of the mentioned
View Answer
Answer: c
Explanation: The flag register bits, D0, D2, D4, D6, D7 and D11 are modified according to the
result of the execution of logical and arithmetic instructions. These are called as status flag bits.
3. The flags that are used for controlling machine operation are called
a) status flags
b) control flags
c) machine controlled flags
d) all of the mentioned
View Answer
Answer: b
Explanation: The flags such as trap flag (TF) and Interrupt flag (IF) bits are used for controlling the
machine operation, and thus they are called control flags.
advertisement
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
5. Which of the block is not considered as a block of an architecture of 80286?
a) address unit
b) bus unit
c) instruction unit
d) control unit
View Answer
Answer: d
Explanation: The CPU may be viewed to contain four functional parts and they are
i) Address Unit
ii) Bus Unit
iii) Instruction Unit
iv) Execution Unit.
6. The unit that is responsible for calculating the address of instructions, and data that the CPU
wants to access is
a) bus unit
b) address unit
c) instruction unit
d) control unit
View Answer
Answer: b
Explanation: The address unit is responsible for calculating the address of instructions, and data
that the CPU wants to access. Also, the address lines derived by this unit may be used to address
different peripherals.
7. The process of fetching the instructions in advance, and storing in the queue is called
a) mapping
b) swapping
c) instruction pipelining
d) storing
View Answer
Answer: c
Explanation: The instructions are fetched in advance and stored in a queue to enable faster
execution of the instructions. This concept is known as instruction pipelining.
8. The CPU must flush out the prefetched instructions immediately following the branch instruction
in
a) conditional branch
b) unconditional branch
c) conditional and unconditional branches
d) none of the mentioned
View Answer
Answer: b
Explanation: In case of unconditional branch, the CPU will have to flush out the prefetched
instructions, immediately following the branch instruction.
9. The device that interfaces and control the internal data bus with the system bus is
a) data interface
b) controller interface
c) data and control interface
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
d) data transreceiver
View Answer
Answer: d
Explanation: The data transreceivers interface and control the internal data bus with the system
bus.
10. The register bank of Execution Unit of 80286 is used as
a) for storing data
b) scratch pad
c) special purpose registers
d) all of the mentioned
View Answer
Answer: d
Explanation: The execution unit contains the register bank, used for storing the data as scratch
pad, or used as special purpose registers.
11. Which of the following is not an interrupt generated by 80286?
a) software interrupts
b) hardware or external interrupts
c) INT instruction
d) none of the mentioned
View Answer
Answer: d
Explanation: The interrupts generated by 80286 may be divided into 3 categories as external or
hardware interrupts, INT instruction or software interrupts and interrupts generated by exceptions.
12. For which of the following instruction does the return address point to instruction causing an
exception?
a) divide error exception
b) bound range exceeded exception
c) invalid opcode exception
d) all of the mentioned
View Answer
Answer: d
Explanation: For the instructions, divide error, bound range exceeded and invalid opcode
exceptions, the return address points to the instruction causing exception.
13. The instruction that comes into action, if the trap flag is set is
a) maskable interrupt
b) non-maskable interrupt
c) single step interrupt
d) breakpoint interrupt
View Answer
Answer: c
Explanation: Single step interrupt is an internal interrupt that comes into action if the trap flag (TF)
is set.
14. The interrupt that has the highest priority among the following is
a) Single step
b) NMI (non-maskable interrupt)
c) INTR
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
d) Instruction exception
View Answer
Answer: d
Explanation: The instruction exception has the highest priority followed by single step, NMI and
INTR instrution.
15. The interrupt that has the lowest priority among the following is
a) Processor extension segment overrun
b) INTR
c) INT instruction
d) NMI
View Answer
Answer: c
Explanation: The INT instruction has the lowest priority. The order of priority of interrupts from high
to low is
1) instruction exception
2) single step
3) NMI
4) processor extension segment overrun
5) INTR
6) INT instruction.
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
Answer: d
Explanation: The active high RESET input clears the internal logic of 80286, and re-initializes it.
The reset input pulse width should be at least 16 clock cycles.
9. To filter the output, a 0.047microfarads, 12V capacitor is connected between the pins
a) CAP and ground
b) Output pin and ground
c) CAP and Vcc
d) NMI and ground
View Answer
Answer: a
Explanation: A 0.047microfarads, 12V capacitor is connected between the CAP pin and ground,
to filter the output of the internal substrate bias generator.
10. The signal that causes the 80286 to perform the processor extension interrupt while executing
the WAIT and ESC instructions are
a) BUSY (active low)
b) PEACK (active low)
c) PEREQ
d) ERROR (active low)
View Answer
Answer: d
Explanation: An active ERROR (active low) signal causes the 80286 to perform the processor
extension interrupt while executing the WAIT and ESC instructions.
1. The 80286 CPU acts just like that of 8086 when operated in
a) real addressing mode
b) protected virtual address mode
c) real and protected virtual address modes
d) none of the mentioned
View Answer
Answer: a
Explanation: In the real addressing mode of operation of 80286, it just acts as a fast 8086.
2. In real addressing mode, the 80286 addresses a physical memory of
a) 16 MB
b) 8 MB
c) 2 MB
d) 1 MB
View Answer
Answer: d
Explanation: In real addressing mode, the 80286 addresses a physical memory of 1 Mbytes using
A0-A19. The lines A20-A23 are not used by the internal circuit of 80286 in this mode.
3. In real addressing mode, the 80286 operates at a speed
a) faster than that of 8086
b) half of that of 8086
c) slower than that of 8086
d) same as that of 8086
View Answer
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
Answer: a
Explanation: Because of extra pipelining and other circuit level improvements, in real address
mode also, the 80286 operates at a much faster rate than 8086.
advertisement
4. In physical memory, if the segment size limit is exceeded by the instruction or data then
a) instruction is not executed
b) exception is generated
c) saves to next segment automatically
d) none of the mentioned
View Answer
Answer: b
Explanation: An exception is generated if the segment size limit is exceeded by the instruction or
the data.
5. The 80286 reserves fixed area of physical memory for
a) system initialization
b) interrupt vector table
c) system initialization and interrupt vector table
d) none of the mentioned
View Answer
Answer: c
Explanation: The 80286 reserves two fixed areas of physical memory for system initialization and
interrupt vector table.
6. In the real mode, the memory that is reserved for interrupt vector table is
a) first 2 KB of memory
b) first 1 KB of memory
c) last 2 KB of memory
d) last 1 KB of memory
View Answer
Answer: b
Explanation: In the real mode, the first 1 Kbyte of memory starting from the address 00000H to
003FFH, is reserved for interrupt vector table.
7. In the real mode, the memory that is reserved for system initialization is
a) from 004FFH to 0FFFFH
b) from 004FFH to 05FFFH
c) from FFFF0H to FFFFFH
d) from FFF00H to FFFFFH
View Answer
Answer: c
Explanation: The addresses from FFFF0H to FFFFFH are reserved for system initialization, in real
addressing mode.
8. When 80286 is reset, it always starts its execution in
a) protected virtual addressing mode
b) real addressing mode
c) either real or protected virtual address modes
d) none of the mentioned
View Answer
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
Answer: b
Explanation: When 80286 is reset, it always starts its execution in real addressing mode.
9. The 80286 in real addressing mode performs
a) initialization of IP
b) enables interrupts
c) sets up descriptor table
d) all of the mentioned
View Answer
Answer: d
Explanation: The 80286 in real addressing mode performs the following functions: it initializes IP
and other registers of 80286, initializes the peripheral, enables interrupts, sets up descriptor
tables, and then prepares it for entering the protected virtual address mode.
10. In real address mode, while addressing the physical memory, the 80286 uses the signal
a) HLDA
b) BHE (active low)
c) CAP
d) HOLD
View Answer
Answer: b
Explanation: In real address mode, while addressing the physical memory, the 80286 uses BHE
(active low) along with A0-A19.
ses on “Protected Virtual Address Mode (PVAM) -1”.
1. The procedure of fetching the chosen program segments or data from the secondary storage
into the physical memory is
a) mapping
b) swapping
c) unswapping
d) pipelining
View Answer
Answer: b
Explanation: Swapping is the procedure of fetching the chosen program segments or data from
the secondary storage into the physical memory.
2. The procedure of storing back the partial results on to the secondary storage is called
a) mapping
b) swapping
c) unswapping
d) pipelining
View Answer
Answer: c
Explanation: The procedure of storing back the partial results or data back on to the secondary
storage is called unswapping.
3. The ability of 80286 to address the virtual memory per task is
a) 1MB
b) 1GB
c) 1TB
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
d) none of the mentioned
View Answer
Answer: b
Explanation: The 80286 is able to address 1Gbyte of virtual memory per task.
advertisement
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
d) trap gate
View Answer
Answer: a
Explanation: Call gates are used to alter the privilege levels.
5. The gate that is used to specify a corresponding service routine is
a) call gate and trap gate
b) task gate and interrupt gate
c) interrupt gate and trap gate
d) task gate and trap gate
View Answer
Answer: c
Explanation: Interrupt gates and trap gates are used to specify corresponding service routines.
6. The gate that is used to switch from one task to another is
a) trap gate
b) task gate
c) task gate and trap gate
d) none of the mentioned
View Answer
Answer: b
Explanation: Task gate is used to switch from one task to another.
7. The gate that uses word count field is
a) trap gate
b) task gate
c) interrupt gate
d) call gate
View Answer
Answer: d
Explanation: The word count field is only used by a call gate descriptor, to indicate the number of
bytes to be transferred from the stack of the calling routine to the stack of the called routine.
8. The memory that maintains the most frequently required data for execution, in a high speed
memory is called
a) virtual memory
b) physical memory
c) cache memory
d) ROM (read only memory)
View Answer
Answer: c
Explanation: To minimize the time required for fetching the frequently required descriptor
information, from the main memory, cache memory is used in which the most frequently required
data for execution is stored.
9. The selector field consists of
a) requested privilege level (RPL)
b) table indicator
c) index
d) all of the mentioned
View Answer
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
Answer: d
Explanation: In the protected mode, the contents of the segment registers are known as selectors.
The selector field consists of three fields namely, RPL, table indicator (TI) and index.
10. If table indicator, TI=0, then the descriptor table selected is
a) local descriptor table
b) global descriptor table
c) local and global descriptor table
d) none of the mentioned
View Answer
Answer: b
Explanation: The type of descriptor table is global if TI=0 and local if TI=1.
11. The instruction that is executed at privilege level zero (0) is
a) LDT
b) LGDT and LLDT
c) GDT
d) None of the mentioned
View Answer
Answer: b
Explanation: The LGDT and LLDT instructions are privileged, and may be executed only at
privilege level 0.
12. The instruction that loads a selector which refers to a local descriptor table, containing the
base address and limit for LDT is
a) LGT
b) GDT
c) LGDT
d) LLDT
View Answer
Answer: d
Explanation: The LLDT instruction loads a selector, which refers to a local descriptor table,
containing the base address, and limit for LDT.
13. The descriptor that is used to store task gates, interrupt gates and trap gates is
a) system descriptor table
b) gate descriptor table
c) interrupt descriptor table
d) none of the mentioned
View Answer
Answer: c
Explanation: The 80286 has a third type of descriptor table known as interrupt descriptor table,
which is used to store task gates, interrupt gates and trap gates.
14. The number of interrupt descriptors that the interrupt descriptor table (IDT) handles is
a) 16
b) 64
c) 128
d) 256
View Answer
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
Answer: d
Explanation: The IDT is able to handle upto 256 interrupt descriptors.
15. The number of bytes required for an interrupt in an IDT is
a) 2
b) 4
c) 6
d) 8
View Answer
Answer: c
Explanation: Six bytes are required for each interrupt in an interrupt descriptor table.
1. By using privilege mechanism the protection from unauthorized accesses is done to
a) operating system
b) interrupt handlers
c) system software
d) all of the mentioned
View Answer
Answer: d
Explanation: The operating system, interrupt handlers and other system softwares can be
protected from unauthorized accesses in virtual address space of each task using the privilege
mechanism.
2. The task privilege level at the instant of execution is called
a) Descriptor privilege level (DPL)
b) Current privilege level (CPL)
c) Effective privilege level (EPL)
d) None of the mentioned
View Answer
Answer: b
Explanation: Any one of the four privilege levels may be used to execute a task. The task privilege
level at that instant is called the Current Privilege Level (CPL).
3. Once the CPL is selected, it can be changed by
a) hold
b) transferring control using system descriptors
c) transferring control using gate descriptors
d) transferring control using interrupt descriptors
View Answer
Answer: c
Explanation: Once the CPL is selected, it cannot be changed during the execution normally in a
single code segment. It can only be changed by transferring the control, using gate descriptors, to
a new segment.
advertisement
4. The data segments defined in GDT (global descriptor table) and the LDT (local descriptor table)
can be accessed by a task with
a) privilege level 0
b) privilege level 1
c) privilege level 2
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
d) privilege level 3
View Answer
Answer: a
Explanation: A task executing at level 0, the most privileged level, can access all the data
segments defined in GDT and the LDT of the task.
5. A task with privilege level 0, doesn’t refer to all the lower level privilege descriptors in
a) GDT (global descriptor table)
b) LDT (local descriptor table)
c) IDT (interrupt descriptor table)
d) None of the mentioned
View Answer
Answer: b
Explanation: The task with privilege level 0, refers to all the lower level privilege descriptors which
apply to all the descriptors except the LDT descriptors.
6. The selector RPL that uses a less trusted privilege than the current privilege level for further
use is known as
a) Least task privilege level
b) Descriptor privilege level
c) Effective privilege level
d) None of the mentioned
View Answer
Answer: c
Explanation: A selector RPL uses a less trusted privilege than the current privilege level for further
use. This is known as the Effective Privilege Level of the task.
7. The effective privilege level is
a) maximum numeric of RPL and CPL
b) minimum privilege of RPL and CPL
c) numeric minimum and privilege maximum of RPL and CPL
d) none of the mentioned
View Answer
Answer: c
Explanation: The effective privilege level is minimum in numeric and maximum in the privilege of
RPL and CPL.
8. The task requesting an access to a descriptor is allowed to access after checking the
a) type of descriptor
b) privilege level
c) type of descriptor and privilege level
d) corresponding segment
View Answer
Answer: c
Explanation: The task requesting an access to a descriptor is allowed to access to it and to the
corresponding segment, only after checking the type of the descriptor and privilege level(CPL,
RPL, DPL).
9. A CALL instruction can reference only a code segment descriptor with
a) DPL less privilege than CPL
b) DPL equal privilege to CPL
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
c) DPL greater privilege than CPL
d) All of the mentioned
View Answer
Answer: b
Explanation: A CALL or JUMP instruction can reference only a code segment descriptor with DPL
equal to CPL of the task or a segment with a DPL of equal or greater privilege than CPL.
10. The RPL of a selector that referred to the code descriptor must have
a) less privilege than CPL
b) greater privilege than CPL
c) equal privilege than CPL
d) any privilege regarding CPL
View Answer
Answer: c
Explanation: The RPL of a selector that referred to the code descriptor must have the same
privilege as CPL.
11. The instruction that refers to only code segment descriptors with DPL equal to or less than the
task CPL is
a) CALL
b) IRET
c) ESC
d) RET and IRET
View Answer
Answer: d
Explanation: The RET and IRET instructions are to refer to only code segment descriptors with
DPL equal to or less than the task CPL.
12. When a JUMP instruction references a Task State Segment(TSS) descriptor, then DPL must
be
a) equally privileged as CPL
b) greater or equally privileged than CPL
c) less or equally privileged than CPL
d) less privileged than CPL
View Answer
Answer: c
Explanation: When a CALL or JUMP instruction references a Task State Segment(TSS)
descriptor, then DPL must be less or equally privileged than CPL.
13. The data segment access refers to
a) loading DS
b) loading ES
c) loading SS
d) all of the mentioned
View Answer
Answer: d
Explanation: Loading DS, ES or SS for referring to a new descriptor comes under the data
segment access.
14. An exception is generated when
a) privilege test is negative
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
b) an improper segment is referenced
c) referenced segment is not present in physical memory
d) all of the mentioned
View Answer
Answer: d
Explanation: If the privilege test is negative or an improper segment is referenced then an
exception 13 is generated. If the referenced segment is not present in physical memory, an
exception 11 is generated.
of Microprocessor Multiple Choice Questions & Answers (MCQs) focuses on “Protection”.
1. The mechanism to provide protection, that is accomplished with the help of read/write privileges
is
a) restricted use of segments
b) restricted accesses to segments
c) privileged instructions
d) privileged operations
View Answer
Answer: a
Explanation: The restricted use of segments is accomplished with the help of read/write privileges.
2. The Local descriptor table (LDT) and Global descriptor table (GDT) are present in
a) privileged instruction check
b) operation reference check
c) segment load check
d) none of the mentioned
View Answer
Answer: c
Explanation: In restricted use of segments i.e. segment load check, the segment usages are
restricted by classifying the corresponding descriptors, under LDT and GDT.
3. The mechanism that is accomplished using descriptor usages limitations and rules of privilege
check is
a) privileged instruction check
b) operation reference check
c) segment load check
d) none of the mentioned
View Answer
Answer: b
Explanation: Restricted accesses to segment, also called, operation reference check, is
accomplished using descriptor usages limitations, and rules of privilege check.
advertisement
4. The mechanism that is executed at certain privilege levels, determined by CPL (Current
Privilege Level) and I/O privilege level (IOPL) is
a) restricted use of segments
b) restricted accesses to segments
c) privileged instructions or operations
d) none of the mentioned
View Answer
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
Answer: c
Explanation: The privileged instructions or operations, also called, privileged instruction check, is
executed at certain privilege levels, determined by CPL and I/O privilege level(IOPL), as defined
by the flag register.
5. If CPL is not of the required privilege level, then the instructions that get affected is
a) IRET
b) POPF
c) IRET and POPF
d) None of the mentioned
View Answer
Answer: c
Explanation: The IRET and POPF instructions do not perform any of their functions, if CPL is not
of the required privilege level.
6. If CPL is greater than zero, then the instruction that remains unaffected is
a) IRET
b) POPF
c) IF
d) IRET and POPF
View Answer
Answer: c
Explanation: IF remains unaffected if CPL is greater than zero. No exception is generated for this
condition.
7. The condition, “CPL not equals to zero” satisfies when executing the instruction
a) LIDT
b) LGDT
c) LTR
d) All of the mentioned
View Answer
Answer: d
Explanation: The condition, “CPL not equals to zero” satisfies, when executing the instructions,
LIDT, LGDT, LTR, LMSW, CTS and HLT.
8. While executing the instruction IN/OUT, the condition of CPL is
a) CPL = 0
b) CPL < IOPL
c) CPL > IOPL
d) All of the mentioned
View Answer
Answer: c
Explanation: The condition CPL>IOPL exists, when executing the instructions, INs, IN, OUTS,
OUT, STI, CLI and LOCK.
9. The instruction at which the exception is generated, but the processor extension registers
contain the address of failing instruction is
a) LTR
b) INS
c) CTS
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
d) ESC
View Answer
Answer: d
Explanation: At the ESC instruction, the exception is generated, but the processor extension
registers contain the address of failing instruction.
10. The exception that has no error code on a stack is
a) double exception detected
b) processor extension segment overrun
c) invalid task state segment
d) stack segment overrun
View Answer
Answer: b
Explanation: The processor extension segment overrun has no error code on the stack.
11. Which of the following is protected mode exception?
a) double exception detected
b) invalid task state segment
c) stack segment overrun
d) all of the mentioned
View Answer
Answer: d
Explanation: Double exception detected, invalid task state segment, stack segment overrun,
processor extension segment overrun, are the protected mode exceptions.
1. Which of the following operation is not carried out by 80286?
a) task switch operation
b) halt
c) processor reset
d) none of the mentioned
View Answer
Answer: d
Explanation: The 80286 carries out six operations. They are:
1. processor reset and initialization
2. task switch operation
3. pointer testing instructions
4. protected mode initialization
5. how to enter protected mode?
6. halt.
2. After completion of the first cycle, the first task is again scheduled for the next cycle. This
process is known as
a) repetition
b) task switch operation
c) processor initiation
d) none of the mentioned
View Answer
Answer: b
Explanation: After completion of the first cycle, the first task is again scheduled for the next cycle,
and the process continues. The previous task that was incomplete, may be completed during its
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
coming turns of the allotted CPU time slice. This switch-over operation from one task to another
is called task switch operation.
3. The operation that is provided by the internal architecture, to save the execution state of a task
is
a) processor reset
b) processor initialization
c) task switch operation
d) halt
View Answer
Answer: c
Explanation: The 80286 internal architecture provides a task switch operation, to save the
execution state of a task, and to load a new task to be executed.
advertisement
4. The instruction that can be used to carry out task switch operation is
a) software interrupt instruction
b) exception
c) external interrupt
d) all of the mentioned
View Answer
Answer: d
Explanation: A software interrupt instruction, exception or external interrupt, can also be used to
carry out task switch operation.
5. The IRET instruction gets back the execution state of the previous task, if
a) NT (nested task flag) = 1
b) NT (nested task flag) = 0
c) IF (interrupt flag) = 1
d) IF (interrupt flag) = 0
View Answer
Answer: a
Explanation: If NT = 1, the IRET instruction gets back the execution state of the previous task.
Otherwise, the IRET instruction lets the current task continue, after popping the required values
from the stack.
6. The NT flag is set by the task switch operation, that is initiated by
a) CALL
b) INT
c) CALL & INT
d) None of the mentioned
View Answer
Answer: c
Explanation: The NT flag is set by CALL or INT initiated task switch operations.
7. The 80286 executes LMSW instruction to enter into
a) real addressing mode
b) protected mode
c) real addressing and protected modes
d) none of the mentioned
View Answer
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
Answer: b
Explanation: To enter into protected mode, 80286 executes LMSW instruction, that sets PE flag.
8. The instruction that sets the zero flag, if the segment referred to, by the selector can be read is
a) VERW
b) VERR
c) LSL
d) LAR
View Answer
Answer: b
Explanation: The VERR (VERify to Read) instruction sets the zero flag, if the segment referred to,
by the selector, can be read.
9. The instruction that sets the zero flag, if the segment referred to by the selector, can be written
as
a) VERW
b) APRL
c) LSL
d) LAR
View Answer
Answer: a
Explanation: The VERW (VERify to Write) instruction sets the zero flag, if the segment referred to,
by the selector can be written.
10. The instruction that reads the descriptor access rights byte into the register is
a) VERW
b) APRL
c) LSL
d) LAR
View Answer
Answer: d
Explanation: The LAR (Load Access Rights) instruction reads the descriptor access rights byte
into the register, if privilege rules allow.
11. The instruction that reads the segment limit into the register, if privilege rules and descriptor
type allow is
a) VERW
b) APRL
c) LSL
d) LAR
View Answer
Answer: c
Explanation: The LSL (Load Segment Limit) instruction reads the segment limit into the register,
if privilege rules, and descriptor type allow.
12. The instruction that adjusts the RPL (Requested Privilege Level) of the selector, to the numeric
maximum of current selector RPL value is
a) LAR
b) VERR
c) LSL
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
d) APRL
View Answer
Answer: d
Explanation: The APRL (Adjust Requested Privilege Level) adjusts the RPL (Requested Privilege
Level) of the selector to the numeric maximum of current selector RPL value, and the RPL value
in the register.
1. Which of the following is a supporting chip of 80286?
a) interrupt controller
b) clock generator
c) bus controller
d) all of the mentioned
View Answer
Answer: d
Explanation: The interrupt controller 8259A, clock generator 82C284, and bus controller 82C288
are the unavoidable members of the family, of supporting chips of 80286.
2. In minimum mode, the function of 80286 is
a) data transfers to/from memory or I/O
b) controls the data transfer of 80287
c) controls the instruction execution of 80287
d) all of the mentioned
View Answer
Answer: d
Explanation: In a minimum mode, the 80286 carries out all the data transfers to/from memory or
I/O, controls the data transfer, and instruction execution of 80287.
3. The signal that is applied to the decoding logic, to differentiate between interrupt, code fetch
and data bus cycles is
a) COD
b) INTA (active low)
c) M/IO (active low)
d) All of the mentioned
View Answer
Answer: d
Explanation: The COD, INTA (active low), M/IO (active low) signals are applied to the decoding
logic, to differentiate between interrupt, I/O, code fetch, and data bus cycles.
advertisement
4. By adding which of the following, the minimum mode of 80286 gives the multibus interface of
80286?
a) bus controller
b) bus arbiter
c) interrupt controller
d) all of the mentioned
View Answer
Answer: b
Explanation: The addition of single chip 82C289 known as bus arbiter, to the configuration of
80286 minimum mode, gives the multibus structure of 80286.
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
5. The number of bus controllers that are used for interfacing of memory and I/O devices is
a) 1
b) 2
c) 3
d) none of the mentioned
View Answer
Answer: b
Explanation: The interfacing of memory and I/O devices, uses two 82288 bus controllers, one each
for local, and system bus.
6. If the 80286 need to use system bus, then the signal that is to be active is
a) SRDY
b) SRDYEN
c) ARDYEN
d) ARDY
View Answer
Answer: c
Explanation: The ARDYEN pin is to be activated if the 80286 is to use the system bus. The
SRDYEN pin is to be grounded.
7. If MBYTES input is high, then the pin serves as
a) AEN
b) CEN
c) AEN and CEN
d) None of the mentioned
View Answer
Answer: a
Explanation: The MBYTES input selects the function of AEN/CEN pin. If MBYTES is high, the pin
serves as AEN, else it serves as CEN. The CEN pin is used for selecting one of the available
82288s.
8. Latches are used in 80286 to
a) demultiplex the address and data lines
b) latch the address signals
c) decode the select signals
d) latch the address and decode the select signals
View Answer
Answer: d
Explanation: The address and data lines are not multiplexed, hence no latches are required in
80286 system. Rather the addresses of the next bus cycle are displayed in advance, hence the
latches are required for latching the address, and decode the signals.
9. The I/O port addresses, that are not used, while designing practical systems around 80286 are
a) 0000H to 00FFH
b) 00FFH to FFFFH
c) 00F8H to 00FFH
d) 0000H to FFFFH
View Answer
Answer: c
Explanation: The I/O port addresses 00F8H to 00FFH are reserved by Intel, hence these should
not be used while designing practical systems around 80286.
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
set of Microprocessors test focuses on “Priority of Bus Use By 80286, Bus Hold and HLDA
Sequence, Interrupt Acknowledge Sequence”.
4. As a response to the valid bus hold request, the bus is pushed into
a) TH (hold) state
b) Ts (status) state
c) Tc (command) state
d) Ti (idle) state
View Answer
Answer: a
Explanation: 80286 local bus is relinquished for another bus master if a valid bus hold request is
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
received at the HOLD input pin. As a response to a valid bus hold request, the bus is pushed into
TH state.
5. The bus arbiter relinquishes
a) Address
b) M/IO (active low)
c) COD/INTA (active low)
d) All of the mentioned
View Answer
Answer: d
Explanation: The address, M/IO (active low) and COD/INTA (active low) are relinquished by bus
arbiter.
6. A valid HOLD request is ascertained only after the completion of
a) 34 clockcycles
b) 24 clockcycles and 80286 is SET
c) 34 clockcycles and 80286 is SET
d) 34 clockcycles and 80286 is RESET
View Answer
Answer: d
Explanation: Only after 34 clockcycles, after the 80286 is reset, a valid HOLD request should be
ascertained.
7. The master PIC 8259A decides which of its slave interrupt controllers is to return the vector
address, as a response of
a) first INTA (active low) pulse from 80286
b) second INTA (active low) pulse from 80286
c) third INTA (active low) pulse from 80286
d) none of the mentioned
View Answer
Answer: a
Explanation: In response to the first INTA (active low) pulse from 80286, the master PIC 8259A
decides, which of its slave interrupt controllers is to return the vector address.
8. The slave (which is selected) sends the vector on data bus after the
a) first INTA (active low) pulse from 80286
b) second INTA (active low) pulse from 80286
c) third INTA (active low) pulse from 80286
d) none of the mentioned
View Answer
Answer: b
Explanation: The interrupt acknowledge sequence consists of two INTA (active low) pulses. After
the second pulse, the selected slave sends the vector on D0-D7 data lines, and 80286 reads it.
9. The signal of 82C288, that enables the cascade address drivers, during INTA cycles is
a) DEN
b) DT/R (active low)
c) MCE
d) MB
View Answer
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
Answer: c
Explanation: The MCE (Master Cascade Enable) signal of 82C288 enables the cascade address
drivers during INTA cycles, to select the slave using the local address bus.
10. The LOCK (active low) signal is activated during
a) Ti of first INTA cycle
b) Ts of first INTA cycle
c) Th of second INTA cycle
d) Ts of second INTA cycle
View Answer
Answer: b
Explanation: The LOCK (active low) signal is activated during Ts of first INTA cycle.
11. The number of idle states (Ti), that is allowed between two INTA cycles, to meet the 8259A
speed and cascade address output delay is
a) 1
b) 2
c) 3
d) 4
View Answer
Answer: c
Explanation: The 80286 allows three idle states (Ti) between the two INTA cycles, to meet the
8259A speed and cascade address output delay.
1. In which of these modes, the immediate operand is included in the instruction itself?
a) register operand mode
b) immediate operand mode
c) register and immediate operand mode
d) none of the mentioned
View Answer
Answer: b
Explanation: In immediate operand mode, the immediate operand is included in the instruction
itself.
2. In register address mode, the operand is stored in
a) 8-bit general purpose register
b) 16-bit general purpose register
c) si or di
d) all of the mentioned
View Answer
Answer: d
Explanation: In register address mode, the operand is stored either in one of the 8-bit or 16-bit
general purpose registers or in SI, DI, BX or BP.
3. In which of the following addressing mode, the offset is obtained by adding displacement and
contents of one of the base registers?
a) direct mode
b) register mode
c) based mode
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
d) indexed mode
View Answer
Answer: c
Explanation: In a based mode, the offset is obtained by adding displacement and contents of one
of the base registers, either BX or BP.
advertisement
4. In which of the following addressing mode, the offset is obtained by adding displacement, with
the contents of SI?
a) direct mode
b) register mode
c) based mode
d) indexed mode
View Answer
Answer: d
Explanation: In an indexed mode, the offset is obtained by adding displacement, with contents of
an index register, either SI or DI.
5. The address of a location of the operand is calculated by adding the contents of any of the base
registers, with the contents of any of index registers in
a) based indexed mode with displacement
b) based indexed mode
c) based mode
d) indexed mode
View Answer
Answer: b
Explanation: In a based indexed mode, the operand is stored at a location, whose address is
calculated by adding the contents of any of the base registers, with the contents of any of the index
registers.
6. Which of the following is not a data type of 80286?
a) Ordinal or unsigned
b) ASCII
c) Packed BCD
d) None of the mentioned
View Answer
Answer: d
Explanation: The 80286 supports seven data types. They are
1. integer
2. Ordinal (unsigned)
3. pointer
4. string
5. ASCII
6. BCD
7. Packed BCD.
7. The representation of 8-bit or 16-bit signed binary operands using 2’s complement is a data
type of
a) Ordinal
b) ASCII
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
c) Packed BCD
d) integer
View Answer
Answer: d
Explanation: In integer data type, 8-bit or 16-bit signed binary operands are represented using 2’s
complement.
8. The instruction that pushes the general purpose registers, pointer and index registers on to the
stack is
a) POPF
b) PUSH Imd
c) PUSH*A
d) PUSHF
View Answer
Answer: c
Explanation: The PUSH*A instruction, pushes the general purpose registers, AX, CX, DX and BX,
pointer and index registers, SP, BP, SI, DI, on to the stack.
9. While executing the PUSH*A instruction, the stack pointer is decremented by
a) 1 bit
b) 2 bits
c) 4 bits
d) 16 bits
View Answer
Answer: b
Explanation: The stack pointer is decremented by 16 (eight 2-byte registers).
10. The statement that is true for the instruction POP*A is
a) flags are unaffected
b) no operands are required
c) exceptions generated are same as that of PUSH*A
d) all of the mentioned
View Answer
Answer: d
Explanation: The POP*A instruction, pops all the contents of the registers DI, SI, BP, SP, BX, DX,
CX and AX from the stack in this sequence, that is exactly opposite to that of pushing.
11. The instruction that multiplies the content of AL with a signed immediate operand is
a) MUL
b) SMUL
c) IMUL
d) None of the mentioned
View Answer
Answer: c
Explanation: The IMUL instruction multiplies the content of AL with a signed immediate operand,
and the signed 16-bit result is stored in AX.
12. The instruction that represents the ‘rotate source, count’ is
a) RCL
b) RCR
c) ROR
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
d) All of the mentioned
View Answer
Answer: d
Explanation: The rotate source, count is a group of four instructions containing RCL, RCR, ROL,
ROR
1. In ‘Rotate source, count’ instructions, if the CF is equal to MSB of operand (source) then
a) TF is cleared
b) OF is cleared
c) TF is set
d) OF is set
View Answer
Answer: b
Explanation: If CF is equal to MSB of operand (source), the overflow flag is cleared, otherwise, it
is set to 1.
2. The instruction that affects the flags is
a) IMUL
b) INSW
c) INSB
d) POP*A
View Answer
Answer: a
Explanation: No flags are affected by the instructions, INSW, INSB and POP*A.
3. A general protection exception is generated, if the value of
a) CPL is equal to that of IOPL
b) CPL is less than that of IOPL
c) CPL is greater than that of IOPL
d) None of the mentioned
View Answer
Answer: c
Explanation: When the value of CPL is greater than that of IOPL, a general protection exception
is generated.
advertisement
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
d) EXIT
View Answer
Answer: c
Explanation: The instruction, LEAVE, is generally used with high level languages, to exit a
procedure.
6. The instruction that determines the number of bytes, to be copied into the new stack frame,
from the previous stack is
a) ENTER
b) BOUND
c) CLTS
d) LEAVE
View Answer
Answer: a
Explanation: The ENTER instruction prepares a stack structure for parameters of a procedure to
be executed further. This instruction determines the number of bytes to be copied, into the new
stack frame, from the previous stack.
7. The instruction that is used to check whether a signed array offset is within the limit, defined for
it by the starting and ending index is
a) ENTER
b) BOUND
c) CLTS
d) LEAVE
View Answer
Answer: b
Explanation: The BOUND instruction is used to check whether a signed array offset is within the
limit defined for it, by the starting and ending index.
8. The CLTS (Clear Task Switch Flag) instruction records every execution of WAIT and ESC and
is trapped if the flag(s)
a) PE (Protection Enable) and TS (task switch) flags are set
b) Emulate Processor extension flag is set
c) MP flag and task switched flag is set
d) PE and MP flag is set
View Answer
Answer: c
Explanation: The CLTS (Clear Task Switch Flag) instruction records every execution of WAIT and
ESC, and is trapped, if the MP flag and task switched flag is set.
9. The instruction that determines whether the segment pointed to, by a 16-bit register, can be
accessed from the current privilege level is
a) RPL
b) CPL
c) ARPL
d) VERR
View Answer
Answer: d
Explanation: The VERR/VERW instructions determine whether the segment pointed to, by a 16-
bit register, can be accessed from the current privilege level.
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
10. The instruction that loads 6 bytes from a memory block, pointed to by the effective address of
the operand, into global descriptor table register is
a) LLDT
b) SGDT
c) LGDT
d) None of the mentioned
View Answer
Answer: c
Explanation: The LGDT (load global descriptor table register) loads 6 bytes from a memory block,
pointed to by the effective address of the operand, into global descriptor table register.
11. In LGDT instruction, while loading 6 bytes, the first word is loaded into the field of
a) LIMIT field
b) BASE field
c) Either LIMIT or BASE field
d) None of the mentioned
View Answer
Answer: a
Explanation: While loading the 6 bytes, the first word is loaded into the LIMIT field of the descriptor
table register. The next three bytes are loaded into the BASE field of the register, and the
remaining byte is ignored.
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
d) all of the mentioned
View Answer
Answer: d
Explanation: The data interface and control unit contains status and controls words, TAG words
and error pointers.
advertisement
4. The word that optimizes the NDP performance, by maintaining a record of empty and non-empty
register locations is
a) Status and control words
b) TAG words
c) Error pointers
d) All of the mentioned
View Answer
Answer: b
Explanation: The TAG word optimizes the NDP performance by maintaining a record of empty
and non-empty register locations. It helps the exception handler to identify special values in the
contents of the stack locations.
5. The part of the data interface and control unit, that points to the source of exception generated
is
a) Status and control words
b) TAG words
c) Error pointers
d) None of the mentioned
View Answer
Answer: c
Explanation: The error pointers point to the source of exception (address of the instruction that
generated the exception) generated.
6. The data bus in a floating point unit is of
a) 16 bits
b) 32 bits
c) 64 bits
d) 84 bits
View Answer
Answer: d
Explanation: The data bus in a floating point unit is of 84-bits. Out of this 84-bits, the lower 68 bits
are significant (mantissa) data bit, the next 16 bits are used for the exponent.
7. The arrangement of data that is to be shifted successively, whenever required for the execution,
is done by
a) error pointer
b) data buffer
c) barrel shifter
d) none of the mentioned
View Answer
Answer: c
Explanation: The barrel shifter arranges and presents the data to be shifted successively,
whenever required for the execution.
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
8. The word that is used to select one of the processing options, among the provided ones is
a) status word
b) control word
c) status and control words
d) none of the mentioned
View Answer
Answer: b
Explanation: The control word is used to select one of the processing options, among the ones
provided by 80287.
9. After reset of 80287, the control bit that is initialized to zero is
a) masking bits
b) precision control bits
c) rounding control bits
d) infinity control bits
View Answer
Answer: d
Explanation: The infinity control bit is initialized to zero after reset.
10. The bits that are modified depending upon the result of the execution of arithmetic instructions
are
a) masking bits
b) rounding control bits
c) condition code bits
d) error summary bits
View Answer
Answer: c
Explanation: The condition code bits are similar to the flags of a CPU. These are modified
depending upon the result of the execution of arithmetic instructions.
1. If the stack flag is set, and condition code bit C1=1, then the stack is
a) full
b) overflown
c) underflown
d) empty
View Answer
Answer: b
Explanation: If the stack flag is set, and condition code bit C1=1, then the stack has overflown.
2. If the stack flag is set, and condition code bit C1=0, then the stack is
a) full
b) overflown
c) underflown
d) empty
View Answer
Answer: c
Explanation: If the stack flag is set, and condition code bit C1=0, then the stack has underflown.
3. The bits that affect the result of arithmetic operations like ADD, SUB, MUL, DIV are
a) condition code bits
b) rounding control bits
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
c) masking bits
d) precision control bits
View Answer
Answer: d
Explanation: The precision control bits affect ADD, SUB, MUL, DIV and SQRT results.
advertisement
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
8. For which pin of 80286 is the active low pin, BUSY of 80287, connected?
a) ERROR (active low)
b) BUSY (active low)
c) HLDA
d) TEST (active low)
View Answer
Answer: d
Explanation: The BUSY (active low) is connected to the TEST (active low) pin of 80286.
9. If Clock Mode (CM) input pin is held low, then the CLK input is divided by
a) 1
b) 2
c) 3
d) 4
View Answer
Answer: b
Explanation: If Clock Mode (CM) input pin is held high, then the CLK input is directly used for
deriving the internal timings. Else, it is divided by 2.
10. Which of the following pin is not involved in the interface of 80287 with 80286?
a) PEREQ
b) ERROR#
c) RESET
d) CMD0 and CMD1
View Answer
Answer: c
Explanation: The 10 pins, PEREQ, PEACK#, BUSY#, ERROR#, NPRD(active low)#,
NPWR(active low)#, NPS1(active low)#, NPS2#, CMD0 and CMD1.
11. The PEACK (active low) when activated, the pin that goes into deactivation is
a) PEREQ
b) ERROR#
c) RESET
d) CMD0 and CMD1
View Answer
Answer: a
Explanation: When the data transfer is over, the CPU activates PEACK (active low)# pin, which
results in deactivating the PEREQ pin by 80287.
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
7. 80386DX is available in a grid array package of
a) 64 pin
b) 128 pin
c) 132 pin
d) 142 pin
View Answer
Answer: c
Explanation: The 80386DX is available in a 132-pin grid array package.
8. The operating frequency of 80386DX is
a) 12 MHz and 20 MHz
b) 20 MHz and 33 MHz
c) 32 MHz and 12 MHz
d) all of the mentioned
View Answer
Answer: b
Explanation: The operating frequency of 80386DX is 20MHz and 33 MHz.
9. The 80386 in its protected mode, in its virtual mode of operation, can run the applications of
a) 8086
b) 80286
c) 80287
d) 80387
View Answer
Answer: a
Explanation: The 80386 can run the applications under protected mode, in its virtual 8086 mode
of operation.
10. The 80386 in protected mode, supports all software written for
a) 8086 and 80287
b) 80286 and 80287
c) 80287 and 80387
d) 80286 and 8086
View Answer
Answer: d
Explanation: The 80386 in protected mode, supports all software written for 8086 and 80286 (to
be executed under the control of memory management and protection abilities of 80386).
1. Which of the units is not a part of the internal architecture of 80386?
a) central processing unit
b) memory management unit
c) bus interface unit
d) none of the mentioned
View Answer
Answer: d
Explanation: The internal architecture of 80386 is divided into three sections namely, central
processing unit, memory management unit and bus interface unit.
2. The central processing unit has a sub-division of
a) memory unit and control unit
b) memory unit and ALU
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
c) execution unit and instruction unit
d) execution unit and memory unit
View Answer
Answer: c
Explanation: The central processing unit is further divided into the execution unit and instruction
unit.
3. The unit that is used for handling data, and calculates offset address is
a) memory management unit
b) execution unit
c) instruction unit
d) bus interface unit
View Answer
Answer: b
Explanation: The execution unit has eight general purpose and eight special purpose registers,
which are either used for handling the data or calculating the offset addresses.
advertisement
4. The unit that decodes the opcode bytes, received from the 16-byte instruction code queue is
a) memory management unit
b) execution unit
c) instruction unit
d) barrel shifter
View Answer
Answer: c
Explanation: The instruction unit decodes the opcode bytes, received from the 16-byte instruction
code queue, after decoding them so as to pass it to the control section, for deriving the necessary
control signals.
5. The unit that increases the speed of all shift and rotate operations is
a) memory management unit
b) execution unit
c) instruction unit
d) barrel shifter
View Answer
Answer: d
Explanation: The barrel shifter speeds up all shift and rotate operations.
6. The memory management unit consists of
a) segmentation unit
b) paging unit
c) segmentation and paging units
d) none of the mentioned
View Answer
Answer: c
Explanation: The memory management unit consists of a segmentation unit and a paging unit.
7. The segmentation unit allows
a) maximum size of 4GB segments
b) use of segment address components
c) use of offset address components
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
d) all of the mentioned
View Answer
Answer: d
Explanation: The segmentation unit allows the use of two address components. They are:
segment and offset for relocation and sharing of code and data.
8. The unit that organizes the physical memory, in terms of pages of 4KB size each is
a) segmentation unit
b) execution unit
c) paging unit
d) instruction unit
View Answer
Answer: c
Explanation: The paging unit organizes the physical memory, in terms of pages of 4KB size each.
9. The paging unit works under the control of
a) memory management unit
b) segmentation unit
c) execution unit
d) instruction unit
View Answer
Answer: b
Explanation: The paging unit works under the control of the segmentation unit; i.e. each segment
is further divided into pages.
10. The unit that provides a four level protection mechanism, for system’s code and data against
application program is
a) central processing unit
b) segmentation unit
c) bus interface unit
d) none of the mentioned
View Answer
Answer: b
Explanation: The segmentation unit provides a four level protection mechanism, for protecting and
isolating the system’s code and data, from those of the application program.
11. The unit that has a prioritizer to resolve the priority of the various bus requests is
a) bus sizing unit
b) data buffer
c) bus control unit
d) execution unit
View Answer
Answer: c
Explanation: The bus control unit has a prioritizer to resolve the priority of the various bus requests.
12. The unit that interfaces the internal data bus with the system bus is
a) bus sizing unit
b) data buffer
c) bus control unit
d) execution unit
View Answer
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
Answer: b
Explanation: The data buffer interfaces the internal data bus with the system bus.
13. The unit that drives the bus enable and address signals A0-A31 is
a) bus sizing unit
b) bus driving unit
c) address driver
d) bus driver
View Answer
Answer: c
Explanation: The address driver drives the bus enable and address signals A0-A31.
14. Which of the following pin when activated, allows address pipelining?
a) ADS
b) NA
c) AP
d) None of the mentioned
View Answer
Answer: b
Explanation: The Next Address (NA) input pin, if activated, allows address pipelining, during 80386
bus cycles.
15. The signal that is used to insert WAIT states in a bus cycle in 80386 is
a) HOLD
b) HLDA
c) READY
d) PEREQ
View Answer
Answer: c
Explanation: READY signal is used to insert WAIT states in a bus cycle, and is useful for
interfacing of slow devices with the CPU.
16. The signal which indicates to the CPU, to fetch a data word for the coprocessor is
a) READY
b) NMI
c) HLDA
d) PEREQ
View Answer
Answer: d
Explanation: The Processor Extension Request (PEREQ) output signal indicates to the CPU to
fetch a data word for the coprocessor.
17. The pipeline and dynamic bus sizing units handle
a) data signals
b) address signals
c) control signals
d) all of the mentioned
View Answer
Answer: c
Explanation: The
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
1. The 16-bit registers are available with their extended size of 32 bits, by adding the registers with
a prefix of
a) X
b) E
c) 32
d) XX
View Answer
Answer: b
Explanation: A 32 bit register, known as an extended register, is represented by the register name
with a prefix of E.
2. In a 32-bit register, ESP, the lower 16-bits of the register can be represented by
a) LSP
b) FSP
c) SP
d) None of the mentioned
View Answer
Answer: c
Explanation: Though the extended size of 32 bits are named as EBP, ESP, ESI and EDI, the
names BP, SP, SI and DI represent the lower 16-bits.
3. Which of the following is a data segment register of 80386?
a) ES
b) FS
c) GS
d) All of the mentioned
View Answer
Answer: d
Explanation: The six segment registers available in 80386 are CS, SS, DS, ES, FS and GS, out
of which DS, ES, FS and GS are the four data segment registers.
advertisement
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
Answer: c
Explanation: The VM and RF flags are added to the 80286 flag register, to derive the flag register
of 80386.
6. The VM (virtual mode) flag is to be set, only when 80386 is in
a) virtual mode
b) protected mode
c) either virtual or protected mode
d) all of the mentioned
View Answer
Answer: b
Explanation: If VM flag is set, the 80386 enters the virtual 8086 mode within the protected mode.
This is to be set only when the 80386 is in protected mode.
7. In protected mode of 80386, the VM flag is set by using
a) IRET instruction
b) Task switch operation
c) IRET instruction or task switch operation
d) None of the mentioned
View Answer
Answer: c
Explanation: The VM flag can be set using the IRET instruction or any task switch operation, only
in the protected mode.
8. During the instruction cycle of 80386, any debug fault can be ignored if
a) VM flag is set
b) VM flag is cleared
c) RF is cleared
d) RF is set
View Answer
Answer: d
Explanation: If RF (resume flag) is set, any debug fault is ignored during the instruction cycle.
9. The RF is not automatically reset after the execution of
a) IRET
b) POPA
c) IRET and POPF
d) IRET and PUSHF
View Answer
Answer: c
Explanation: The RF is automatically reset after the execution of every instruction, except for the
IRET and POPF instructions. Also, it is not cleared automatically after the successful execution of
JMP, CALL and INT instructions causing a task switch.
10. The segment descriptor register is used to store
a) attributes
b) limit address of segments
c) base address of segments
d) all of the mentioned
View Answer
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
Answer: d
Explanation: The segment descriptor register is used to store the descriptor information like
attributes, limit and base addresses of segments.
1. The 32-bit control register, that is used to hold global machine status, independent of the
executed task is
a) CR0
b) CR2
c) CR3
d) All of the mentioned
View Answer
Answer: d
Explanation: The 80386 has three 32-bit control registers CR0, CR2 and CR3, to hold global
machine status, independent of the executed task.
2. The descriptor table that the 80386 supports is
a) GDT (Global descriptor table)
b) IDT (Interrupt descriptor table)
c) LDT (Local descriptor table)
d) All of the mentioned
View Answer
Answer: d
Explanation: The 80386 supports four types of descriptor tables. They are, GDT, IDT, LDT and
TSS.
3. The registers that are together, known as system address registers are
a) GDTR and IDTR
b) IDTR and LDTR
c) TR and GDTR
d) LDTR and TR
View Answer
Answer: a
Explanation: The GDTR and IDTR are known as system address registers.
advertisement
4. In the based scaled indexed mode with displacement mode, the contents of an index register
are multiplied by a scale factor and are added to
a) base register
b) displacement
c) base register and displacement
d) none of the mentioned
View Answer
Answer: c
Explanation: Contents of an index register are multiplied by a scale factor and the result is added
to a base register and a displacement to get the offset of an operand.
5. The following statement of ALP is an example of
MOV EBX, [EDX*4] [ECX].
a) base scaled indexed mode
b) scaled indexed mode
c) indexed mode
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
d) based scaled indexed mode with displacement mode
View Answer
Answer: a
Explanation: Since in base scaled indexed mode, contents of an index register are multiplied by a
scale factor and then added to base register to get the operand offset.
6. The following statement is an example of
MOV EBX, LIST [ESI*2].
MUL ECX, LIST [EBP*4].
a) base scaled indexed mode
b) scaled indexed mode
c) indexed mode
d) based scaled indexed mode with displacement mode
View Answer
Answer: b
Explanation: Since in scaled indexed mode, contents of an index register are multiplied by a scale
factor that may be added further to get the operand offset.
7. Bit field can be defined as a group of
a) 8 bits
b) 16 bits
c) 32 bits
d) 64 bits
View Answer
Answer: c
Explanation: A group of at the most 32 bits(4 bytes) is defined as a bit field.
8. The maximum length of the string in a bit string of contiguous bits is
a) 2 MB
b) 4 MB
c) 2 GB
d) 4 GB
View Answer
Answer: d
Explanation: Bit string is a string of contiguous bits of maximum 4Gbytes in length.
9. The integer word is defined as
a) signed 8-bit data
b) unsigned 16-bit data
c) signed 16-bit data
d) signed 32-bit data
View Answer
Answer: c
Explanation: The integer word is the signed 16-bit data.
10. A 16-bit displacement that references a memory location using any of the addressing modes
is
a) Pointer
b) Character
c) BCD
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
d) Offset
View Answer
Answer: d
Explanation: Offset is a 16-bit or 32-bit displacement that references a memory location using any
of the addressing modes.
11. A decimal digit can be represented by
a) unsigned integer
b) signed integer
c) unpacked BCD
d) packed BCD
View Answer
Answer: c
Explanation: Decimal digits from 0-9 are represented by unpacked bytes.
1. The instructions available in the 80386 that are not available in its real address mode is
a) addressing techniques
b) instructions for protected address mode
c) instructions for interrupt handling
d) all of the mentioned
View Answer
Answer: b
Explanation: All the instructions of 80386 are available in this mode except for those designed to
work with or for protected address mode.
2. The unit that is disabled in real address mode is
a) central processing unit
b) memory management unit
c) paging unit
d) bus control unit
View Answer
Answer: c
Explanation: The paging unit is disabled in real address mode.
3. To form a physical memory address, appropriate segment register contents are
a) shifted by left by 4 positions
b) added to 16-bit offset address
c) operated using one of addressing modes
d) all of the mentioned
View Answer
Answer: d
Explanation: To form a physical memory address, appropriate segment register contents are
shifted by left by 4 positions and then added to 16-bit offset address formed using one of
addressing modes, in same way as in the 80386 real address mode.
advertisement
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
d) none of the mentioned
View Answer
Answer: c
Explanation: The segments in 80386 real mode are may be overlapped or non-overlapped.
5. The operation that can be performed on segments in 80386 real mode is
a) read
b) write
c) execute
d) all of the mentioned
View Answer
Answer: d
Explanation: The segments in 80386 real mode can be read, written or executed, i.e. no protection
is available.
6. The selectors contain the segment’s
a) segment limit
b) base address
c) access rights byte
d) all of the mentioned
View Answer
Answer: d
Explanation: In protected mode, the contents of segment registers are used as selectors to
address descriptors which contain the segment limit, base address and access rights byte of the
segment.
7. The linear address is calculated by
a) effective address + segment base address
b) effective address – segment base address
c) effective address + physical address
d) effective address – physical address
View Answer
Answer: a
Explanation: The effective address(offset) is added with segment base address to calculate linear
address.
8. If the paging unit is enabled, then it converts a linear address into
a) effective address
b) physical address
c) segment base address
d) none of the mentioned
View Answer
Answer: b
Explanation: The paging unit when enabled, it converts a linear address into physical address.
9. If the paging unit is disabled, then the linear address is used as
a) effective address
b) physical address
c) segment base address
d) none of the mentioned
View Answer
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
Answer: b
Explanation: The linear address is used as a physical address if the paging unit is disabled.
10. The paging unit is enabled only in
a) virtual mode
b) addressing mode
c) protected mode
d) none of the mentioned
View Answer
Answer: c
Explanation: The paging unit is enabled only in protected mode.
11. For a single task in protected mode, the 80386 can address the virtual memory of
a) 32 GB
b) 64 MB
c) 32 TB
d) 64 TB
View Answer
Answer: d
Explanation: In protected mode, the 80386 can address 4 GB of physical memory and 64 TB of
virtual memory per task.
1. The bit that indicates whether the segment has been accessed by the CPU or not is
a) base address
b) attribute bit
c) present bit
d) granular bit
View Answer
Answer: b
Explanation: The accessed bit or attribute bit (A) indicates whether the segment has been
accessed by the CPU or not.
2. The TYPE field of a descriptor is used to find the
a) descriptor type
b) segment type
c) descriptor and segment type
d) none
View Answer
Answer: c
Explanation: The type field decides the descriptor type and hence the segment type.
3. If the segment descriptor bit, S=0, then the descriptor is
a) data segment descriptor
b) code segment descriptor
c) system descriptor
d) all of the mentioned
View Answer
Answer: c
Explanation: If S=0, then system descriptor. If S=1, then code or data segment descriptor.
advertisement
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
4. The bit that indicates whether the segment is page addressable is
a) base address
b) attribute bit
c) present bit
d) granularity bit
View Answer
Answer: d
Explanation: The granularity bit indicates whether the segment is page addressable.
5. If the Default operation size bit, D=1, the code segment operation size selected is
a) 8-bit
b) 16-bit
c) 32-bit
d) 64-bit
View Answer
Answer: c
Explanation: If D=1, the segment selected is 32-bit operand segment, else, it is a 16-bit operand
segment.
6. The segment descriptor contains
a) access rights
b) limit
c) base address
d) all of the mentioned
View Answer
Answer: d
Explanation: The segment descriptors are 8-byte quantities containing access right or attribute
bits along with the base and limit of the segments.
7. Which of the following is not a type of segment descriptor?
a) system descriptors
b) local descriptors
c) gate descriptors
d) none
View Answer
Answer: d
Explanation: The five types of segment descriptors of 80386 are:
1. Code or data segment descriptors
2. System descriptors
3. Local descriptors
4. TSS(task state segment) descriptors
5. Gate descriptors.
8. The limit field of the descriptor is of
a) 10 bits
b) 8 bits
c) 16 bits
d) 20 bits
View Answer
Answer: d
Explanation: The limit field of the descriptor is of 20 bits.
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
9. The starting address of the segment in physical memory is decided by
a) physical memory
b) segment descriptors
c) operating system
d) base address
View Answer
Answer: c
Explanation: The base address that marks the starting address of the segment in physical memory
is decided by the operating system and is of 32 bits.
10. The total descriptors that the 80386 can handle is
a) 2K
b) 8K
c) 4K
d) 16K
View Answer
Answer: d
Explanation: 80386 can handle total 16K descriptors and hence segments.
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
advertisement
4. The control register that stores the 32-bit linear address, at which the previous page fault is
detected is
a) CR0
b) CR1
c) CR2
d) CR3
View Answer
Answer: c
Explanation: The control register, CR2, is used to store the 32-bit linear address, at which the
previous page fault is detected.
5. Which of the following is not a component of paging unit?
a) page directory
b) page descriptor base register
c) page table
d) page
View Answer
Answer: b
Explanation: The paging unit handles every task in terms of three components namely page
directory, page table and the page itself.
6. The control register that is used as page directory physical base address register is
a) CR0
b) CR1
c) CR2
d) CR3
View Answer
Answer: d
Explanation: The control register, CR3, is used as page directory physical base address register,
to store the physical starting address of the page directory.
7. The bits of CR3, that are always zero are
a) higher 4 bits
b) lower 8 bits
c) higher 10 bits
d) lower 12 bits
View Answer
Answer: d
Explanation: The lower 12 bits of CR3 are always zero to ensure the page size aligned with the
directory.
8. Each directory entry in page directory is maximum of
a) 2 bytes
b) 4 bytes
c) 8 bytes
d) 16 bytes
View Answer
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
Answer: b
Explanation: Each directory entry is of 4 bytes, thus a total of 1024 entries are allowed in a
directory.
9. The size of each page table is of
a) 2 Kbytes
b) 2 bytes
c) 4 Kbytes
d) 4 bytes
View Answer
Answer: c
Explanation: Each page table is of 4 Kbytes in size, and may contain a maximum of 1024 entries.
10. The dirty bit(D) is set, before which operation is carried out
a) write
b) read
c) initialization
d) none of the mentioned
View Answer
Answer: a
Explanation: The dirty bit (D) is set before a write operation to the page is carried out.
11. The bit that is undefined for page directory entries is
a) P-bit
b) A-bit
c) D-bit
d) All of the mentioned
View Answer
Answer: c
Explanation: The D-bit is undefined for page directory entries.
12. The bit that is used for providing protection is
a) User/Supervisor bit
b) Read bit
c) Write bit
d) all of the mentioned
View Answer
Answer: d
Explanation: The User/Supervisor (U/S) bit and Read/Write (R/W) bit are used to provide
protection.
13. The storage of 32 recently accessed page table entries to optimize the time, is known as
a) page table
b) page descriptor base register
c) page table cache
d) none of the mentioned
View Answer
Answer: c
Explanation: To optimize the considerable time taken for conversion, a page table cache is
provided, which stores the 32 recently accessed page table entries.
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
14. The page table cache is also known as
a) page table storage
b) storage buffer
c) translation look aside buffer
d) all of the mentioned
View Answer
Answer: c
Explanation: The page table cache is also known as translation look aside buffer.
1. If the 80386 enters the protected mode from the real address mode, then it returns back to the
real mode, by performing the operation of
a) read
b) write
c) terminate
d) reset
View Answer
Answer: d
Explanation: If the 80386 enters the protected mode from the real address mode, then it cannot
return back to the real mode without a reset operation.
2. The unit that is needed for virtual mode 80386, only to run the 8086 programs, which require
more than 1 Mbyte of memory for memory management functions, is
a) execution unit
b) central processing unit
c) paging unit
d) segmentation unit
View Answer
Answer: c
Explanation: Paging unit is not necessarily enabled in the virtual mode, but may be needed to run
the 8086 programs, which require more than 1 Mbyte of memory, for memory management
functions.
3. The number of pages that the paging unit allows, in the virtual mode of 80386 is
a) 64
b) 128
c) 256
d) 512
View Answer
Answer: c
Explanation: In virtual mode, the paging unit allows only 256 pages, each of 4Kbytes size. Each
of the pages may be located anywhere within the maximum 4Gbytes physical memory.
advertisement
4. The privilege level at which the real mode programs are executed is
a) level 0
b) level 1
c) level 2
d) level 3
View Answer
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
Answer: a
Explanation: The real mode programs are executed at the highest privilege level i.e. level 0.
5. The instructions to prepare the processor for protected mode can only be executed at the
privilege level
a) level 0
b) level 1
c) level 2
d) level 3
View Answer
Answer: a
Explanation: The instructions to prepare the processor for protected mode can only be executed
at the level 0.
6. The instruction that is unable to set or read the VM (Virtual Mode) bit is
a) PUSHF
b) IRET
c) POPF
d) PUSHF and POPF
View Answer
Answer: d
Explanation: The PUSHF and POPF instructions are unable to set or read the VM (Virtual Mode)
bit, as they do not access it. The virtual mode can be entered by using IRET instruction.
7. If the CKM pin of 80387 is high, then 80387 is operated in
a) real address mode
b) protected mode
c) synchronous mode
d) asynchronous mode
View Answer
Answer: c
Explanation: If the CKM pin of 80387 is high, then 80387 is operated in synchronous mode. If it is
low, then 80387 is operated in asynchronous mode.
8. The unit that handles the data and directs it to either FIFO or instruction decoder depending on
the bus control logic directive is
a) paging unit
b) central processing unit
c) segmentation unit
d) data interface and control unit
View Answer
Answer: d
Explanation: The data interface and control unit handles the data, and direct it to either FIFO or
instruction decoder, depending on the bus control logic directive.
9. The unit that is responsible for carrying out all the floating point calculations, allotted to the
coprocessor by 80386, is
a) Central processing unit
b) ALU
c) FPU
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
d) None of the mentioned
View Answer
Answer: c
Explanation: The FPU (floating point unit) is responsible for carrying out all the floating point
calculations, allotted to the coprocessor by 80386.
10. The sizes of instruction and data pointer registers of 80387 respectively are
a) 32-bit, 32-bit
b) 48-bit, 32-bit
c) 32-bit, 48-bit
d) 48-bit, 48-bit
View Answer
Answer: d
Explanation: 80387 consists of two 48-bit registers, known as instruction and data pointer
registers.
11. To inform 80387 that the CPU wants to communicate with NPS1, the NPS1 line is directly
connected to
a) A31
b) A30
c) M/IO
d) D31
View Answer
Answer: c
Explanation: The NPS1 and NPS2 lines are directly connected with M/IO and A31 respectively, to
inform 80387 that the CPU wants to communicate with it (NPS1), and it is using one of the reserved
I/O addresses for 80387 (NPS2).
1. Which of the following is not a newly added instruction of 80386, that are not present in 80286?
a) bit scan instructions
b) bit test instructions
c) shift double instructions
d) none of the mentioned
View Answer
Answer: d
Explanation: The newly added instructions of 80386 are categorized into
1. bit scan instructions
2. bit test instructions
3. conditional set byte instructions
4. shift double instructions
5. control transfer via gates instructions.
2. The BSF (bit scan forward) instruction scans the operand in the order
a) from left to right
b) from right to left
c) from upper nibble
d) none of the mentioned
View Answer
Answer: b
Explanation: The BSF (bit scan forward) instruction scans the operand from right to left.
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
3. The BSR (bit scan reverse) instruction scans the operand in the order
a) from left to right
b) from right to left
c) from upper nibble
d) none of the mentioned
View Answer
Answer: a
Explanation: The BSR (bit scan reverse) instruction scans the operand from left to right.
advertisement
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
Answer: b
Explanation: In case of BT instruction, if the bit position in the destination operand specified by the
source operand, is ‘1’, the carry flag is set, otherwise it is cleared.
8. Which of the following is not a conditional set byte instruction?
a) SETNP
b) SETO
c) SETNAE
d) SHRD
View Answer
Answer: d
Explanation: The SHRD (Shift Right Double) is a shift double instruction.
9. The instruction that shifts the specified number of bits in the instruction, from the upper side of
the source operand into the lower side of the destination operand is
a) SHRD
b) SHLD
c) SETNS
d) None of the mentioned
View Answer
Answer: b
Explanation: The SHLD instruction shifts the specified number of bits in the instruction, from the
upper side (i.e. MSB) of the source operand into the lower side (i.e. LSB) of the destination
operand.
10. The instruction that shifts 8 LSB bits of ECX into the MSB positions of EAX, one by one starting
from LSB of ECX is
a) SHLD ECX,EAX,8
b) SHLD EAX,ECX,8
c) SHRD ECX,EAX,8
d) SHRD EAX,ECX,8
View Answer
Answer: d
Explanation: The SHRD instruction shifts the specified number of bits in the instruction, from the
lower side (i.e. LSB) of the source operand into the upper side (i.e. MSB) of the destination
operand.
4. The management of the virtual memory of the system and adequate protection to data or codes
in the physical memory is provided by
a) segmentation unit
b) paging unit
c) attribute PLA
d) all of the mentioned
View Answer
Answer: d
Explanation: The segmentation unit, paging unit, attribute PLA, descriptor registers, translation
look aside buffer and limit work together to manage the virtual memory of the system and provide
the adequate protection to the codes or data in the physical memory.
5. The flag that is added to 80486 in additional to the flags similar to 80386 is
a) alignment check flag
b) parity check flag
c) conditional flag
d) all of the mentioned
View Answer
Answer: a
Explanation: The register set of 80486 is similar to that of the 80386 but only a flag called as
alignment check flag is added to the flag register of 80386 to obtain the flag register of 80486.
6. The major limitation of 80386-387 system is
a) low speed
b) 80386 sends data using an I/O handshake technique
c) 80386 returns to real mode by reset operation
d) none of the mentioned
View Answer
Answer: b
Explanation: The major limitation of 80386-387 system is that the 80386 sends instruction or data
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
to 80387 using an I/O handshake technique. To perform this handshaking and to carry additional
house keeping tasks, 80386 requires 15 clock cycles or more.
7. The datatype that the 80486 doesnot support is
a) Signed and unsigned
b) ASCII
c) Floating point
d) None
View Answer
Answer: d
Explanation: The datatypes that 80486 supports are
1. Signed
2. Unsigned
3. Floating point
4. BCD
5. String
6. ASCII.
8. In Little Endian data format, the data is stored as
a) MSB is stored at lower memory address and LSB at higher memory address
b) LSB is stored at lower memory address and MSB at higher memory address
c) MSB is stored at general purpose registers
d) LSB is stored at general purpose registers
View Answer
Answer: b
Explanation: In Little Endian data format, for a data of size bigger than 1 byte, the LSB is stored
at lower memory address and MSB at higher memory address.
9. The on-chip cache is used for storing
a) addresses of data
b) opcodes and data
c) data and their addresses
d) opcodes and their addresses
View Answer
Answer: b
Explanation: The unique feature of 80486 that is not available in 80386 is that the on-chip is used
for storing opcodes and data.
10. The on-chip cache is controlled by
a) Cache disable(CD)
b) No write through(NW)
c) Cache disable and No write through
d) None of the mentioned
View Answer
Answer: c
Explanation: Cache disable(CD) and No write through(NW) bits of control register CR0. To
completely disable cache, the CD and NW bits must be 11.
11. The on-chip cache can be flushed using external hardware using
a) FLUSH pin
b) TERMINATE pin
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
c) FLOW pin
d) Pin FLUSH# or using software
View Answer
Answer: d
Explanation: The on-chip cache can be flushed using external hardware using pin FLUSH# or
using the software. The flushing operation clears all the valid bits for all the cache lines.
1. The salient feature of Pentium is
a) superscalar architecture
b) superpipelined architecture
c) superscalar and superpipelined architecture
d) none of the mentioned
View Answer
Answer: c
Explanation: The salient feature of Pentium is its superscalar, superpipelined architecture.
2. The number of stages of the integer pipeline, U, of Pentium is
a) 2
b) 4
c) 3
d) 6
View Answer
Answer: b
Explanation: The Pentium has two integer pipelines, U and V, where each one is a 4-stage
pipeline.
3. Which of the following is a cache of Pentium?
a) data cache
b) data cache and instruction cache
c) instruction cache
d) none of the mentioned
View Answer
advertisement
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
9. The floating point multiplier segment performs floating point multiplication in
a) single precision
b) double precision
c) extended precision
d) all of the mentioned
View Answer
Answer: d
Explanation: The floating point multiplier segment performs floating point multiplication in single
precision, double precision and extended precision.
10. The instruction or segment that executes the floating point square root instructions is
a) floating point square root segment
b) floating point division and square root segment
c) floating point divider segment
d) none of the mentioned
View Answer
Answer: c
Explanation: The floating point divider segment executes the floating point division and square
root instructions.
11. The floating point rounder segment performs rounding off operation at
a) after write back stage
b) before write back stage
c) before arithmetic operations
d) none of the mentioned
View Answer
Answer: b
Explanation: The results of floating point addition or division process may be required to be
rounded off, before write back stage to the floating point registers.
12. Which of the following is a floating point exception that is generated in case of integer
arithmetic?
a) divide by zero
b) overflow
c) denormal operand
d) all of the mentioned
View Answer
Answer: d
Explanation: In the case of integer arithmetic, the possible floating point exceptions in Pentium
are:
1. divide by zero
2. overflow
3. denormal operand
4. underflow
5. invalid operation.
13. The mechanism that determines whether a floating point operation will be executed without
creating any exception is
a) Multiple Instruction Issue
b) Multiple Exception Issue
c) Safe Instruction Recognition
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
d) Safe Exception Recognition
View Answer
Answer: c
Explanation: A mechanism known as Safe Exception Recognition (SER) had been employed in
Pentium which determines whether a floating point operation will be executed without creating any
exception.
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
d) 2X+2
View Answer
Answer: b
Explanation: The instruction, F2XMI, is used to compute 2X-1.
6. The instruction, FYL2XP, supports to compute the expression
a) Y*logX
b) Y*log2X
c) Y*log(2X+1)
d) Y*log2(X+1)
View Answer
Answer: d
Explanation: The instruction, FYL2XP, supports to compute the expression Y*log2(X+1).
7. The size of a general purpose floating point register of floating point unit is
a) 4 bytes
b) 40 bytes
c) 8 bytes
d) 80 bits
View Answer
Answer: d
Explanation: There are eight general purpose floating point registers in the floating point unit. Each
of these eight registers are of 80-bits width.
8. For floating point operations, the bits used by mantissa in a floating point register is
a) 32
b) 64
c) 72
d) 79
View Answer
Answer: b
Explanation: For floating point operations, 64 bits are used for the mantissa, and the rest 16 bits
for exponent.
9. The multimedia applications mainly require the architecture of
a) single instruction stream single data stream
b) multiple instruction stream single data stream
c) single instruction stream multiple data stream
d) multiple instruction stream multiple data stream
View Answer
Answer: c
Explanation: Most of the multimedia applications mainly require the architecture of single
instruction stream multiple data stream.
10. The size of each MMX (Multimedia Extension) register is
a) 32 bits
b) 64 bits
c) 128 bits
d) 256 bits
View Answer
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
Answer: b
Explanation: The MMX registers use only the 64-bit mantissa portion of the general purpose
floating point registers, to store MMX operands. Thus, the MMX programmers virtually get eight
new MMX registers, each of 64 bits.
11. After a sequence of MMX instructions is executed, the MMX registers should be cleared by an
instruction,
a) CLEAR
b) RESET
c) EMM
d) EMMS
View Answer
Answer: d
Explanation: After a sequence of MMX instructions is executed, the MMX registers should be
cleared by an instruction, EMMS, which implies Empty the MMX Stack.
12. The number of pixels that can be manipulated in a single register by the CPU using MMX
architecture is
a) 4
b) 6
c) 8
d) 10
View Answer
Answer: c
Explanation: Any CPU can manipulate only one pixel at a time. But by using MMX architecture,
we can manipulate eight such pixels, packed in a single 64-bit register.
13. After executing the floating point instructions, the floating point registers should be cleared by
an instruction,
a) CLEAR
b) EFPR
c) EMMF
d) EMMS
View Answer
Answer: d
Explanation: After executing the floating point instructions, the floating point registers should be
cleared by an instruction, EMMS.
1. In the data type, packed byte, the number of bytes that can be packed into one 64-bit quantity
is
a) 2
b) 4
c) 8
d) 16
View Answer
Answer: c
Explanation: In packed byte data type, eight bytes can be packed into one 64-bit quantity.
2. Four words can be packed into 64-bit by using the data type,
a) unpacked word
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
b) packed word
c) packed doubled word
d) one quad word
View Answer
Answer: b
Explanation: By using the packed word data type, four words can be packed into 64-bits.
3. The number of double words that can be packed into 64-bit register using packed double word
is
a) 2
b) 4
c) 6
d) 8
View Answer
Answer: a
Explanation: Using packed double word, two double words can be packed into 64-bit.
advertisement
4. The data type, “one quad word” packs __________ into 64-bit.
a) two 32-bit quantities
b) four 16-bit words
c) one 32-bit and two 16-bit quantities
d) one single 64-bit quantity
View Answer
Answer: d
Explanation: The data type, “one quad word” packs one single 64-bit quantity into 64-bit register.
5. If the result of an operation is overflowed(exceeded than 16 bits) or underflowed then, only the
lower 16-bits of the result are stored in the register and this effect is known as
a) overflow/underflow effect
b) wrap-around effect
c) exceeding memory effect
d) none
View Answer
Answer: b
Explanation: If the result of an operation is overflowed (exceeded than 16 bits) or underflowed
then, only the lower 16-bits of the result are stored in the register, and this effect is known as wrap-
around effect.
6. In a multitasking operating system environment, each task should return to its own processor
state which is
a) contents of integer registers
b) contents of floating point registers
c) contents of MMX registers
d) all of the mentioned
View Answer
Answer: d
Explanation: In a multitasking operating system environment, each task should return to its own
processor state, which should be saved when the task switching occurs. The processor state here
means the contents of the registers, both integer and floating point or MMX register.
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
7. Which of the following exception generated by MMX is the same type of memory access
exception as the X86 instructions?
a) page fault
b) segment not present
c) limit violation
d) all of the mentioned
View Answer
Answer: d
Explanation: The MMX instruction set generates the same type of memory access exception as
the X86 instructions namely; page fault, segment does not present and limit violation.
8. When an MMX instruction is getting executed, the floating-point tag word is marked
a) 11
b) 10
c) 00
d) 01
View Answer
Answer: c
Explanation: When an MMX instruction is getting executed, the floating-point tag word is marked
valid i.e. 00.
9. In a preemptive multitasking O.S., the saving and restoring of FP and MMX states are performed
by
a) Control unit
b) O.S.
c) MMX instructions
d) MMX registers
View Answer
Answer: b
Explanation: In a preemptive multitasking O.S., the application does not know when it is
preemptied. It is the job of the O.S. to save and restore the FP and MMX states, when performing
a context switch. Thus the user need not save or restore the state.
10. The instruction of MMX that is essential when a floating-point routine calls an MMX routine or
viceversa is
a) MOV
b) PADD
c) EMMS
d) None of the mentioned
View Answer
Answer: c
Explanation: The EMMS instruction is imperative when a floating point routine calls an MMX
routine or vice-versa. If we do not use EMMS at the end of MMX routine, subsequent floating-point
instructions will produce erratic results.
11. Pentium III is used in computers which run on the operating system of
a) windows NT
b) windows 98
c) unix
d) all of the mentioned
View Answer
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
Answer: d
Explanation: Pentium III is the best option to use in computers from high performance desktop to
workstations and servers, running on operating systems like Windows NT, Windows 98 and UNIX.
12. The architecture of CPU of Pentium III is suitable for
a) multimedia
b) image processing
c) speech processing
d) all of the mentioned
View Answer
Answer: d
Explanation: The architecture of CPU of Pentium III is suitable for applications like imaging, image
processing, speech processing, multimedia and internet applications.
13. The Pentium III has the operating frequencies as
a) 300MHz,350MHz,400MHz
b) 400MHz,450MHz,500MHz
c) 350MHz,400MHz,450MHz
d) 450MHz,500MHz,550MHz
View Answer
Answer: d
Explanation: The Pentium III has three versions operating at frequencies, 450MHz, 500MHz and
550MHz, which are all commercially available.
14. The Pentium III consists of
a) dual independent bus architecture
b) 512 Kbyte cache
c) eight 64-wide Intel MMX registers
d) all of the mentioned
View Answer
Answer: d
Explanation: The Pentium III has dual independent bus architecture that increases the bandwidth.
It has a 512 Kbyte unified, non-blocking level2 cache and eight 64-wide Intel MMX registers.
1. The additional instructions that are designed especially for performing multimedia tasks are
known as
a) additional MMX instructions
b) multimedia MMX instructions
c) enhanced MMX instructions
d) none of the mentioned
View Answer
Answer: c
Explanation: The MMX technology adds 57 new instructions to the instruction set of processors.
These instructions are known as enhanced MMX instructions and are designed specifically for
performing multimedia tasks.
2. The MMX instruction, EMMS consists of __________ on which it operates.
a) source operand
b) destination operand
c) source and destination operand
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
d) none of the mentioned
View Answer
Answer: d
Explanation: The instruction, EMMS, does not have any operand.
3. In all the MMX instructions, the destination operand resides in
a) Memory
b) RAM
c) Either in an MMX register or in memory
d) MMX register
View Answer
Answer: d
Explanation: In all the MMX instructions, the source operand is found either in an MMX register or
in memory, and the destination operand resides in MMX register.
advertisement
4. For the MMX instructions, the prefix, P, is used to represent the mode of
a) real addressing mode
b) virtual mode
c) packed mode
d) programmable mode
View Answer
Answer: c
Explanation: In the MMX instructions, if the operands are in the packed mode, the prefix, P, is
used to indicate packed data.
5. For the MMX instructions, the suffix, S, is used to represent
a) status
b) saturation
c) signed saturation
d) unsigned saturation
View Answer
Answer: c
Explanation: For the MMX instructions, the suffix “S” indicates signed saturation, and “US”
indicates unsigned saturation, while executing arithmetic computation in saturation mode.
6. The instruction that is used for quadword is
a) PADD
b) PCMPEQ
c) PAND
d) None of the mentioned
View Answer
Answer: d
Explanation: The instructions, PADD, PCMPEQ and PAND are used for packed byte, word and
double word.
7. The instruction, PSUBB, performs subtraction in
a) packed word
b) packed byte
c) packed double word
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
d) unpacked word
View Answer
Answer: b
Explanation: The instruction, PSUBB, performs subtraction in a packed byte.
8. The instruction, PCMPGT, is used to compare two data types and check
a) equal to condition
b) less than condition
c) greater than condition
d) equal to and greater than condition
View Answer
Answer: c
Explanation: The instruction, PCMPGT, compares to check the greater than condition in packed
bytes, packed words and packed double words.
9. The instruction that is not operated on quad word is
a) MOV
b) PSLL
c) PSRA
d) All of the mentioned
View Answer
Answer: c
Explanation: The instruction, PSRA, performs arithmetic shift, right in a single cycle. It supports
only the shifting of packed word and double word data types.
10. When the instruction, PMULLW, is performed, then the lower order 16-bits of the 32 bit
products are stored in
a) source operand
b) destination operand
c) no storage of lower order
d) either source or destination
View Answer
Answer: b
Explanation: In the instruction, PMULLW, four 16 X 16 multiplications are performed, and the lower
order 16 bits of the 32-bit products are stored in destination.
11. When the instruction, PMULHW, is performed, then the higher order 16-bits of the 32 bit
products are stored in
a) source operand
b) destination operand
c) no storage of lower order
d) either source or destination
View Answer
Answer: b
Explanation: In the instruction, PMULHW, four 16 X 16 multiplications are performed, and the
higher order 16 bits of the 32-bit products are stored in destination.
12. The instruction in which both multiplication and addition are performed is
a) PAND
b) PMULHW
c) PADD
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
d) PMADDWD
View Answer
Answer: d
Explanation: PMADDWD is an important multimedia instruction, which multiplies the four signed
words of the destination operand, with four signed words of source operand. This results in 32-bit
double words which are added, and the result is stored in the higher double word of the destination
operand.
13. If the result of PCMPEQ, which is a comparison of two packed data types, is a success, then
the mask generated is
a) mask 0s
b) mask 1s
c) mask 2s
d) mask 3s
View Answer
Answer: b
Explanation: If the result of PCMPEQ, which is a comparison of two packed data types is a
success, then the mask 1s is generated, otherwise a mask of 0s is generated, in the destination
operand.
1. The instructions that pass through the fetch, decode and execution stages sequentially is known
as
a) sequential instruction
b) sequence of fetch, decode and execution
c) linear instruction sequencing
d) non-linear instruction sequencing
View Answer
Answer: c
Explanation: The linear instruction sequencing is the one in which the instructions that pass
through the fetch, decode and execution stages sequentially.
2. During the execution of instructions, if an instruction is executed, then next instruction is
executed only when the data is read by
a) control unit
b) bus interface unit
c) execution unit
d) cpu
View Answer
Answer: b
Explanation: During the execution of instructions, only after the bus interface unit of CPU reads
the data from the main memory and returns it to the register, the next instruction execution will
commence.
3. Because of Pentium’s superscalar architecture, the number of instructions that are executed
per clock cycle is
a) 1
b) 2
c) 3
d) 4
View Answer
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
Answer: b
Explanation: Pentium’s superscalar architecture employs five stage pipeline with U and V pipes.
Thus it can execute two instructions per clock.
advertisement
4. The type of execution which means that the CPU should speculate which of the next instructions
can be executed earlier is
a) speculative execution
b) out of turn execution
c) dual independent bus
d) multiple branch prediction
View Answer
Answer: a
Explanation: The speculative execution is an execution which means that the CPU should
speculate which of the next instructions can be executed earlier.
5. The execution in which the consecutive instruction execution in a sequential flow is hampered
is
a) speculative execution
b) out of turn execution
c) dual independent bus
d) multiple branch prediction
View Answer
Answer: b
Explanation: In the out of turn execution, the consecutive instruction execution in a sequential flow
is hampered and the CPU should be able to execute out of turn instructions.
6. A dual independent bus has
a) Enhanced system bandwidth
b) CPU that can access both cache and memory simultaneously
c) High throughput
d) All of the mentioned
View Answer
Answer: d
Explanation: A dual independent bus architecture is incorporated by Pentium-Pro to get an
enhanced system bandwidth and it also yields high throughput. It has the CPU which can access
both main memory and the cache simultaneously.
7. The unit that is used to implement the multiple branch prediction in Pentium-Pro is
a) control unit
b) bus interface unit
c) branch target buffer
d) branch instruction register
View Answer
Answer: c
Explanation: The processor uses an associative memory called branch target buffer for
implementing the algorithm, multiple branch prediction.
8. Which of the following is not an independent engine of Pentium-Pro?
a) fetch-decode unit
b) dispatch-execute unit
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
c) control-execute unit
d) retire unit
View Answer
Answer: c
Explanation: Pentium-Pro incorporates three independent engines, 1. Fetch-decode unit 2.
Dispatch-execute unit 3. Retire unit.
9. The unit that accepts the sequence of instructions from the instruction cache as input is
a) fetch-decode unit
b) dispatch-execute unit
c) retire unit
d) none
View Answer
Answer: a
Explanation: The fetch-decode unit accepts the sequence of instructions from the instruction
cache as input and then decodes them.
10. In fetch-decode unit, the number of parallel decoders that accept the stream of fetched
instructions and decode them is
a) 1
b) 2
c) 3
d) 4
View Answer
Answer: c
Explanation: A set of three parallel decoders accepts the stream of fetched instructions and
decode them.
1. The decoder unit in fetch-decode unit converts the instructions into
a) executable statements
b) machine language statements
c) MMX instructions
d) micro operations
View Answer
Answer: d
Explanation: The decoder unit converts the fetched instructions into micro operations.
2. The logical source(s) and logical destination(s) that the micro operation has respectively are
a) 2,2
b) 1,3
c) 3,1
d) 3,2
View Answer
Answer: c
Explanation: Each microoperation contains two logical sources and one logical destination.
3. The microoperations that are converted by decoder are directly transferred to
a) decoder register
b) dispatch-execute unit
c) retire unit
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
d) register alias table
View Answer
advertisement
4. The pool of instructions that are fetched is stored in an addressable memory called
a) tristate buffer
b) branch target buffer
c) reorder buffer
d) order buffer
View Answer
Answer: c
Explanation: The pool of instructions that are fetched is stored in an array of content addressable
memory called reorder buffer.
5. The unit that performs scheduling of instructions by determining the data dependencies is
a) fetch-decode unit
b) dispatch-execute unit
c) retire unit
d) none
View Answer
Answer: b
Explanation: The dispatch-execute unit performs scheduling of instructions by determining the
data dependencies after which the microoperations of the scheduled instructions are executed in
the execution unit.
6. The unit that reads the instruction pool and removes the microoperations which have been
executed instruction pool is
a) fetch-decode unit
b) dispatch-execute unit
c) retire unit
d) decoding unit
View Answer
Answer: c
Explanation: The retire unit reads the instruction pool containing the instructions and removes the
microoperations which have been executed instruction pool.
7. The speed of Pentium-Pro when compared to that of Pentium is
a) equal
b) twice
c) thrice
d) two-third
View Answer
Answer: b
Explanation: The features incorporated in Pentium-Pro enhances the speed of Pentium-Pro and
is twice as that of Pentium.
8. Which of the following is not supported by Pentium-Pro?
a) multiple branch prediction
b) mmx instruction set
c) speculative execution
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
d) none
View Answer
Answer: b
Explanation: The Pentium-Pro does not support the MMX instruction set.
9. The feature of Pentium II is
a) high cache
b) operates at 2.8 volts
c) supports intel’s MMX instructions
d) all of the mentioned
View Answer
Answer: d
Explanation: The Pentium II has a higher cache and it can operate at 2.8 volts, thereby reducing
power consumption. The most important change of Pentium II is that it can support Intel’s MMX
instructions.
10. The results of speculative instruction execution is stored in
a) visible CPU registers
b) permanent memory
c) temporary memory
d) none
View Answer
Answer: c
Explanation: The results of speculative instruction execution should not be stored in CPU registers
and are temporarily stored, since they may have to be discarded, in case if there is a branch
instruction before these speculative instruction executions.
1. The feature of Pentium 4 is
a) works based on NetBurst microarchitecture
b) clock speed ranges from 1.4GHz to 1.7GHz
c) has hyper-pipelined technology
d) all of the mentioned
View Answer
Answer: d
Explanation: Pentium 4 is based on NetBurst microarchitecture. Clock speed varies from 1.4GHz
to 1.7GHz. It has hyper-pipelined technology.
2. Which of the following is not a module of Pentium 4 architecture?
a) front end module
b) execution module
c) control module
d) none
View Answer
Answer: c
Explanation: Pentium 4 architecture may be viewed having four basic modules.
1. Front end module
2. Out of order execution engine
3. Execution module
4. Memory subsystem module.
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
3. The front module of Pentium 4 consists of
a) trace cache
b) microcode ROM
c) front end branch predictor
d) all of the mentioned
View Answer
Answer: d
Explanation: The front module of Pentium 4 contains
1. IA 32 Instruction decoder
2. Trace cache
3. Microcode ROM
4. Front end branch predictor.
advertisement
4. The unit that decodes the instructions concurrently and translate them into micro-operations is
a) trace cache
b) instruction decoder
c) execution module
d) front end branch predictor
View Answer
Answer: b
Explanation: The role of instruction decoder is to decode the instructions concurrently and
translate them into micro-operations known as micro-ops.
5. In complex instructions, when the instruction needs to be translated into more than 4 micro-
operations, then the decoder transfers the task to
a) trace cache
b) front end branch predictor
c) microcode ROM
d) none
View Answer
Answer: c
Explanation: In case of complex instructions, when the instruction needs to be translated into more
than 4 micro-operations, then the decoder transfers the task to microcode ROM.
6. The unit that does not store the instructions, but the decoded stream of instructions is
a) trace cache
b) front end branch predictor
c) microcode ROM
d) none
View Answer
Answer: a
Explanation: The trace cache is a special instruction cache because it does not store the
instructions, but the decoded stream of instructions.
7. Trace cache can store the micro-ops upto a range of
a) 6 K decoded micro-ops
b) 8 K decoded micro-ops
c) 10 K decoded micro-ops
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
d) 12 K decoded micro-ops
View Answer
Answer: d
Explanation: Trace cache can store upto 12K micro-ops. The cache assembles the decoded
micro-ops into ordered sequence of micro-ops called traces.
8. The unit that predicts the locations from where the next instruction bytes are fetched is
a) trace cache
b) front end branch predictor
c) execution module
d) instruction decoder
View Answer
Answer: b
Explanation: The front end branch predictor predicts the locations from where the next instruction
bytes are fetched.
9. If complex instructions like interrupt handling, string manipulation appear, then the control from
trace cache transfers to
a) microcode ROM
b) front end branch predictor
c) execution module
d) instruction decoder
View Answer
Answer: a
Explanation: When some complex instructions like interrupt handling, string manipulation appear,
then the control from trace cache transfers to microcode ROM.
10. After the micro-ops are issued by the microcode ROM, the control goes to
a) trace cache
b) front end branch predictor
c) execution module
d) instruction decoder
View Answer
Answer: a
Explanation: After the micro-ops are issued by the microcode ROM, the control goes to Trace
cache once again. The micro-ops delivered by the trace cache and the microcode ROM are
buffered in a queue in an orderly fashion.
1. If the logical processors want to execute complex IA-32 instructions simultaneously then the
number of microcode instruction pointers required is
a) 1
b) 2
c) 3
d) 4
View Answer
Answer: b
Explanation: If both the logical processors want to execute complex IA-32 instructions
simultaneously then two microcode instruction pointers are required, which will access the
microcode ROM.
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
2. Which of the following is a type of branch prediction?
a) static prediction
b) dynamic prediction
c) static and dynamic prediction
d) none
View Answer
Answer: c
Explanation: There are two types of branch prediction namely static prediction and dynamic
prediction.
3. The prediction that is based on a statistical assumption that the majority of backward branches
occur in repetitive loops is
a) static prediction
b) dynamic prediction
c) branch prediction
d) none
View Answer
Answer: a
Explanation: The static prediction is based on a statistical assumption that the majority of
backward branches occur in the context of repetitive loops.
advertisement
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
Answer: b
Explanation: The Branch History Table (BHT) preserves the history of each conditional branch
that the speculative branch prediction unit encounters during the last several cycles.
7. The BHT keeps a record that indicates the likelihood of the branches grouped as
a) strongly taken
b) taken
c) not taken
d) all of the mentioned
View Answer
Answer: d
Explanation: The BHT keeps a record that indicates the likelihood that the branch will be taken
based on its past history. The branches may be grouped as ‘strongly taken’, ‘taken’, ‘not taken’
and ‘strongly not taken’.
8. Each logical processor has
a) one 64-byte streaming buffer
b) one 32-byte streaming buffer
c) two 64-byte streaming buffers
d) two 32-byte streaming buffers
View Answer
Answer: c
Explanation: Each logic processor has its own set of two 64-byte streaming buffers, which store
the instruction bytes and subsequently they are dispatched to the instruction decode stage.
9. If there is a trace cache miss, then the instruction bytes are required to be fetched from the
a) instruction decoder
b) Level2 cache
c) execution module
d) none of the mentioned
View Answer
Answer: b
Explanation: If there is a trace cache miss, then the instruction bytes are required to be fetched
from the Level2 cache.
10. The Instruction Translation Lookaside Buffer(ITLB) is present in
a) trace cache
b) instruction decoder
c) logical processors
d) all of the mentioned
View Answer
Answer: c
Explanation: Since there are two logical processors, there are two ITLBs. Thus each logical
processor has its own ITLB and its own instruction pointer to track the progress of instruction fetch
for each of them.
1. The units that are primarily used to resolve indirect mode of memory addressing is called
a) ALU
b) AGU
c) ALU and AGU
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
d) NONE
View Answer
Answer: b
Explanation: The AGUs(Address Generation Units) are primarily used to resolve indirect mode of
memory addressing.
2. The AGUs work at a speed of
a) equal to that of processor
b) twice the processor
c) thrice the processor
d) none
View Answer
Answer: b
Explanation: The AGUs run at twice the processor speed.
3. Pentium 4 consists of
a) 4 ALUs
b) 4 AGUs
c) 2 ALUs and 2 AGUs
d) 4 ALUs and 4 AGUs
View Answer
Answer: c
Explanation: Pentium 4 consists of 2 ALUs and 2 AGUs.
advertisement
4. The number of instructions that can be executed per clock cycle by the ALU or AGU is
a) 1
b) 2
c) 3
d) 4
View Answer
Answer: b
Explanation: As the speed of the units, ALU and AGU are doubled, which means that twice the
number of instructions being executed per clock cycle.
5. The paging mechanism of IA-32 architecture has an extension as
a) page memory extension
b) page size extension
c) page address extension and page size extension
d) page memory extension and page size extension
View Answer
Answer: c
Explanation: IA-32 architecture’s paging mechanism includes an extension that support
1. Page address extension to address space greater than 4GB.
2. Page size extension to map linear address to physical address in 4MB.
6. The linear address space is mapped into the processors physical address space either directly
or through paging by
a) flat memory model
b) segmented memory model
c) flat or segmented memory model
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
d) none
View Answer
Answer: c
Explanation: With the flat or segmented memory model, linear address space is mapped into the
processors physical address space either directly or through paging.
7. The features of thread in threading process is
a) threads can be bunched together
b) threads are simple and light weight
c) threads are independent
d) all of the mentioned
View Answer
Answer: d
Explanation: Threads may be bunched together in a process. Threads are independent, simple in
structure and are lightweight in the sense that they may enhance the speed of operation of an
overall process.
8. The process in which multiple threads correspond to the tracking of each individual object is
known as
a) multiple thread system
b) multi thread parallelism
c) thread level parallelism
d) multi level parallelism
View Answer
Answer: c
Explanation: The mutiple threads correspond to the tracking of each individual object. This kind of
parallelism is known as thread level parallelism(TLP).
9. Which of the following is not a type of context switching?
a) time-slice multithreading
b) on chip multiprocessing
c) hyperthreading
d) none
View Answer
Answer: d
Explanation: A single processor can execute multiple threads by switching between them. The
scheme of context switching may be several types. They are
1. Time-slice multithreading
2. On chip multiprocessing
3. Hyperthreading.
10. The thread level parallelism is a process of
a) saving the context of currently executing process
b) flushing the CPU of the same process
c) loading the context of new next process
d) all of the mentioned
View Answer
Answer: d
Explanation: The thread level parallelism is a process of
1. Saving the context of currently executing process.
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
2. Flushing the CPU of the same process.
3. Loading the context of new next process is called a context switch.
1. Which of the following is a resource sharing strategy that had been investigated by the
developers?
a) partitioned resources
b) threshold sharing
c) full sharing
d) all of the mentioned
View Answer
Answer: d
Explanation: Several resource sharing strategies have been investigated by the developers. Some
of these are
1. Partitioned resources
2. Threshold sharing
3. Full sharing.
2. The feature of hyperthreading is
a) simultaneous multithreading
b) switching is not required
c) effective use of processor resources
d) all of the mentioned
View Answer
Answer: d
Explanation: Hyperthreading used the concept of simultaneous multithreading, where multiple
threads can be executed on a single processor without switching.
3. Each logical processor maintains a set of architecture state which consists of
a) general purpose registers
b) machine state register
c) advanced programmed interrupt controller
d) all of the mentioned
View Answer
Answer: d
Explanation: Each logical processor maintains a set of architecture state which consists of
1. Registers including the general purpose registers
2. The control register
3. Advanced programmed interrupt controller
4. Machine state register.
advertisement
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
servicing cache misses, handling branch mispredictions and waiting for results of previous
instructions.
5. The hyperthreading technology automatically involves the
a) decrease of die area
b) increase of die area
c) decrease of die area to half
d) none
View Answer
Answer: b
Explanation: The hyperthreading technology automatically involves the increase of die area.
6. The instruction that is used when either of the logical processors is idle is
a) HOLD
b) HLDA
c) HALT
d) NONE
View Answer
Answer: c
Explanation: An optimization may require the use of HALT instruction, when either of the two
logical processors is idle.
7. The mode that is available when there is only one software thread to execute is
a) single task mode
b) multi task mode
c) single task and multi task mode
d) dual task mode
View Answer
Answer: c
Explanation: When there is only one software thread to execute, there are two modes namely
single task mode and multi task mode.
8. The HALT instruction is a privileged instruction that can be only used by
a) execution unit
b) operating system
c) control unit
d) memory unit
View Answer
Answer: b
Explanation: The HALT instruction is a privileged instruction that can be only used by operating
system.
9. When the operating system uses HALT instruction on a processor which supports
multithreading, the operation moves from
a) Single task to multi task mode
b) ST1 to ST0
c) Multi task to single task mode
d) None
View Answer
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
Answer: c
Explanation: When the operating system uses HALT instruction on a processor which supports
multithreading, the operation moves from multi tasking mode to single tasking mode.
10. The Xeon TM processor on which hyperthreading technology was first implemented consists
of
a) one logical processor per physical processor
b) two logical processor per physical processor
c) three logical processor per physical processor
d) zero logical processor per physical processor
View Answer
Answer: b
Explanation: The Xeon TM processor on which hyperthreading technology was first implemented
consists of two logical processor per physical processor.
1. The MMX instructions support only
a) character data type
b) float data type
c) integer data type
d) string data type
View Answer
Answer: c
Explanation: The MMX instructions support only integer data type.
2. For single precision floating point numbers, the SSE instructions are
a) MMX instructions
b) SIMD instructions
c) Floating point executions
d) None
View Answer
Answer: b
Explanation: The SSE instructions are SIMD(Single Instruction Multiple Data Stream) instructions
for single precision floating point numbers.
3. The feature of SSE among the following is
a) operate on four 32-bit floating points
b) register size is of 128 bits
c) no switching from one mode to other
d) all of the mentioned
View Answer
Answer: d
Explanation: The features of SSE(Streaming SIMD extensions) are
1. SSE instructions are SIMD instructions for single precision floating point numbers.
2. They operate on four 32-bit floating points.
3. The register size is of 128 bits
4. No necessity to switch from one mode to other.
advertisement
4. The new instructions that are added in SSE for floating point operations are of
a) 72
b) 50
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
c) 25
d) 8
View Answer
Answer: b
Explanation: The new instructions that are added in SSE for floating point operations are 50.
5. The SSE instructions can operate on
a) packed data
b) unpacked data
c) dynamic data
d) all of the mentioned
View Answer
Answer: a
Explanation: The SSE instructions can operate on packed data or scalar data.
6. Which of the following group is not of SSE instructions?
a) jump or branch group of instruction
b) logic and comparison group of instruction
c) shuffle instructions
d) all of the mentioned
View Answer
Answer: d
Explanation: The SSE instructions can be grouped to many types. Some of them are
1. Data transfer instructions
2. Arithmetic, logic and comparison group of instruction
3. shuffle instructions
4. Cacheability instructions.
7. Which of the following is true about SSE2 instructions in Pentium III and Pentium 4?
a) SSE increases the accuracy of double precision floating point operations
b) SSE supports new formats of packed data
c) SSE increases the speed of manipulation of SIMD integer operations
d) All of the mentioned
View Answer
Answer: d
Explanation: The SSE new instruction set increases the accuracy of double precision floating point
operations, supports new formats of packed data.
8. The data type that the SSE2 instructions doesn’t support is
a) single precision floating points
b) double precision floating points
c) single and double precision floating points
d) none of the mentioned
View Answer
Answer: d
Explanation: The SSE2 instructions support new data types such as double precision floating
points along with single precision floating points.
9. The additional instructions of SSE3 over SSE2 contains
a) video encoding
b) complex arithmetic operation
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
c) thread synchronization
d) all of the mentioned
View Answer
Answer: d
Explanation: The SSE3 contains 13 additional SIMD instructions over SSE2. These instructions
comprise five types.
i. floating point to integer conversion
ii. complex arithmetic operation
iii. video encoding
iv. SIMD floating point operations using array of structures format
v. thread synchronization.
10. The unit that may acts as an interface between the Front end and the Out of order execution
engine in the pipeline flow is
a) micro-op queue
b) micro-op stack
c) micro-ops
d) none
View Answer
Answer: a
Explanation: The micro-op queue acts as an interface between the Front end and the Out of order
execution engine in the pipeline flow.
11. The verification of the logic using formal mathematical tools is called
a) arithmetic verification
b) formal verification
c) mathematical verification
d) logical verification
View Answer
Answer: b
Explanation: The verification of the logic using formal mathematical tools is called formal
verification.
12. The formal verification is important for
a) developing the tools
b) developing the methodologies
c) to detect the bugs in design
d) all of the mentioned
View Answer
Answer: d
Explanation: The formal verification is important to develop the tools and methodologies to handle
a large number of proofs using which it will be possible to detect the bugs in the design.
13. By using the techniques of formal verification, one can detect the logical bugs of
a) more than 50
b) less than 50
c) more than 100
d) less than 100
View Answer
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
Answer: c
Explanation: By using the techniques of formal verification, one can detect more than 100 logical
bugs.
14. The modern processors are designed to achieve
a) high speed
b) operate at low operating voltage
c) uses cooling technology
d) all of the mentioned
View Answer
Answer: d
Explanation: The modern processors are designed to operate at a very high speed and even with
the lower operating voltages, the power consumption is high enough to require expensive cooling
technology.
1. The disadvantage of CISC design processors is
a) low burden on compiler developers
b) wide availability of existing software
c) complex in nature
d) none
View Answer
Answer: c
Explanation: Some computers are used in preference to CISC design due to its low burden on
compiler developers and wide availability of existing software. But they are complex in nature.
2. The RISC architecture is preferred to CISC because RISC architecture has
a) simplicity
b) efficiency
c) high speed
d) all of the mentioned
View Answer
Answer: d
Explanation: The RISC architecture is preferred to CISC because RISC architecture is simple,
highly efficient and the processors using RISC architecture have high speed.
3. The feature of RISC that is not present in CISC is
a) branch prediction
b) pipelining
c) branch prediction and pipelining
d) none
View Answer
Answer: c
Explanation: A RISC core allows performance enhancing features, such as branch prediction and
pipelining. Traditionally, these have only been possible in RISC designs.
advertisement
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
d) all of the mentioned
View Answer
Answer: d
Explanation: The CISC-RISC hybrids continue to consume a lot of power and are not best
candidates for mobile and embedded applications.
5. Which of the following is an application of RISC architecture by adding more instructions?
a) multimedia applications
b) telecommunication encoding
c) image conversion
d) all of the mentioned
View Answer
Answer: d
Explanation: By adding more instructions to the RISC architecture, some applications can be run
much faster like multimedia applications, telecommunication encoding/decoding, image
conversion and video processing.
6. Which of the following processor belongs to hybrid RISC-CISC architecture?
a) Intel Pentium III
b) Intel Itanium 64
c) AMD’s X86-64
d) All of the mentioned
View Answer
Answer: d
Explanation: The processors, Intel Pentium III, Intel Itanium 64 and AMD’s X86-64 consists of
hybrid RISC-CISC architecture.
7. In order to implement complex instructions, CISC architectures use
a) macroprogramming
b) hardwire
c) microprogramming
d) none
View Answer
Answer: c
Explanation: In order to implement complex instructions, CISC architectures use
microprogramming.
8. The advantage of RISC processors is
a) can operate at high clock frequency
b) shorter design cycle
c) simple and fast
d) all of the mentioned
View Answer
Answer: d
Explanation: The advantages of RISC processors are that they can work at high clock frequency,
can be designed, developed and tested more quickly with a high speed.
9. The additional functionality that can be placed on the same chip of RISC is
a) Memory management units
b) Floating point units
c) Memory management and floating point arithmetic units
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
d) RAM, ROM
View Answer
Answer: c
Explanation: Several extra functionalities, such as memory management units or floating point
arithmetic units, can also be placed on the same chip of RISC.
10. The number of clockcycles that take to wait until the length of the instruction is known in order
to start decoding is
a) 0
b) 1
c) 2
d) 3
View Answer
Answer: a
Explanation: The loading and decoding the instructions in a RISC processor is simple and fast. It
is not needed to wait until the length of the instruction is known in order to start the decoding.
1. The number of CPIs(Clock Per Instruction) for an instruction of RISC processors is
a) 0
b) 1
c) 2
d) 3
View Answer
Answer: b
Explanation: RISC processors have unity CPI(Clock Per Instruction), which is due to the
optimization of each instruction on the CPU and massive pipelining embedded in a RISC
processor.
2. Which of the following is not true about RISC processors?
a) addressing modes are less
b) pipelining is key for high speed
c) microcoding is required
d) single machine cycle instructions
View Answer
Answer: c
Explanation: Unlike the CISC, in RISC architecture, instruction microcoding is not required.
3. The RISC processors that support variable length instructions are from
a) Intel
b) Motorola
c) AMD
d) Intel and Motorola
View Answer
Answer: d
Explanation: In RISC, each instruction is of the same length, so that it may be fetched in a single
operation. The traditional microprocessors from Intel or Motorola support variable length
instructions.
advertisement
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
Answer: c
Explanation: A data dependency occurs when an instruction depends on the results of the previous
instructions.
9. The instructions that instruct the processor to make a decision about the next instruction to be
executed are
a) data dependency instructions
b) branch instructions
c) control transfer instructions
d) none
View Answer
Answer: b
Explanation: The branch instructions are those which instruct the processor to make a decision
about the next instruction to be executed, depending upon whether the condition is satisfied or
not.
10. The reason for which the RISC processor goes to idle state(or stall) is
a) delay in reading information from memory
b) poor instruction set design
c) dependencies between instructions
d) all of the mentioned
View Answer
Answer: d
Explanation: There are a variety of reasons, including delays in reading information from memory,
poor instruction set design, or dependencies between instructions for the RISC processor to
remain idle.
1. The register that may be used as an operand register is
a) Accumulator
b) B register
c) Data register
d) Accumulator and B register
View Answer
Answer: d
Explanation: In some instructions, the Accumulator and B register are used to store the operands.
2. The register that can be used as a scratch pad is
a) Accumulator
b) B register
c) Data register
d) Accumulator and B register
View Answer
3. The registers that contain the status information is
a) control registers
b) instruction registers
c) program status word
d) all of the mentioned
View Answer
Answer: c
Explanation: The set of flags of program status word contains the status information and is
considered as one of the special function registers.
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
advertisement
4. Which of the processor’s stack does not contain the top-down data structure?
a) 8086
b) 80286
c) 8051
d) 80386
View Answer
Answer: c
Explanation: The 8051 stack is not a top-down data structure, like other Intel processors.
5. The architecture of 8051 consists of
a) 4 latches
b) 2 timer registers
c) 4 on-chip I/O ports
d) all of the mentioned
View Answer
Answer: d
Explanation: The architecture of 8051 consists of 4 latches and driver pairs are allotted to each of
the four on-chip I/O ports. It contains two 16-bit timer registers.
6. The transmit buffer of serial data buffer is a
a) serial-in parallel-out register
b) parallel-in serial-out register
c) serial-in serial-out register
d) parallel-in parallel-out register
View Answer
Answer: b
Explanation: The transmit buffer of serial data buffer is a parallel-in serial-out register.
7. The receive buffer of serial data buffer is a
a) serial-in parallel-out register
b) parallel-in serial-out register
c) serial-in serial-out register
d) parallel-in parallel-out register
View Answer
Answer: a
Explanation: The serial data register has two buffers. The transmit buffer is a parallel-in serial-out
register and receive buffer is a parallel-in serial-out register.
8. The register that provides control and status information about counters is
a) IP
b) TMOD
c) TSCON
d) PCON
View Answer
Answer: b
Explanation: The registers, TMOD and TCON contain control and status information about
timers/counters.
9. The register that provides control and status information about serial port is
a) IP
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
b) IE
c) TSCON
d) PCON and SCON
View Answer
Answer: d
Explanation: The registers, PCON and SCON contain control and status information about serial
port.
10. The device that generates the basic timing clock signal for the operation of the circuit using
crystal oscillator is
a) timing unit
b) timing and control unit
c) oscillator
d) clock generator
View Answer
Answer: c
Explanation: The oscillator circuit generates the basic timing clock signal for the operation of the
circuit using crystal oscillator.
11. The registers that are not accessible by the user are
a) Accumulator and B register
b) IP and IE
c) Instruction registers
d) TMP1 and TMP2
View Answer
Answer: d
Explanation: The arithmetic operations are performed over the operands held by the temporary
registers, TMP1 and TMP2. Users cannot access these temporary registers.
1. Which of the following is an 8-bit register?
a) PSW(Program Status Word)
b) TCON(Timer Control Register)
c) Accumulator
d) All of the mentioned
View Answer
Answer: d
Explanation: The registers, PSW, TCON and Accumulator are 8-bit registers.
2. Which of the following register can be addressed as a byte?
a) P1
b) SCON
c) TMOD
d) TCON
View Answer
Answer: c
Explanation: The registers, TMOD, SP, TH0, TH1, TL0, TL1 are to be addressed as bytes.
3. Which of the following is bit-addressable register?
a) SBUF
b) PCON
c) TMOD
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
d) SCON
View Answer
Answer: d
Explanation: The registers, accumulator, PSW, B, P0, P1, P2, P3, IP, IE, TCON and SCON are
all bit-addressable registers.
advertisement
4. The higher and lower bytes of a 16-bit register DPTR are represented respectively as
a) LDPTR and HDPTR
b) DPTRL and DPTRH
c) DPH and DPL
d) HDP and LDP
View Answer
Answer: c
Explanation: The registers, DPH and DPL are the higher and lower bytes of a 16-bit register DPTR.
5. The register that is used for accessing external data memory is
a) DPH
b) DPL
c) DPTR
d) NONE
View Answer
Answer: c
Explanation: The Data Pointer(DPTR) is used for accessing external data memory which means
that it includes both DPH and DPL.
6. Among the four groups of register banks, the number of groups that can be accessed at a time
is
a) 1
b) 2
c) 3
d) all the four
View Answer
Answer: a
Explanation: At a time, only one of the four register banks can be accessed.
7. The number of 8-bit registers that a register bank contain is
a) 2
b) 4
c) 6
d) 8
View Answer
Answer: d
Explanation: The 32, 8-bit registers are divided into four groups of 8 registers each, called register
banks.
8. If RS1=1, RS0=0, then the register bank selected is
a) register bank 0
b) register bank 1
c) register bank 2
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
d) register bank 3
View Answer
Answer: c
Explanation: If RS1=1, RS0=0, then the register bank selected is register bank 2.
9. If RS1=1, RS0=1, then the register bank selected is
a) register bank 0
b) register bank 1
c) register bank 2
d) register bank 3
View Answer
Answer: d
Explanation: If RS1=1, RS0=1, then the register bank selected is register bank 3. If RS1=0,
RS0=0, then selected bank is register bank 0.
10. The PCON register consists of
a) power mode bit
b) power idle bit
c) power ideal bit
d) power down bit and idle bit
View Answer
Answer: d
Explanation: The power control register, PCON consists of power down bit and idle bit which
activate the power down mode and idle mode in 80C51BH.
11. The on-chip oscillator is stopped in
a) power mode
b) power down mode
c) idle mode
d) ideal mode
View Answer
Answer: b
Explanation: In power down mode, the on-chip oscillator is stopped.
12. In idle mode, the device that is disabled is
a) serial port
b) timer block
c) clock to CPU
d) all of the mentioned
View Answer
Answer: c
Explanation: In idle mode, the oscillator continues to run and the interrupt, serial port and timer
blocks are active but the clock to the CPU is disabled.
13. The only way to terminate the power down mode is to
a) CLEAR
b) RESET
c) HOLD
d) HLT
View Answer
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
Answer: b
Explanation: The only way to terminate the power down mode is hardware reset. The reset
redefines all the SFRs but the RAM contents are left unchanged.
14. The idle mode can be terminated by
a) PRESET
b) CLEAR
c) Interrupt
d) Interrupt or reset
View Answer
Answer: d
Explanation: The idle mode can be terminated with a hardware interrupt or hardware reset signal.
on “Interrupt and Stack of 8051 -1”.
4. If the external interrupt sources control the flags IE0 and IE1, then the interrupt programmed is
a) level-sensitive
b) edge-sensitive
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
c) in serial port
d) in parallel port
View Answer
Answer: a
Explanation: If the interrupts are programmed as level sensitive, then the flags IE0 and IE1 are
controlled by external interrupt sources themselves.
5. The pulses at T0 or T1 pin are counted in
a) timer mode
b) counter mode
c) idle mode
d) power down mode
View Answer
Answer: b
Explanation: In counter mode, the pulses are counted at T0 or T1 pin.
6. In timer mode, the oscillator clock is divided by a prescalar
a) (1/8)
b) (1/4)
c) (1/16)
d) (1/32)
View Answer
Answer: d
Explanation: In timer mode, the oscillator clock is divided by a prescalar (1/32) and then given to
the timer.
7. The serial port interrupt is generated if
a) RI is set
b) RI and TI are set
c) Either RI or TI is set
d) RI and TI are reset
View Answer
Answer: c
Explanation: The serial port interrupt is generated if atleast one of the two bits, RI and TI is set.
8. In serial port interrupt, after the control is transferred to the interrupt service routine, the flag
that is cleared is
a) RI
b) TI
c) RI and TI
d) None
View Answer
Answer: d
Explanation: In serial port interrupt, after the control is transferred to the interrupt service routine,
neither of the flags are cleared.
9. The atleast number of machine cycles for which the external interrupts that are programmed
level-sensitive should remain high is
a) 1
b) 2
c) 3
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
d) 0
View Answer
Answer: b
Explanation: The external interrupts, programmed level-sensitive should remain high for atleast 2
machine cycles.
10. If the external interrupts are programmed edge sensitive, then they should remain high for
atleast
a) 0 machine cycle
b) 2 machine cycles
c) 1 machine cycle
d) 3 machine cycles
View Answer
Answer: c
Explanation: If the external interrupts are programmed edge sensitive, then they should remain
high for atleast one machine cycle and low for atleast one machine cycle, for being sensed.
1. The timer generates an interrupt, if the count value reaches to
a) 00FFH
b) FF00H
c) 0FFFH
d) FFFFH
View Answer
Answer: d
Explanation: The timer is an up-counter and generates an interrupt when the count has reached
FFFFH.
2. The external interrupt that has the lowest priority among the following is
a) TF0
b) TF1
c) IE1
d) NONE
View Answer
Answer: c
Explanation: The order of given interrupts from high to low priority is TF0, IE1 and TF1.
3. Among the five interrupts generated by 8051, the lowest priority is given to the interrupt
a) IE0
b) TF1
c) TF0
d) RI
View Answer
Answer: d
Explanation: The interrupt, RI=TI (serial port) is given the lowest priority among all the interrupts.
advertisement
4. Among the five interrupts generated by 8051, the highest priority is given to the interrupt
a) IE0
b) TF1
c) TF0
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
d) IE1
View Answer
Answer: a
Explanation: The interrupt, IE0(External INT0) is given the highest priority among all the interrupts.
5. All the interrupts are enabled using a special function register called
a) interrupt priority register
b) interrupt register
c) interrupt function register
d) interrupt enable register
View Answer
Answer: d
Explanation: All the interrupts are enabled using a special function register called interrupt enable
register (IE) and their priorities are programmed using another special function register called
interrupt priority register(IP).
6. The number of bytes stored on the stack during one operation of PUSH or POP is
a) 1
b) 2
c) 3
d) 4
View Answer
Answer: a
Explanation: As 8051 stack operations are 8-bit wide i.e. in an operation using PUSH or POP
instruction, one byte of data is stored on a stack or retrieved from the stack. For implementing 16-
bit operations, two 8-bit operations are cascaded.
7. The step involved in PUSH operation is
a) increment stack by 2 and store 8-bit content to address pointed to by SP
b) decrement stack by 1 and store 16-bit content to address pointed to by SP
c) increment stack by 1 and store 8-bit content to address pointed to by SP
d) store 8-bit content to address pointed to by SP and then increment stack by 1
View Answer
Answer: c
Explanation: The PUSH instruction follows two steps.
1. Increment stack by 1
2. Store 8-bit content of the 8-bit address specified in the instruction to the address pointed to by
SP.
8. The step involved in POP operation is
a) decrement stack by 2 and store 8-bit content to address pointed to by SP
b) store 16-bit content to address pointed to by SP and decrement stack by 1
c) decrement stack by 1 and store content of top of stack to address pointed to by SP
d) store content of top of stack to address pointed to by SP and then decrement stack by 1
View Answer
Answer: d
Explanation: The POP instruction follows two steps.
1. Store the contents of top of stack pointed to by SP register to the 8-bit memory specified in the
instruction.
2. Decrement stack by 1.
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
9. The 8051 stack is
a) auto-decrement during PUSH operations
b) auto-increment during POP operations
c) auto-decrement during POP operations
d) auto-increment during PUSH operations
View Answer
Answer: d
Explanation: The 8051 stack is opposite to that in 8085 or 8086 i.e. in 8085 it is auto-decrement
while in 8051 it is auto-increment during PUSH operations.
10. After reset, the stack pointer(SP) is initialized to the address of
a) internal ROM
b) internal RAM
c) external ROM
d) external RAM
View Answer
Answer: b
Explanation: The stack pointer(SP) is an 8-bit register and is initialized to internal RAM address
07H after reset.
4. The address register for storing the 16-bit addresses can only be
a) stack pointer
b) data pointer
c) instruction register
d) accumulator
View Answer
Answer: b
Explanation: The address register for storing the 16-bit addresses can only be data pointer.
5. The address register for storing the 8-bit addresses can be
a) R0 of the selected bank of register
b) R1 of the selected bank of register
c) Stack pointer
d) All of the mentioned
View Answer
Answer: d
Explanation: The registers R0 and R1 of the selected bank of registers or stack pointer can be
used as address registers for storing the 8-bit addresses.
6. The instruction, ADD A, R7 is an example of
a) register instructions
b) register specific instructions
c) indexed addressing
d) none
View Answer
Answer: a
Explanation: In register instructions addressing mode, operands are stored in the registers R0-R7
of the selected register bank. One of these registers is specified in the instruction.
7. The addressing mode, in which the instructions has no source and destination operands is
a) register instructions
b) register specific instructions
c) direct addressing
d) indirect addressing
View Answer
Answer: b
Explanation: In register specific instructions addressing mode, the instructions don’t have source
and destination operands. Some of the instructions always operate only on a specific register.
8. The instruction, RLA performs
a) rotation of address register to left
b) rotation of accumulator to left
c) rotation of address register to right
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
d) rotation of accumulator to right
View Answer
Answer: b
Explanation: The instruction, RLA rotates accumulator left.
9. The instruction, ADD A, #100 performs
a) 100(decimal) is added to contents of address register
b) 100(decimal) is subtracted from the accumulator
c) 100(decimal) is added to contents of an accumulator
d) none
View Answer
Answer: c
Explanation: Immediate data 100(decimal) is added to the contents of the accumulator.
10. In which of these addressing modes, a constant is specified in the instruction, after the opcode
byte?
a) register instructions
b) register specific instructions
c) direct addressing
d) immediate mode
View Answer
Answer: d
Explanation: In immediate mode, an immediate data, i.e. a constant is specified in the instruction,
after the opcode byte.
11. The only memory which can be accessed using indexed addressing mode is
a) RAM
b) ROM
c) Main memory
d) Program memory
View Answer
Answer: d
Explanation: Only program memory can be accessed using the indexed addressing mode.
12. The data address of look-up table is found by adding the contents of
a) accumulator with that of program counter
b) accumulator with that of program counter or data pointer
c) data register with that of program counter or accumulator
d) data register with that of program counter or data pointer
View Answer
Answer: b
Explanation: The look-up table data address is found out by adding the contents of register
accumulator with that of the program counter or data pointer.
This set of Microprocessor Multiple Choice Questions & Answers (MCQs) focuses on “8051
Instruction Set -1”.
4. The logical instruction that affects the carry flag during its execution is
a) XRL A;
b) ANL A;
c) ORL A;
d) RLC A;
View Answer
Answer: d
Explanation: The logical instructions that doesn’t affect the carry flag are, ANL, ORL and XRL. The
logical instructions that affect the carry flag during its execution are RL, RLC, RRC and RR.
5. The instruction that is used to complement or invert the bit of a bit addressable SFR is
a) CLR C
b) CPL C
c) CPL Bit
d) ANL Bit
View Answer
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
Answer: c
Explanation: The instruction, CPL Bit is used to complement or invert the bit of a bit addressable
SFR or RAM.
6. The instructions that change the sequence of execution are
a) conditional instructions
b) logical instructions
c) control transfer instructions
d) data transfer instructions
View Answer
Answer: c
Explanation: The control transfer instructions transfer the control of execution or change the
sequence of execution conditionally or unconditionally.
7. The control transfer instructions are divided into
a) explicit and implicit control transfer instructions
b) conditional and unconditional control transfer instructions
c) auto control and self control transfer instructions
d) all of the mentioned
View Answer
Answer: b
Explanation: The control transfer instructions are divided into conditional and unconditional control
transfer instructions.
8. The conditional control transfer instructions check a bit condition which includes any bit of
a) bit addressable RAM
b) bit addressable SFRs
c) content of accumulator
d) all of the mentioned
View Answer
Answer: d
Explanation: The conditional control transfer instructions check a bit condition which includes any
bit of bit addressable RAM or bit addressable SFRs or content of accumulator for transferring the
control to the specified jump location.
9. All conditional jumps are
a) absolute jumps
b) long jumps
c) short jumps
d) none
View Answer
Answer: c
Explanation: All conditional jumps are short jumps.
10. The first byte of a short jump instruction represents
a) opcode byte
b) relative address
c) opcode field
d) none
View Answer
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
Answer: a
Explanation: The short jump instruction has two byte instruction. The first byte represents opcode
byte and second byte represents an 8-bit relative address.
11. In logical instructions, the immediate data can be an operand for
a) increment operation
b) decrement operation
c) single operand instruction
d) none
View Answer
Answer: d
Explanation: In logical instructions, the immediate data can’t be an operand for
increment/decrement or any other single operand instruction
1. If the most significant bit of relative address byte is 1, then the short jump instruction is
a) forward jump
b) back jump
c) either forward or back jump
d) none
View Answer
Answer: b
Explanation: If the most significant bit of relative address byte is 1, then the short jump instruction
is back jump, else it is considered as forward jump.
2. The first byte of an absolute jump instruction consists of
a) 3 LSBs of opcode and 5 MSBs of 11-bit address
b) 5 MSBs of opcode and 3 LSBs of 11-bit address
c) 6 MSBs of opcode and 1 LSB of 11-bit address
d) 5 LSBs of opcode and 3 MSBs of 11-bit address
View Answer
Answer: d
Explanation: The first byte of an absolute jump instruction consists of 5 LSBs of opcode and 3
MSBs of 11-bit address. The next byte carries the least significant 8 bits of the 11-bit address.
3. The third byte of the long jump instruction is
a) opcode
b) 5 LSBs of opcode
c) higher byte of jump location or subroutine
d) lower byte of jump location or subroutine
View Answer
Answer: c
Explanation: The third byte of the long jump instruction is a higher byte of jump location or
subroutine.
advertisement
4. The absolute jump instruction is intended mainly for a jump within a memory space of
a) 2 bytes
b) 2 Kbytes
c) 2 Mbytes
d) none
View Answer
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
Answer: b
Explanation: The absolute jump instruction is intended mainly for a jump within a memory space
of 2 Kbytes.
5. The LJMP instruction is very useful in programming in the external code memory space of
a) 32 MB
b) 64 MB
c) 32 KB
d) 64 KB
View Answer
Answer: d
Explanation: The LJMP instruction is very useful in programming in the external code memory
space of 64 KB.
6. Which of the following is not an unconditional control transfer instruction?
a) JMP
b) RET
c) JNC
d) CALL
View Answer
Answer: c
Explanation: The instructions, JMP, RET, RETI, CALL are the unconditional control transfer
instructions.
7. The conditional control transfer instructions use
a) status flags
b) bits of bit addressable RAM
c) SFRs termed bit
d) all of the mentioned
View Answer
Answer: d
Explanation: The conditional control transfer instructions use status flags or bits of bit addressable
RAM or SFRs termed bit.
8. Which of the following is not a conditional control transfer instruction?
a) JC
b) JBC
c) JNC
d) NONE
View Answer
Answer: d
Explanation: The instructions, JC, JBC, JNC, JB and JNB are the conditional control transfer
instructions.
9. The mnemonic used to perform a subtraction of source with an 8-bit data and jumps to specified
relative address if subtraction is non-zero is
a) DJNZ
b) CJNE
c) JZ
d) JNC
View Answer
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
Answer: b
Explanation: The CJNE instruction perform a subtraction of source with an 8-bit data and jumps
to specified relative address only if the result of the subtraction is non-zero, else continues to the
next instruction.
10. The mnemonic, JNB is used to jump to the specified relative address only if
a) specified bit=1
b) specified bit=0
c) specified bit is non-recursive
d) none
View Answer
Answer: a
Explanation: The mnemonic, JNB is used to jump to the specified relative address only if specified
bit=1, else continues to the next instruction.
11. The type of operand that is not allowed to use in boolean instructions of 8051 is
a) direct register operands
b) indirect register operands
c) immediate bit
d) none
View Answer
Answer: c
Explanation: In boolean instructions, the immediate bit is not allowed as an operand.
12. In boolean instructions, the flag that is the only allowed destination operand for two operand
instructions is
a) overflow flag
b) underflow flag
c) auxiliary flag
d) carry flag
View Answer
Answer: d
Explanation: Carry flag(C) is the only allowed destination operand for two operand instructions in
boolean instructions
1. Which of the following is not one of the SFR addresses of the ports of 8051?
a) 80H
b) 90H
c) A0H
d) NONE
View Answer
Answer: d
Explanation: The SFR addresses of the ports P0, P1, P2 and P3 are 80H, 90H, A0H and B0H
respectively.
2. Each port line of a port can individually source a current of upto
a) 0.2 mA
b) 0.25 mA
c) 0.5 mA
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
d) 0.75 mA
View Answer
Answer: c
Explanation: Each port line of a port can individually source a current of upto 0.5 mA.
3. Each port line of a port can individually sink a current of upto
a) 2 mA
b) 8 mA
c) 5 mA
d) 1 mA
View Answer
Answer: b
Explanation: Each port line of a port can individually sink a current of upto 8 mA.
advertisement
4. The number of TTL inputs that can be sinked by the port 0 when a logic 0 is sent to a port line
as an output port is
a) 2
b) 4
c) 6
d) 8
View Answer
Answer: d
Explanation: When a logic 0 is sent to a port line as an output port, it can sink 8 LS TTL inputs.
Port 0 is used as data bus during external interfacing whenever required.
5. The open drain bidirectional (input or output) port with internal pullups is
a) Port 0
b) Port 1
c) Port 2
d) Port 3
View Answer
Answer: a
Explanation: Port 0 is an open drain bidirectional (input or output) port with internal pullups. Port
1, Port 2, Port 3 are 8-bit bidirectional ports.
6. The port that can source or sink 4 LS TTL inputs when being used as an output port on each of
its line is
a) Port 1
b) Port 2
c) Port 3
d) all of the mentioned
View Answer
Answer: d
Explanation: The ports P1, P2 and P3 can source or sink 4 LS TTL inputs when being used as an
output port on each of its line.
7. The port that will source a current of 500 micro amperes when being used as input ports is
a) 0.5 mA
b) 0.25 mA
c) 250 micro amperes
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
d) 500 micro amperes
View Answer
Answer: d
Explanation: Port 3 pins which are externally pulled low when being used as input pins will source
current of 500 micro amperes.
8. If the EA(active low) signal is grounded then the execution
a) directly start from main memory
b) directly start from 16 bit address in main memory
c) directly start from 16 bit address in program memory
d) directly start from RAM
View Answer
Answer: c
Explanation: For interfacing external program memory, EA(active low) pin must be grounded. If
the EA(active low) signal is grounded then the execution will start directly from the 16-bit address
0000H in external program memory.
9. When the port lines of a port are to be used as input lines then the value that must be written to
the port address is
a) F0H
b) 0FH
c) FFH
d) 00H
View Answer
Answer: c
Explanation: When the port lines of a port are to be used as input lines then ‘FF’H must be written
to the port address.
10. Port 1 lines are used during programming of
a) external EPROM and EEPROM
b) external ROM and RAM
c) internal ROM and RAM
d) internal EPROM and EEPROM
View Answer
Answer: d
Explanation: Port 1 lines are used as lower byte of 16-bit address bus during programming of
internal EPROM or EEPROM.
11. The configuration in which each LED receives operating current of 8 mA from power supply
while the port lines sink the current on each port line is
a) common port configuration
b) common anode configuration
c) common cathode configuration
d) none of the mentioned
View Answer
Answer: b
Explanation: The common anode configuration is preferred to that of other configurations as in
common anode configuration, each LED receives operating current of 8 mA from power supply
while the port lines sink the current on each port line.
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
1. If EA(active low) signal =1, then the execution starts from
a) internal EPROM
b) flash RAM
c) internal EPROM or flash RAM
d) none
View Answer
Answer: c
Explanation: If EA(active low) signal =1, then the execution starts from an internal EPROM or flash
RAM address 000H, can continue upto FFFH address and then for higher addresses it will go into
external memory.
2. The pin that is grounded for interfacing external EPROM is
a) EA(active low)
b) PSEN(active low)
c) OE(active low)
d) All of the mentioned
View Answer
Answer: a
Explanation: The EA(active low) pin is grounded for interfacing external EPROM. The
PSEN(active low) is used for interfacing EPROM i.e. it acts as an OE(active low) input to EPROM.
3. The step that is involved in the procedure of memory interfacing with 8051 is
a) data bus is connected to data lines of memory chips
b) PSEN(active low) is connected to OE(active low) of EPROM chips
c) writing address map of memory chip in bit form
d) all of the mentioned
View Answer
Answer: d
Explanation: The procedure of memory interfacing with 8051 includes, data bus connection to data
lines of memory chips, PSEN(active low) connected to OE(active low) of EPROM chips and writing
address map of memory chip in bit form.
advertisement
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
d) AND, OR and NOT
View Answer
Answer: b
Explanation: For deriving chip selects of isolated memory or IO devices, the NAND and NOT gates
are traditionally used.
6. The current that is required for a LED for an appropriate glow is
a) 6-8 mA
b) 4-6 mA
c) 8-10 mA
d) 10-12 mA
View Answer
Answer: c
Explanation: For appropriate glow, a LED typically requires 8-10 mA with around 1.6 Volts.
7. The maximum current that can be sinked totally by all the ports of 8051 is
a) 61 mA
b) 81 mA
c) 91 mA
d) 71 mA
View Answer
Answer: d
Explanation: All the ports together (4 ports) should not be made to sink more than 71 mA.
8. The number of LEDs that can be connected to a port of 8051, if all are expected to glow
simultaneously is
a) 6
b) 8
c) 10
d) 12
View Answer
Answer: b
Explanation: If 8 LEDs are connected to a port of 8051, and if all are expected to glow
simultaneously, the total current sinked by the 8051 port will be 8×8=64 mA (since min voltage for
an LED to glow=8 mA) which is less than the maximum 71 mA.
9. Which is true in interfacing 7 segment code display?
a) transmitted by second port
b) display is selected by third port
c) display is selected by second port
d) none of the mentioned
View Answer
Answer: c
Explanation: The 7-segment code of a digit is transmitted by the first port and the display is
selected by second port. As soon as the display is selected by the second port, the digit starts
glowing on that display position.
10. After the display is selected by second port, then the digit (LED) glows for a duration of
a) 5 msec
b) 10 msec
c) 2 msec
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
d) 6 msec
View Answer
Answer: a
Explanation: The unit(LED) glows for a duration of 5 msec.
11. The number of scans of the complete 8-digit display that can be carried out in one second is
a) 15
b) 25
c) 35
d) 55
View Answer
Answer: b
Explanation: Starting from either right most or left most digit, every digit glows for 5 msec one by
one. Thus one scan of the 8 digit display requires 40 msec. Thus in one second, 25 scans of the
complete 8-digit display can be carried out.
12. To convert its current output into a voltage, the DAC 0808 is connected with
a) Transistor(BJT) externally
b) FET externally
c) OPAMP externally
d) OPAMP internally
View Answer
Answer: c
Explanation: the DAC 0808 is connected with OPAMP externally, to convert its current output into
voltage.
1. The external interrupts of 8051 can be enabled by
a) 4 LSBs of TCON register
b) Interrupt enable
c) priority register
d) all of the mentioned
View Answer
Answer: d
Explanation: The external interrupts namely INT0(active low) and INT1(active low) can be enabled
and programmed using the least significant four bits of TCON register and the Interrupt enable
and priority registers.
2. The bits that control the external interrupts are
a) ET0 and ET1
b) ET1 and ET2
c) EX0 and EX1
d) EX1 and EX2
View Answer
Answer: c
Explanation: The bits, EX0 and EX1 individually control the external interrupts, INT0(active low)
and INT1(active low). If INT0(active low) and INT1(active low) interrupts are to be enabled then
the bits EX0 and EX1 must be set respectively.
3. EA bit is used to
a) enable or disable external interrupts
b) enable or disable internal interrupts
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
c) enable or disable all the interrupts
d) none of the mentioned
View Answer
Answer: c
Explanation: Using EA bit, all the interrupts can be enabled or disabled. Using the individual
respective bit, the respective interrupt can be enabled or disabled.
advertisement
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
2. The serial communication is used for
a) short distance communication
b) long distance communication
c) short and long distance communication
d) communication for a certain range of distance
View Answer
Answer: b
Explanation: Serial communication is more popular for communication over longer distances as it
requires less number of conductors.
3. The mcs 51 architecture supports
a) serial transmission and reception
b) simultaneous transmission and reception
c) transmission and reception of data using serial communication interface
d) all of the mentioned
View Answer
Answer: d
Explanation: The mcs 51 architecture supports simultaneous transmission and reception of binary
data byte by byte i.e. full duplex mode of communication. It supports serial transmission and
reception of data using standard serial communication interface and baud rates.
advertisement
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
d) Any of the mentioned
View Answer
Answer: b
Explanation: once a byte for transmission is written to the serial buffer(SBUF) register, the
transmission unit does not require assistance from a processor.
7. The common unit shared by the receiver unit and transmission unit of serial communication unit
is
a) SCON(Serial Port Control) Register
b) SBUF(Serial Buffer) register
c) 8-bit serial data interface
d) All of the mentioned
View Answer
Answer: d
Explanation: The transmission unit and receiver unit both are controlled by using a common
SCON(Serial Port Control) Register. Also both units share a common serial buffer(SBUF) register
which is a common 8-bit serial data interface.
8. During serial reception, the buffer that receives serial bits and converts to a byte is
a) receive buffer 0
b) receive buffer 1
c) receive buffer 2
d) none
View Answer
Answer: b
Explanation: During serial reception, the receive buffer 1 receives serial bits and converts to a
byte, it then transfers the received parallel byte in receive buffer 2.
9. If SM0=1, SM1=0, then the transceiver selected is
a) 8-bit synchronous
b) 9-bit synchronous
c) 8-bit asynchronous
d) 9-bit asynchronous
View Answer
Answer: d
Explanation: If SM0=1, SM1=0, then the 9-bit asynchronous transceiver is selected.
10. If the microcontroller is expected to communicate in a multiprocessor system, then the required
condition is
a) SM0 is set
b) SM1 is set
c) SM2 is set
d) REN is set
View Answer
Answer: c
Explanation: The bit, SM2 is set if the microcontroller is expected to communicate in a
multiprocessor system.
11. In mode 2, the baud rate depends only on
a) SMOD bit
b) SCON bit
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
c) Oscillator clock frequency
d) SMOD bit and oscillator clock frequency
View Answer
Answer: d
Explanation: In mode 2, the baud rate depends only on SMOD bit and oscillator clock frequency.
12. The mode that offers the most secured parity enabled data communication at lower baud rates
is
a) mode 2
b) mode 1
c) mode 0
d) all of the mentioned
View Answer
Answer: a
Explanation: The mode 3 offers the most secured parity enabled data communication at lower
baud rates of mode 1
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
10. The SMOD bit is used to
a) decrease the baud rate by 2
b) increase the baud rate by 4
c) increase the baud rate by 2
d) triple the baud rate
View Answer
Answer: c
Explanation: The SMOD bit is used to double the baud rate
Date-16/06/2021
Subject Name-KCS-403-Microprocessor_CSE-Semester 4
UNIT-1
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
a. 0030H
b. 0024H
c. 0048H
d. 0060H
Answer: (a).0030H
end of program
d. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
MROM
PROM
EPROM
EEPROM
Answer: (a).MROM
MROM
PROM
FROM
FPROM
Answer: (b).PROM
Answer: (b).Macro-operations
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
Micro-operations
Macro-operations
Multi-operations
Bi control-operations
Answer: (b).Macro-operations
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
incremented by one.
d. data processing with registers takes fewer cycles than that with memory
Answer: (d).data processing with registers takes fewer cycles than that with memory
b. A fetch cycle
12. The output data lines of microprocessor and memories are usually tristated
because
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
a. More than one device can transmit information over the data bus by enabling
only one device at a time
b. More than one device can transmit over the data bus at the same time
c. The data line can be multiplexed for both input and output
Answer: (a).More than one device can transmit information over the data bus by
enabling only one device at a time
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
The register which holds the information about the nature of results of
arithmetic and logic operations is called as
Accumulator
Flag register
a. 1, 2, 3 and 4
1, 2 and 3
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
d. 3 and 4 only
Both the ALU and control section of CPU employ which special purpose
storage location?
Buffers
Decoders
Accumulators
Registers
Answer: (c).Accumulators
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
all the registers and counters are being reset and this signal can be used to
reset external support chip
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
Answer: (c).all the registers and counters are being reset and this signal can be
used to reset external support chip
In a vector interrupt
The content of the A15-A8 (higher order address lines) while executing “IN
8-bit port address” instruction are
irrelevant
a. TRAP
b. RST 7.5
d. RST 6.5
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
CLR A
ORA A
SUB A
MOV A, 00H
Answer: (c).SUB A
23. signal prevent the microprocessor from reading the same data
more than one.
pipelining
handshaking
controlling
signaling
Answer: (b).handshaking
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
I/O port
input port
output port
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
d. multi port
a. +5V
-5V
-10V
d. +10V
Answer: (a).+5V
DMA technique
Microprocessor
Register
Decoder
Expansion of SPGA is .
P2
P4
P6
P8
Answer: (c).P6
The number of hardware chips needed for multiple digit display can be
minimized by using the technique called .
interfacing
multiplexing
demultiplexing
multiprocessing
Answer: (b).multiplexing
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
An RS-232 interface is .
a parallel interface
a serial interface
printer interface
a modem interface
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
medium voltage
higher voltage
lower voltage
interrupt is Masked
clock
signal bus
faster operation
37. In 8279 Status Word, data is read when pins are low, and write to
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
8-bit FIFO
8-byte FIFO
16 byte FIFO
16 bit FIFO
For the most Static RAM the write pulse width should be at least
10 ns
60 ns
300 ns
350 ns
Answer: (b).60 ns
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
Motorala
Intel
Stephen Mors
HCL
Answer: (b).Intel
bidirection
unidirection
mulidirection
Answer: (b).unidirection
circular
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
b. 45
c. 20
d. 35
Answer: (a).40
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
a. +5V
b. -5V
c. +12V
d. -12V
Answer: (a).+5V
Stack
Queue
Accumulator
Data register
Answer: (a).Stack
Pushing data
Pushed
Pulling
None of these
Pascal
Dennis Ritchie
Charles Babbage
Von Neumann
Compiler
Operating system
All of these
Auxiliary
Backup store
Both A and B
None of these
The lower red curvy arrow show that CPU places the address extracted
from the memory location on the_ .
Address bus
System bus
Control bus
Data bus
50. The CPU sends out a signal to indicate that valid data is available on
the data bus.
a. Read
b. Write
c. Both a and b
d. None of these
Answer: (b).Write
UNIT-2
3. In the instruction of the 8085 microprocessor, how many bytes are present?
a. One or two
b. One, two or three
c. One only
d. Two or three
Answer. b
4. Which one of the following addressing technique is not used in 8085
microprocessor?
a. Register
b. Immediate
c. Register indirect
d. Relative
Answer. d
5. Which one of the following register of 8085 microprocessor is not a part of the
programming model?
a. Instruction register
b. Memory address register
c. Status register
d. Temporary data register
Answer. c
6. The program counter in 8085 microprocessor is a 16-bit register, because
a. It counts 16 bits at a time
b. There are 16 address times
c. It facilitates the users storing 16-bit data temporarily
d. It has to fetch two 8-bit data at a time.
Answer. b
7. A direct memory access (DMA) transfer replies
a. Direct transfer of data between memory and accumulator
b. Direct transfer of data between memory and I/O devices without the use of
microprocessor
c. Transfer of data exclusively within microprocessor registers
d. A fast transfer of data between microprocessor and I/O devices
Answer. b
8. Handshaking mode of data transfer is
a. Synchronous data transfer
b. asynchronous data transfer
c. interrupt driven data transfer
d. level Mode of DMA data transfer
Answer. a
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
a. Micro-operations
b. Macro-operations
c. Multi-operations
d. Bi control-operations
Answer. c
27. Consider the following registers:
1. Accumulator and flag register
2. B and C registers
3. D and E registers
4. H and L registers
Which of these 8-bit registers of 8085 μP can be paired together to make a 16-bit
register?
a. (a) 1, 3 and 4
b. 2, 3 and 4
c. 1, 2 and 3
d. 1, 2 and 4
Answer. b
28. The first microprocessor to include virtual memory in the Intel
microprocessor family is
a. 80286
b. 80386
c. 80486
d. Pentium
Answer. a
29. Program counter in a digital computer
a. counts the numbers of programs run in the machine ,
b. counts the number of times a subroutine is called
c. counts the number of times the loops are executed
d. points the memory address of the current or the next instruction to be
executed
Answer
Answer. d
30. Assuming LSB is at position 0 and MSB at position 7, which bit positions are
not used (undefined) in Flag Register of an 8085 microprocessor?
a. 1, 3, 5
b. 2, 3, 5
c. 1, 2, 5
d. 1, 3, 4
Answer. a
31. At the beginning of a fetch cycle, the contents of the program counter are
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
a. incremented by one
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
c. T3 and T4
d. T4 and T1
Answer. c
37. Which one of the following circuits transmits two messages simultaneously in
one direction?
a. Duplex
b. Diplex
c. Simplex
d. Quadruplex
Answer. b
38. A microprocessor is ALU
a. and control unit on a single chip
b. and memory on a single chip
c. register unit and I/O device on a single chip
d. register unit and control unit on a single chip
Answer. d
39. In Intel 8085 microprocessor, ALE signal is made high to
a. Enable the data bus to be used as low order address bus
b. To latch data D0— D7 from the data bus
c. To disable data bus
d. To achieve all the functions listed above
Answer. a
40. Output of the assembler in machine codes is referred to as
a. Object program
b. Source program
c. Macro instruction
d. Symbolic addressing
Answer. a
41. Which one of the following statements for Intel 8085 is correct?
a. Program counter (PC) specifies the address of the instruction last executed
b. PC specifies the address of the instruction being executed
c. PC specifies the address of the instruction be executed
d. PC specifies the number of instruction executed so far
Answer. c
42. The instruction RET executes with the following series of machine cycle
a. Fetch, read, write
b. Fetch, write, write
c. Fetch, read, read
d. Fetch, read
Answer. c
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
43. Which one of the following statements is correct regarding the instruction
CMP A?
a. Compare accumulator with register A
b. Compare accumulator with memory
c. Compare accumulator with register H
d. This instruction does not exist
Answer. a
44. The instruction JNC 16-bit refers to jump to 16-bit address if
a. Sign flag is set
b. Carry flag is reset
c. Zero flag is set
d. Parity flag is reset
Answer. b
45. Consider the following interrupts for 8085 microprocessor:
1. INTR
2. RST 5.5
3. RST 6.5
4. RST 7.5
5. TRAP
If the interrupt is to be vectored to any memory location then which of the above
interrupt is/are correct?
a. 1 and 2 only
b. 1, 2, 3 and 4
c. 5 only
d. 1 only
Answer. d
46. Consider the following statements:
1. Auxiliary carry flag is used only by the DAA and DAS instruction.
2. Zero flag is set to 1 if the two operands compared are equal.
3. All conditional jumps are long type jumps.
Which of the above statements are correct?
a. 1, 2 and 3 only
b. 1 and 2 only
c. 1 and 3 only
d. 2 and 3 only
Answer. b
47. Among the given instructions, the one which affects maximum number of
flags is
a. RAL
b. POP PSW
c. XRA A
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
d. DCR A
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
Answer. c
48. XCHG instruction of 8085 exchanges the content of
a. top of stack with contents of register pair
b. BC and DE register pairs
c. HL and DE register pairs
d. None of the above
Answer. c
49. Direction flag is used with
a. String instructions
b. Stack instructions
c. Arithmetic instructions
d. Branch instructions
Answer. a
50. What will be the contents of DE and HL register pairs respectively after the
execution of the following instructions?
LXIH, 2500 H
LXID, 0200 H
DAD D
XCHG
a. 0200 H, 2500 H
b. 0200 H, 2700 H
c. 2500 H, 0200 H
d. 2700 H, 0200 H
Answer. d
UNIT-3
a.
the memory address as the instruction that is to be executed next.
b.
the memory address of the instruction that is being currently matched.
c.
the total number of instructions in the program being executed.
d.
the number of instructions in the current program that have already been
executed.
Answer. a
54. Which of the following data transfer is not possible in microprocessor?
a. Memory to accumulator
b. Accumulator to memory
c. Memory to memory
d. I/O device to accumulator
Answer. c
55. LOADER is a program that
a. loads the memories and generates a hex file
b. loads the hex file and converts to the executable file
c. loads the COM file and generates the binary code
d. loads English like command and generates the binary code
Answer. b
56. Which of the following instructions is closest match to the instruction POP
PC?
a. RET
b. PCHL
c. POP PSW
d. DAD SP
Answer. a
57. How many machine cycles are required by STA instruction?
a. 2
b. 3
c. 4
d. 5
Answer. c
58. Which of the following 8085 instruction will require maximum T-states for
execution?
a. XRI byte
b. STA address
c. CALL address
d. JMP address
Answer. c
59. In 8085 microprocessor, which mode of addressing does the instruction CMP
M use?
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
a. Direct addressing
b. Register addressing
c. Indirect addressing
d. Immediate addressing
Answer. c
60. With reference to 8085 microprocessor, which of the following statements
are correct?
1. INR is 1 byte instruction
2. OUT is 2 byte instruction
3. STA is 3 byte instruction
a. 1 and 2 only
b. 2 and 3 only
c. 1 and 3 only
d. 1, 2 and 3
Answer. d
61. Assume that the accumulator and the register C of 8085 microprocessor
contain respectively F0 H
and OF H initially. What will be the content of accumulator after execution of
instruction ADD C?
a. 00 H
b. FF H
c. EF H
d. FE H
Answer. b
62. It is desired to multiply the numbers 0A H by OB H and store the result in the
accumulator. The numbers are available in registers B and C respectively. A part
of the 8085 program for this purpose is given below:
MVI A, OO H
Loop; ………..
………..
………..
HLT END
The sequence of instruction to complete the program would be
a. JNZ LOOP; ADD B, DCR C
63. Find the content of the accumulator after the execution of the following
program:
MVI A, F0 H
ORI FF H
XRI F0 H
a. 00 H
b. F0 H
c. 0F H
d. FF H
Answer. c
64. The following program starts at location 0100 H
LXI SP, 00FF
LXI H, 0701 H
MVI A, 20 H
SUB M
The content of accumulator when the program counter reaches 0107 H is
a. 20 H
b. 02 H
c. 00 H
d. FF H
Answer. c
65. The difference between 8085 instructions RST n and PCHL is
a. RST n is equivalent to a sub-routine call while PCHL is equivalent to
unconditional branch.
b. RST n uses direct addressing while PCHL uses register indirect addressing.
c. RST n is a software interrupt while PCHL simulates a hardware interrupt
d. RST n resets the processor while PCHL restarts the processor.
Answer. a
66. The content of accumulator are 70 H. Initially all flags are zero. What will be
values of CY and S after executing instruction RLC?
a. CY = 0 and S = 0
b. CY = 1 and S = 1
c. CY = 1 and S = 0
d. CY = 0 and S = 1
Answer. d
67. A software delay subroutine is written as given below:
DELAY: MVI H, 255D H
MVI L, 255D H
LOOP: DCR L
JNZ LOOP
DCR H
JNZ LOOP
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
a 255
. 510
b
c. 650
. 652
d 25
. 79d
Answer.
68. What is content of accumulator of 8085 microprocessor after the execution of
XRI F0 H instruction?
a. Only the upper nibble of accumulator is complemented
b. Only the lower nibble is complemented
c. Only the upper nibble is reset to zero
d. Only the lower nibble is reset to zero
Answer. a
69. The 8085 programming manual says that it takes seven T states to fetch and
execute the MOV instruction. If the system clock has a frequency of 2.5 MHz, how
long is an instruction Cycle?
a. 2.8 s
b. 2.5ns
c. 2.8 ns
d. 2.8 μs
Answer. d
70. The instruction PCHL, in 8085 is used for
a. STA address
b. LDAX B
c. LHLD address
d. LDA address
Answer. a
72. The instruction that exchanges top of stack with HL pair is
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
a. XTHL
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
b. SPHL
c. PUSH H
d. POP H
Answer. a
73. In 8085 microprocessor, during PUSH PSW Operation, Stack pointer is
a. Decremented by one
b. Decremented by two
c. Incremented by one
d. Incremented by two
Answer. b
74. While a program is being executed in an Intel 8085 microprocessor, the
program counter of the microprocessor contains:
a. The memory address of the instruction that is being currently executed.
b. The memory address of the instruction that is to be executed next.
c. The number of instructions that have already been executed.
d. The total number of instructions in the current program still to be
executed.
Answer. b
75. The description of a program counter (PC) in 8085 microprocessor is
a. An up/down counter
b. An 8-bit register
c. Initialized automatically by microprocessor
d. Used to point to stack memory area
Answer. c
76. If the status of the control lines SI and SO is LOW, then 8085 microprocessor
is performing
a. Reset operation
b. HOLD operation
c. Halt operation
d. Interrupt acknowledge
Answer. c
77. LXI SP, 7FFF H
MVI A, 25 H
XRI 02 H
PUSH PSW
POP H
MOV A,L
ORI 10 H
HLT
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
What are the contents of A, H, L, SP and PSW registers after executing the above
set of instructions? Assume undefined flags always remain clear.
a. 10H, 25H, 00H, 7FFFH, 00H respectively
b. 14H, 27H, 04H, 7FFFH, 04H respectively
c. 14H, 25H, 00H. 7FFFH, 04H respectively
d. 10H, 27H, 04H, 7FFFH, 00H respectively
Answer. b
78. The content of the programme counter of an 8085 microprocessor is
a. the total number of instructions in the program already executed.
a. ADI
b. ACI
c. ADC
d. ADD
Answer. b
80. MVI A, AA H
ORI FFH
RRC
RRC
CMC
INR A
What are the contents of A and PSW registers after executing the above set of
instructions in sequence?
a. AAH and 00H
b. FFH and 66H
c. 00H and 54H
d. 00H and 00H
Answer. c
81. For which one of the following, the instruction XRA A in 8085 microprocessor
can be used?
a. Set the carry flag
b. Set the zero flag
c. Reset the carry flag and clear the accumulator
d. Transfer FFH to the accumulator
Answer. b
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
Answer. b
85. When the operand requires for instruction is stored inside the processor, then
What this addressing mode is called?
a. Direct
b. Register
c. Implicit
d. Immediate
Answer. b
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
86. Which one of the following addressing technique is not used in 8085
microprocessor?
a. Register
b. Immediate
c. Register indirect
d. Relative
Answer. d
87. In an instruction of 8085 microprocessor, how many bytes are present?
One or two
One, two or three
One only
Two or three
Answer. b
Which one is the indirect addressing mode in the following instructions?
LXI H 2050 H
MOV A, B
LDAX B
LDA 2050 H
Answer. c
The addressing mode used in the instruction JMP F347 H in case of an Intel
8085A microprocessor is which one of the following?
Direct
Register—indirect
Implicit
Immediate
Answer. d
Carry flag is not affected after the execution of
a. ADD B
b. SBB B
c. INR B
d. ORA B
Answer. c
91. The contents of the Program Counter (PC), when the microprocessor is
reading from 2FFF H memory location, will be
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
a. 2FFE H
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
b. 2FFF H
c. 3000 H
d. 3001 H
Answer. c
92. If the HLT instruction of an Intel 8085A microprocessor is executed
a. the microprocessor is disconnected from the system bus till the RESET is
pressed.
b. the microprocessor halts the execution of the program and returns to the
monitor.
c. the microprocessor enters into a HALT state and the buses are tri-stated.
d. the microprocessor reloads the program counter from the locations 0024 H
and 0025 H.
Answer. c
93. The stack pointer of an 8085 A microprocessor contains ABCD H.
PUSH PSW
XTHL
PUSH D
JMP EC75 H
At the end of the execution of the above instructions, what would be the content
of the stack pointer?
a. ABCB H
b. ABCA H
c. ABC9 H
d. ABC8 H
Answer. c
94. In an Intel 8085 A, what is the content of the Instruction Register (IR)?
Answer. c
96. Which one of the following statement does not describe
property/characteristic of a stack pointer register in 8085 microprocessor?
MVI A
LDAX B
JMP 2050 H
MOV A,M
Answer. c
In 8085, the DAA instruction is used for
UNIT-4
ANS: B
ANS: C
ANS: C
4) How many memory locations are required to store the instruction LXIH,
0800H in an 8085 assembly language program?
A) 1
B) 2
C) 3
D) 4
ANS: B
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
5) The instruction DEC N inform the assembler to....
A) Decrement the content of N
B) Decrement the data addressed by N
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
ANS: A
6) In 8085 microprocessor, the value of the most significant bit of the result
following the execution of any arithmetic or Boolean instruction is stored in
the
A) carry status flag
B) auxiliary carry status flag
C) sign status flag
D) zero status flag
ANS: C
ANS: B
ANS: C
Answer: c
Clarification: An assembler is a software used to convert the programs into
machine instructions.
12) The instructions like MOV or ADD are called as _
a) OP-Code
b) Operators
c) Commands
d) None of the mentioned
Answer: a
Clarification: This OP – codes tell the system what operation to perform on the
operands.
13) The alternate way of writing the instruction, ADD #5,R1 is
a) ADD [5],[R1];
b) ADDI 5,R1;
c) ADDIME 5,[R1];
d) There is no other way
Answer: b
Clarification: The ADDI instruction, means the addition is in immediate
addressing mode.
14) Instructions which won’t appear in the object program are called as
a) Redundant instructions
b) Exceptions
c) Comments
d) Assembler Directives
Answer: d
Clarification: The directives help the program in getting compiled and hence
won’t be there in the object code.
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
15) The assembler directive EQU, when used in the instruction: Sum EQU
200 does
a) Finds the first occurrence of Sum and assigns value 200 to it
b) Replaces every occurrence of Sum with 200
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
Answer: b
Clarification: This basically is used to replace the variable with a constant value.
16) The purpose of the ORIGIN directive is
a) To indicate the starting position in memory, where the program block is
to be stored
b) To indicate the starting of the computation code
c) To indicate the purpose of the code
d) To list the locations of all the registers used
Answer: a
Clarification: This does the function similar to the main statement.
17) The directive used to perform initialization before the execution of
the code is
a) Reserve
b) Store
c) Dataword
d) EQU
Answer: c
Clarification: None.
18) directive is used to specify and assign the memory required for
the block of code.
a) Allocate
b) Assign
c) Set
d) Reserve
Answer: d
Clarification: This instruction is used to allocate a block of memory and to store
the object code of the program there.
19) directive specifies the end of execution of a program.
a) End
b) Return
c) Stop
d) Terminate
Answer: b
Clarification: This instruction directive is used to terminate the program
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
execution.
20) The last statement of the source program should be
a) Stop
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
b) Return
c) OP
d) End
Answer: d
Clarification: This enables the processor to load some other process.
21) When dealing with the branching code the assembler
a) Replaces the target with its address
b) Does not replace until the test condition is satisfied
c) Finds the Branch offset and replaces the Branch target with it
d) Replaces the target with the value specified by the DATAWORD directive
Answer: c
Clarification: When the assembler comes across the branch code, it immediately
finds the branch offset and replaces it with it.
22) The assembler stores all the names and their corresponding values in
Answer: b
Clarification: The table where the assembler stores the variable names along with
their corresponding memory locations and values.
23) The assembler stores the object code in
a) Main memory
b) Cache
c) RAM
d) Magnetic disk
Answer: d
Clarification: After compiling the object code, the assembler stores it in the
magnetic disk and waits for further execution.
24) The utility program used to bring the object code into memory for
execution is
a) Loader
b) Fetcher
c) Extractor
d) Linker
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
Answer: a
Clarification: The program is used to load the program into memory.
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
Answer: d
Clarification: This creates entries into the symbol table first and then creates the
object code.
26) In 8085 microprocessor, the address for ‘TRAP’ interrupt is
a. 0024 H
b. 002C H
c. 0034 H
d. 003C H
Answer. a
27) A ‘DAD H” instruction is the same as shifting each bit by one position
to the
a. left
b. right
c. left with a zero inserted in LSB position
d. right with a zero inserted in LSB position
Answer. c
28) When a program is being executed in an 8085 microprocessor, its
program counter contains
a. the memory address as the instruction that is to be executed next.
b. the memory address of the instruction that is being currently matched.
c. the total number of instructions in the program being executed.
d. the number of instructions in the current program that have already been
executed.
Answer. a
29) Which of the following data transfer is not possible in
microprocessor?
a. Memory to accumulator
b. Accumulator to memory
c. Memory to memory
d. I/O device to accumulator
Answer. c
30) LOADER is a program that
a. loads the memories and generates a hex file
b. loads the hex file and converts to the executable file
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
c. loads the COM file and generates the binary code
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
a. 20 H
b. 02 H
c. 00 H
d. FF H
Answer. c
40) The difference between 8085 instructions RST n and PCHL is
a. RST n is equivalent to a sub-routine call while PCHL is equivalent to
unconditional branch.
b. RST n uses direct addressing while PCHL uses register indirect addressing.
c. RST n is a software interrupt while PCHL simulates a hardware interrupt
d. RST n resets the processor while PCHL restarts the processor.
Answer. a
41) The content of accumulator are 70 H. Initially all flags are zero. What
will be values of CY and S after executing instruction RLC?
a. CY = 0 and S = 0
b. CY = 1 and S = 1
c. CY = 1 and S = 0
d. CY = 0 and S = 1
Answer. d
42) A software delay subroutine is written as given below:
DELAY: MVI H, 255D H
MVI L, 255D H
LOOP: DCR L
JNZ LOOP
DCR H
JNZ LOOP
How many times DCR instruction will be executed?
a. 255
b. 510
c. 65025
d. 65279
Answer. d
43) What is content of accumulator of 8085 microprocessor after the
execution of XRI F0 H instruction?
a. Only the upper nibble of accumulator is complemented
b. Only the lower nibble is complemented
c. Only the upper nibble is reset to zero
d. Only the lower nibble is reset to zero
Answer. a
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
44) The 8085 programming manual says that it takes seven T states to
fetch and execute the MOV instruction. If the system clock has a frequency
of 2.5 MHz, how long is an instruction Cycle?
a. 2.8 s
b. 2.5ns
c. 2.8 ns
d. 2.8 μs
Answer. d
45) The instruction PCHL, in 8085 is used for
a. STA address
b. LDAX B
c. LHLD address
d. LDA address
Answer. a
47) The instruction that exchanges top of stack with HL pair is
a. XTHL
b. SPHL
c. PUSH H
d. POP H
Answer. a
48) In 8085 microprocessor, during PUSH PSW Operation, Stack pointer
is
a. Decremented by one
b. Decremented by two
c. Incremented by one
d. Incremented by two
Answer. b
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
49) While a program is being executed in an Intel 8085 microprocessor,
the program counter of the microprocessor contains:
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
UNIT-5
1. The block of 8237 that decodes the various commands given to the 8237 by the
CPU is
a) timing and control block
b) program command control block
c) priority block
d) none of the mentioned
Answer: b
Explanation: The program control block decodes various commands given to the
8237 by the CPU before servicing a DMA request.
2. The priority between the DMA channels requesting the services can be
resolved by
a) timing and control block
b) program command control block
c) priority block
d) none of the mentioned
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
Answer: c
Explanation: The priority encoder block resolves the priority between the DMA
channels requesting the services.
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
Answer: b
Explanation: The current address register holds the current memory address. The
current address register is accessed during the DMA transfer.
4. The register that holds the data byte transfers to be carried out is
a) current word register
b) current address register
c) base address register
d) command register
Answer: a
Explanation: The current word register is a 16-bit register that holds the data
transfers. The word count is decremented after each transfer, and the new value
is stored again in the register.
5. When the count becomes zero in the current word register then
a) Input signal is enabled
b) Output signal is enabled
c) EOP (end of process) is generated
d) Start of process is generated
Answer: c
Explanation: When the count becomes zero, the EOP signal is generated. This can
be written in successive bytes by the CPU, in program mode.
Answer: c
Explanation: The contents of base address register cannot be read by the CPU.
These contents are used internally for auto-initialization.
8. The register that maintains an original copy of the respective initial current
address register and current word register is
a) mode register
b) base address register
c) command register
d) mask register
Answer: b
Explanation: The base address register maintains an original copy of the current
address register and current word register, before incrementing or
decrementing.
Answer: d
Explanation: The address is automatically incremented or decremented after
each DMA transfer, and the resulting address value is again stored in the current
address register.
Answer: d
Explanation: Memory read, memory write and verify transfer are the three types
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
of DMA transfer.
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
a. 24
b. 20
c. 32
d. 40
Answer: d. 40
Question 2: In which mode do all the Ports of the 8255 PPI work as Input-Output
units for data transfer?
a. BSR mode
b. Mode 0 of I/O mode
c. Mode 1 of I/O mode
d. Mode 2 of I/O mode
Question 3: Which of the following pins are responsible for handling the on the
Read Write control logic unit of the 8255 PPI?
a. CS'
b. RD'
c. WR'
d. ALL of the above
a. BSR mode
b. Mode 0 of I/O mode
c. Mode 1 of I/O mode
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
d. Mode 2 of I/O mode
Question 5: How many bits of data can be transferred between the 8255 PPI and
the interfaced device at a time? or What is the size of internal bus of the 8255
PPI?
a. 16 bits
b. 12 bits
c. 8 bits
d. None of the above
Answer: c. 8 bits
Question 6: Which port of the 8255 PPI is capable of performing the handshaking
function with the interfaced devices?
a. Port A
b. Port B
c. Port C
d. All of the above
Answer: c. Port C
Question 7: In which of the following modes of the 8255 PPI, only port C is taken
into consideration?
a. BSR mode
b. Mode 0 of I/O mode
c. Mode 1 of I/O mode
d. Mode 2 of I/O mode
Question 8: In mode 2 of I/O mode, which of the following ports are capable of
transferring the data in both the directions?
a. Port A
b. Port B
c. Port C
d. All of the above
Answer: a. Port A
Question 9: In which of the following modes we do not consider the D6, D5 and
D4 bits of the control word?
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
a. BSR mode
b. Mode 0 of I/O mode
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
Question 10: How many data lines in total are there in the 8255 PPI IC?
a. 8 data lines
b. 32 data lines
c. 24 data lines
d. None of the above
1. The number of counters that are present in the programmable timer device
8254 is
a) 1
b) 2
c) 3
d) 4
Answer: c
Explanation: There are three counters that can be used as either counters or
delay generators.
Answer: b
Explanation: The control word register can only be written and cannot be read.
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
3. The mode that is used to interrupt the processor by setting a suitable terminal
count is
a) mode 0
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
b) mode 1
c) mode 2
d) mode 3
Answer: a
Explanation: Mode 0 is also called as an interrupt on the terminal count.
4. In mode 2, if N is loaded as the count value, then after (N-1) cycles, the output
becomes low for
a) 1 clock cycle
b) 2 clock cycles
c) 3 clock cycles
d) 4 clock cycles
Answer: a
Explanation: After (N-1) cycles, the output becomes low for only 1 clockcycle. If
the count N is reloaded and again the output becomes high and remains so for (N-
1) clock pulses.
Answer: c
Explanation: When the count N loaded is even, then for half of the count, the
output remains high and for the remaining half it remains low. If the count loaded
is odd, the first clock pulse decrements it by 1 resulting in an even count value.
6. In control word register, if SC1=0 and SC0=1, then the counter selected is
a) counter 0
b) counter 1
c) counter 2
d) none
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
Answer: b
Explanation: SC denotes select counter.
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
Answer: c
Explanation: To access 16 bit, first LSB is loaded first, and then MSB.
Answer: b
Explanation: If BCD=0 then hexadecimal count. If BCD=1, then the operation is
BCD count.
Answer: b
Explanation: If the GATE signal is enabled, then the counter starts counting.
Answer: d
Explanation: The control word register contents are used for
i) initializing the operating modes (mode 0-mode 4)
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
ii) selection of counters (counter0-counter2)
iii) choosing binary or BCD counters
iv) loading of the counter registers.
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
Answer: c
Explanation: The processor 8085 has five hardware interrupt pins. Out of these
five, four pins were alloted fixed vector addresses but the pin INTR was not
alloted by vector address, rather an external device was supposed to hand over
the type of the interrupt to the microprocessor.
2. The register that stores all the interrupt requests in it in order to serve them
one by one on a priority basis is
a) Interrupt Request Register
b) In-Service Register
c) Priority resolver
d) Interrupt Mask Register
Answer: a
Explanation: The interrupts at IRQ input lines are handled by Interrupt Request
Register internally.
3. The register that stores the bits required to mask the interrupt inputs is
a) In-service register
b) Priority resolver
c) Interrupt Mask register
d) None
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
Answer: c
Explanation: Also, Interrupt Mask Register operates on IRR(Interrupt Request
Register) at the direction of the Priority Resolver.
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
Answer: d
Explanation: The interrupt control logic performs all the operations that are
involved within the interrupts like accepting and managing interrupt
acknowledge signals, interrupts.
Answer: d
Explanation: A single 8259A provides 8 vectored interrupts. In cascade mode, 64
vectored interrupts can be provided.
6. When the PS(active low)/EN(active low) pin of 8259A used in buffered mode,
then it can be used as a
a) input to designate chip is master or slave
b) buffer enable
c) buffer disable
d) none
Answer: b
Explanation: When the pin is used in buffered mode, then it can be used as a
buffer enable to control buffer transreceivers. If it is not used in buffered mode,
then the pin is used as input to designate whether the chip is used as a master or
a slave.
Answer: b
Explanation: When non-specific EOI command is issued to 8259A it will
automatically reset the highest ISR.
9. In the application where all the interrupting devices are of equal priority, the
mode used is
a) Automatic rotation
b) Automatic EOI mode
c) Specific rotation
d) EOI
Answer: a
Explanation: The automatic rotation is used in the applications where all the
interrupting devices are of equal priority.
Answer: c
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
Explanation: Basically, there are three modes of data transmission. simplex,
duplex and half duplex.
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
Answer: a
Explanation: In simplex mode, the data transmission is unidirectional. For
example, a CPU may transmit data for a CRT display unit in this mode.
3. If the data transmission takes place in either direction, but at a time data may
be transmitted only in one direction then, it is of
a) simplex mode
b) duplex mode
c) semi duplex mode
d) half duplex mode
Answer: d
Explanation: In half duplex mode, data transmission is bidirectional but not at a
time. For example, Walkie-Talkie.
4. In 8251A, the pin that controls the rate at which the character is to be
transmitted is
a) TXC(active low)
b) TXC(active high)
c) TXD(active low)
d) RXC(active low)
Answer: a
Explanation: Transmitter Clock Input (TXC(active low)) is a pin that controls the
rate at which the character is to be transmitted.
transmitted data bits along with other information like start bits, stop bits and
parity bits etc.
6. The signal that may be used either to interrupt the CPU or polled by the CPU is
a) TXRDY(Transmitter ready)
b) RXRDY(Receiver ready output)
c) DSR(active low)
d) DTR(active low)
Answer: b
Explanation: RXRDY(Receiver ready output) may be used either to interrupt the
CPU or polled by the CPU.
Answer: d
Explanation: RS232C has been used for long and has a few disadvantages like
limited speed of communication, high-voltage level signaling and big-size
communication adapters.
Answer: d
Explanation: The USB standards support the signaling rates. Also, USB signaling is
implemented in a differential in low- and full-speed options.
9. The bit packet that commands the device either to receive data or transmit
data in transmission of USB asynchronous communication is
a) Handshake packet
b) Token packet
c) PRE packet
d) Data packet
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
Answer: b
Explanation: The token packet is the second type of packet which commands the device
either to receive data or transmit data.
Answer: c
Explanation: PRE packets are only of importance to low-speed USB devices
1
. Which is the microprocessor comprises:
A. Register section
B. One or more ALU
C. Control unit
D. All of these
D. All of these
2
. What is the store by register?
A. data
B. operands
C. memory
D. None of these
A. data
Allenhouse Institute of Technology (UPTU Code : 505)
3
Rooma, Kanpur – 208 008
. Accumulator based microprocessor example are:
A. Intel 8085
B. Motorola 6809
C. A and B
D. None of these
C. A and B
4
. A set of register which contain are:
A. data
B. memory addresses
C. result
D. all of these
D. all of these
5
. There are primarily two types of register:
A. general purpose register
B. dedicated register
C. A and B
D. none of these
C. A and B
6
. Name of typical dedicated register is:
A. PC
B. IR
C. SP
D. All of these
D. All of these
7
. BCD stands for:
A. Binary coded decimal
B. Binary coded decoded
C. Both a & b
D. none of these
A. Binary coded decimal
Allenhouse Institute of Technology (UPTU Code : 505)
8
Rooma, Kanpur – 208 008
. Which is used to store critical pieces of data during subroutines and interrupts:
A. Stack
B. Queue
C. Accumulator
D. Data register
A. Stack
9
. The data in the stack is called:
A. Pushing data
B. Pushed
C. Pulling
D. None of these
A. Pushing data
10
. The external system bus architecture is created using from ______ architecture:
A. Pascal
B. Dennis Ritchie
C. Charles Babbage
D. Von Neumann
D. Von Neumann
This section contains more frequently asked Microprocessors 8085 Multiple Choice Questions
and Answers in the various University Level and Competitive Examinations.
1
. The processor 80386/80486 and the Pentium processor uses _____ bits address bus:
A. 16
B. 32
C. 36
D. 64
B. 32
2
. Which is not the control bus signal:
A. READ
B. WRITE
C. RESET
Allenhouse Institute of Technology (UPTU Code : 505)
D. None of these
Rooma, Kanpur – 208 008
C. RESET
3
. PROM stands for:
A. Programmable read‐only memory
B. Programmable read write memory
C. Programmer read and write memory
D. None of these
A. Programmable read‐only memory
4
. EPROM stands for:
A. Erasable Programmable read‐only memory
B. Electrically Programmable read write memory
C. Electrically Programmable read‐only memory
D. None of these
A. Erasable Programmable read‐only memory
5
. Which is the type of microcomputer memory:
A. Address
B. Contents
C. Both A and B
D. None of these
C. Both A and B
6
. Secondary memory can store____:
A. Program store code
B. Compiler
C. Operating system
D. All of these
D. All of these
7
. Secondary memory is also called____:
A. Auxiliary
B. Backup store
C. Both A and B
D. None of these
C. Both A and B
8
. Customized ROMS are called:
Allenhouse Institute of Technology (UPTU Code : 505)
A. Mask ROM
Rooma, Kanpur – 208 008
B. Flash ROM
C. EPROM
D. None of these
A. Mask ROM
9
. The RAM which is created using bipolar transistors is called:
A. Dynamic RAM
B. Static RAM
C. Permanent RAM
D. DDR RAM
B. Static RAM
10
. Each memory location has:
A. Address
B. Contents
C. Both A and B
D. None of these
C. Both A and B
PROGRAMMING
JAVA NETWORKING
MCQ SETS
ONLINE TESTS
QUE AND ANS
BOOKS
Microprocessors MCQs Set-3
A+
A
A-
This section contains more frequently asked Microprocessors 8085 Questions and
Answers in the various University Level and Competitive Examinations.
1
. Which type of RAM needs regular referred:
A. Dynamic RAM
B. Static RAM
C. Permanent RAM
D. SD RAM
Allenhouse Institute of Technology (UPTU Code : 505)
A. Dynamic RAM
Rooma, Kanpur – 208 008
2
. Which RAM is created using MOS transistors:
A. Dynamic RAM
B. Static RAM
C. Permanent RAM
D. SD RAM
A. Dynamic RAM
3
. A microprocessor retries instructions from :
A. Control memory
B. Cache memory
C. Main memory
D. Virtual memory
C. Main memory
4
. The lower red curvy arrow show that CPU places the address extracted from the memory
location on the_____:
A. Address bus
B. System bus
C. Control bus
D. Data bus
A. Address bus
5
. The CPU sends out a ____ signal to indicate that valid data is available on the data bus:
A. Read
B. Write
C. Both A and B
D. None of these
B. Write
6
. The CPU removes the ___ signal to complete the memory write operation:
A. Read
B. Write
C. Both A and B
Allenhouse Institute of Technology (UPTU Code : 505)
D. None of these
Rooma, Kanpur – 208 008
A. Read
7
. BIU STAND FOR:
A. Bus interface unit
B. Bess interface unit
C. A and B
D. None of these
A. Bus interface unit
8
. EU STAND FOR:
A. Execution unit
B. Execute unit
C. Exchange unit
D. None of these
A. Execution unit
9
. Which are the four categories of registers:
A. General‐ purpose register
B. Pointer or index registers
C. Segment registers
D. Other register
E. All of these
E. All of these
10
. Eight of the register are known as:
A. General‐ purpose register
B. Pointer or index registers
C. Segment registers
D. Other register
A. General‐ purpose register
1
. The four index register can be used for:
A. Arithmetic operation
B. Multipulation operation
Allenhouse Institute of Technology (UPTU Code : 505)
C. Subtraction operation
Rooma, Kanpur – 208 008
D. All of these
A. Arithmetic operation
2
. IP Stand for:
A. Instruction pointer
B. Instruction purpose
C. Instruction paints
D. None of these
A. Instruction pointer
3
. CS Stand for:
A. Code segment
B. Coot segment
C. Cost segment
D. Counter segment
A. Code segment
4
. DS Stand for:
A. Data segment
B. Direct segment
C. Declare segment
D. Divide segment
A. Data segment
5
. Which are the segment:
A. CS: Code segment
B. DS: data segment
C. SS: Stack segment
D. ES:extra segment
E. All of these
E. All of these
6
. The acculatator is 16 bit wide and is called:
A. AX
B. AH
C. AL
D. DL
A. AX
Allenhouse Institute of Technology (UPTU Code : 505)
7
Rooma, Kanpur – 208 008
. How many bits the instruction pointer is wide:
A. 16 bit
B. 32 bit
C. 64 bit
D. 128 bit
A. 16 bit
8
. How many type of addressing in memory:
A. Logical address
B. Physical address
C. Both A and B
D. None of these
C. Both A and B
9
. The size of each segment in 8086 is:
A. 64 kb
B. 24 kb
C. 50 kb
D. 16kb
A. 64 kb
10
. The _______ address of a memory is a 20 bit address for the 8086 microprocessor:
A. Physical
B. Logical
C. Both
D. None of these
A. Physical
. EA stand for:
A. Effective address
B. Electrical address
C. Effect address
D. None of these
A. Effective address
2
. BP stand for:
A. Bit pointer
B. Base pointer
C. Bus pointer
Allenhouse Institute of Technology (UPTU Code : 505)
D. Byte pointer
Rooma, Kanpur – 208 008
B. Base pointer
3
. DI stand for:
A. Destination index
B. Defect index
C. Definition index
D. Delete index
A. Destination index
4
. SI stand for:
A. Stand index
B. Source index
C. Segment index
D. Simple index
B. Source index
5
. ALE stand for:
A. Address latch enable
B. Address light enable
C. Address lower enable
D. Address last enable
A. Address latch enable
6
. NMI stand for:
A. Non mask able interrupt
B. Non mistake interrupt
C. Both
D. None of these
A. Non mask able interrupt
7
. ________ is the most important segment and it contains the actual assembly language instruction
to be executed by the microprocessor:
A. Data segment
B. Code segment
C. Stack segment
D. Extra segment
B. Code segment
8
Allenhouse Institute of Technology (UPTU Code : 505)
. The offset of a particular segment varies from _________:
Rooma, Kanpur – 208 008
A. 000H to FFFH
B. 0000H to FFFFH
C. 00H to FFH
D. 00000H to FFFFFH
B. 0000H to FFFFH
9
. The pin configuration of 8086 is available in the________:
A. 40 pin
B. 50 pin
C. 30 pin
D. 20 pin
A. 40 pin
10
. DIP stand for:
A. Deal inline package
B. Dual inline package
C. Direct inline package
D. Digital inline package
B. Dual inline package
This section contains more frequently asked Microprocessors Questions and Answers in the
various University Level and Competitive Examinations.
1
. Which are the factor of cache memory:
A. Architecture of the microprocessor
B. Properties of the programs being executed
C. ize organization of the cache
D. All of these
D. All of these
2
. ________ is usually the first level of memory access by the microprocessor:
A. Cache memory
B. Data memory
C. Main memory
D. All of these
A. Cache memory
Allenhouse Institute of Technology (UPTU Code : 505)
3
Rooma, Kanpur – 208 008
. Which is the small amount of high‐ speed memory used to work directly with the microprocessor:
A. Cache
B. Case
C. Cost
D. Coos
A. Cache
4
. The cache usually gets its data from the_________ whenever the instruction or data is required
by the CPU:
A. Main memory
B. Case memory
C. Cache memory
D. All of these
A. Main memory
5
. Microprocessor reference that are available in the cache are called______:
A. Cache hits
B. Cache line
C. Cache memory
D. All of these
A. Cache hits
6
. Microprocessor reference that are not available in the cache are called_________:
A. Cache hits
B. Cache line
C. Cache misses
D. Cache memory
C. Cache misses
7
. Which causes the microprocessor to immediately terminate its present activity:
A. RESET signal
B. INTERUPT signal
C. Both
D. None of these
A. RESET signal
8
. Which is responsible for all the outside world communication by the microprocessor:
A. BIU
B. PIU
Allenhouse Institute of Technology (UPTU Code : 505)
C. TIU
Rooma, Kanpur – 208 008
D. LIU
A. BIU
9
. INTR: it implies the__________ signal:
A. INTRRUPT REQUEST
B. INTRRUPT RIGHT
C. INTRRUPT RONGH
D. INTRRUPT RESET
A. INTRRUPT REQUEST
10
. Which of the following are the two main components of the CPU?
A. Control Unit and Registers
B. Registers and Main Memory
C. Control unit and ALU
D. ALU and bus
C. Control unit and ALU
1
. Different components n the motherboard of a PC unit are linked together by sets of parallel
electrical conducting lines. What are these lines called?
A. Conductors
B. Buses
C. Connectors
D. Consecutives
B. Buses
2
. The language that the computer can understand and execute is called
A. Machine language
B. Application software
C. System program
D. All of the above
A. Machine language
3
. Which of the following is used as a primary storage device?
A. Magnetic drum
B. PROM
C. Floppy disk
D. All of these
Allenhouse Institute of Technology (UPTU Code : 505)
B. PROM
Rooma, Kanpur – 208 008
4
. Which of the following memories needs refresh?
A. SRAM
B. DRAM
C. ROM
D. All of above
B. DRAM
5
. The memory which is programmed at the time it is manufactured
A. PROM
B. RAM
C. PROM
D. EPROM
A. PROM
6
. Which of the following memory medium is not used as main memory system?
A. Magnetic core
B. Semiconductor
C. Magnetic tape
D. Both a and b
C. Magnetic tape
7
. Registers, which are partially visible to users and used to hold conditional, are known as
A. PC
B. Memory address registers
C. General purpose register
D. Flags
C. General purpose register
8
. One of the main feature that distinguish microprocessors from micro‐computers is
A. Words are usually larger in microprocessors
B. Words are shorter in microprocessors
C. Microprocessor does not contain I/O devices
D. Exactly the same as the machine cycle time
C. Microprocessor does not contain I/O devices
9
. The first microprocessor built by the Intel Corporation was called
A. 8008
Allenhouse Institute of Technology (UPTU Code : 505)
B. 8080
Rooma, Kanpur – 208 008
C. 4004
D. 8800
C. 4004
10
. An integrated circuit is
A. A complicated circuit
B. An integrating device
C. Much costlier than a single transistor
D. Fabricated on a tiny silicon chip
D. Fabricated on a tiny silicon chip
1
. Most important advantage of an IC is its
A. Easy replacement in case of circuit failure
B. Extremely high reliability
C. Reduced cost
D. Low powers consumption
B. Extremely high reliability
2
. Which of the following items are examples of storage devices?
A. Floppy / hard disks
B. CD‐ROMs
C. Tape devices
D. All of the above
D. All of the above
3
. The Width of a processor’s data path is measured in bits. Which of the following are common
data paths?
A. 8 bits
B. 12 bits
C. 16 bits
D. 32 bits
A. 8 bits
4
. Which is the type of memory for information that does not change on your computer?
A. RAM
B. ROM
C. ERAM
D. RW / RAM
Allenhouse Institute of Technology (UPTU Code : 505)
B. ROM
Rooma, Kanpur – 208 008
5
. What type of memory is not directly addressable by the CPU and requires special softw3are
called EMS (expanded memory specification)?
A. Extended
B. Expanded
C. Base
D. Conventional
B. Expanded
6
. Before a disk can be used to store data. It must be…….
A. Formatted
B. Reformatted
C. Addressed
D. None of the above
A. Formatted
7
. Which company is the biggest player in the microprocessor industry?
A. Motorola
B. IBM
C. Intel
D. AMD
C. Intel
8
. A typical personal computer used for business purposes would have… of RAM.
A. 4 KB
B. 16 K
C. 64 K
D. 256 K
D. 256 K
9
. The word length of a computer is measured in
A. Bytes
B. Millimeters
C. Meters
D. Bits
D. Bits
10
. What are the three decisions making operations performed by the ALU of a computer?
Allenhouse Institute of Technology (UPTU Code : 505)
A. Grater than
Rooma, Kanpur – 208 008
B. Less than
C. Equal to
D. All of the above
D. All of the above
1
. Can you tell what passes into and out from the computer via its ports?
A. Data
B. Bytes
C. Graphics
D. Pictures
A. Data
2
. What is the responsibility of the logical unit in the CPU of a computer?
A. To produce result
B. To compare numbers
C. To control flow of information
D. To do math’s works
B. To compare numbers
3
. The secondary storage devices can only store data but they cannot perform
A. Arithmetic Operation
B. Logic operation
C. Fetch operations
D. Either of the above
D. Either of the above
4
. Which of the following memories allows simultaneous read and write operations?
A. ROM
B. RAM
C. EPROM
D. None of above
B. RAM
5
. Which of the following memories has the shortest access times?
A. Cache memory
B. Magnetic bubble memory
Allenhouse Institute of Technology (UPTU Code : 505)
C. Magnetic core memory
Rooma, Kanpur – 208 008
D. RAM
A. Cache memory
6
. A 32 bit microprocessor has the word length equal to
A. 2 byte
B. 32 byte
C. 4 byte
D. 8 byte
C. 4 byte
7
. An error in computer data is called
A. Chip
B. Bug
C. CPU
D. Storage device
B. Bug
8
. The silicon chips used for data processing are called
A. RAM chips
B. ROM chips
C. Micro processors
D. PROM chips
D. PROM chips
9
. The metal disks, which are permanently housed in, sealed and contamination free containers are
called
A. Hard disks
B. Floppy disk
C. Winchester disk
D. Flexible disk
C. Winchester disk
10
. A computer consists of
A. A central processing unit
B. A memory
C. Input and output unit
D. All of the above
D. All of the above
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
This section contains more frequently asked Microprocessors Fundamental Multiple Choice
Questions and Answers in the various University Level and Competitive Examinations.
1
. The instructions for starting the computer are house on
A. Random access memory
B. CD‐Rom
C. Read only memory chip
D. All of above
C. Read only memory chip
2
. The ALU of a computer normally contains a number of high speed storage element called
A. Semiconductor memory
B. Registers
C. Hard disks
D. Magnetic disk
B. Registers
3
. The first digital computer built with IC chips was known as
A. IBM 7090
B. Apple – 1
C. IBM System / 360
D. VAX‐10
C. IBM System / 360
4
. Which of the following terms is the most closely related to main memory?
A. Non volatile
B. Permanent
C. Control unit
D. Temporary
D. Temporary
5
. Which of the following is used for manufacturing chips?
A. Control bus
B. Control unit
C. Parity unit
D. Semiconductor
Allenhouse Institute of Technology (UPTU Code : 505)
D. Semiconductor
Rooma, Kanpur – 208 008
6
. To locate a data item for storage is
A. Field
B. Feed
C. Database
D. Fetch
D. Fetch
7
. A directly accessible appointment calendar is feature of a … resident package
A. CPU
B. Memory
C. Buffer
D. ALU
B. Memory
8
. The term gigabyte refers to
A. 1024 bytes
B. 1024 kilobytes
C. 1024 megabytes
D. 1024 gigabyte
C. 1024 megabytes
9
. A/n …. Device is any device that provides information, which is sent to the CPU
A. Input
B. Output
C. CPU
D. Memory
A. Input
10
. Current SIMMs have either … or … connectors (pins)
A. 9 or 32
B. 30 or 70
C. 28 or 72
D. 30 or 72
D. 30 or 72
1
. Which is the brain of computer:
Allenhouse Institute of Technology (UPTU Code : 505)
A. ALU
Rooma, Kanpur – 208 008
B. CPU
C. MU
D. None of these
B. CPU
2
. Which technology using the microprocessor is fabricated on a single chip:
A. POS
B. MOS
C. ALU
D. ABM
B. MOS
3
. MOS stands for:
A. Metal oxide semiconductor
B. Memory oxide semiconductor
C. Metal oxide select
D. None of these
A. Metal oxide semiconductor
4
. In which form CPU provide output:
A. Computer signals
B. Digital signals
C. Metal signals
D. None of these
B. Digital signals
5
. The register section is related to______ of the computer:
A. Processing
B. ALU
C. Main memory
D. None of these
C. Main memory
6
. In Microprocessor one of the operands holds a special register called:
A. Calculator
B. Dedicated
C. Accumulator
D. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
C. Accumulator
Rooma, Kanpur – 208 008
7
. Which register is a temporary storage location:
A. general purpose register
B. dedicated register
C. A and B
D. none of these
C. A and B
8
. PC stands for:
A. Program counter
B. Points counter
C. Paragraph counter
D. Paint counter
A. Program counter
9
. IR stands for:
A. Intel register
B. In counter register
C. Index register
D. Instruction register
D. Instruction register
10
. SP stands for:
A. Status pointer
B. Stack pointer
C. a and b
D. None of these
B. Stack pointer
1
. The act of acquiring an instruction is referred as the____ the instruction:
A. Fetching
B. Fetch cycle
C. Both a and b
D. None of these
A. Fetching
2
. How many bit of instruction on our simple computer consist of one____:
Allenhouse Institute of Technology (UPTU Code : 505)
A. 2‐bit
Rooma, Kanpur – 208 008
B. 6‐bit
C. 12‐bit
D. None of these
C. 12‐bit
3
. How many parts of single address computer instruction :
A. 1
B. 2
C. 3
D. 4
B. 2
4
. Single address computer instruction has two parts:
A. The operation code
B. The operand
C. A and B
D. None of these
C. A and B
5
. LA stands for:
A. Load accumulator
B. Least accumulator
C. Last accumulator
D. None of these
A. Load accumulator
6
. Which are the flags of status register:
A. Over flow flag
B. Carry flag
C. Half carry flag
D. Zero flag
E. All of these
E. All of these
7
. The carry is operand by:
A. C
B. D
C. S
Allenhouse Institute of Technology (UPTU Code : 505)
D. O
Rooma, Kanpur – 208 008
A. C
8
. The sign is operand by:
A. S
B. D
C. C
D. O
A. S
9
. The zero is operand by:
A. Z
B. D
C. S
D. O
A. Z
10
. The overflow is operand by:
A. O
B. D
C. S
D. C
A. O
1
. _________ Stores the instruction currently being executed:
A. Instruction register
B. Current register
C. Both a and b
D. None of these
A. Instruction register
2
. In which register instruction is decoded prepared and ultimately executed:
A. Instruction register
B. Current register
C. Both a and b
D. None of these
A. Instruction register
Allenhouse Institute of Technology (UPTU Code : 505)
3
Rooma, Kanpur – 208 008
. The status register is also called the____:
A. Condition code register
B. Flag register
C. A and B
D. None of these
C. A and B
4
. The area of memory with addresses near zero are called:
A. High memory
B. Mid memory
C. Memory
D. Low memory
D. Low memory
5
. The processor uses the stack to keep track of where the items are stored on it this by using the:
A. Stack pointer register
B. Queue pointer register
C. Both a & b
D. None of these
A. Stack pointer register
6
. Stack words on:
A. LILO
B. LIFO
C. FIFO
D. None of these
B. LIFO
7
. Which is the basic stack operation:
A. PUSH
B. POP
C. BOTH A and B
D. None of these
C. BOTH A and B
8
. SP stand for:
A. Stack pointer
B. Stack pop
C. Stack push
Allenhouse Institute of Technology (UPTU Code : 505)
D. None of these
Rooma, Kanpur – 208 008
A. Stack pointer
9
. How many bit stored by status register:
A. 1 bit
B. 4 bit
C. 6 bit
D. 8 bit
A. 1 bit
10
. The 16 bit register is separated into groups of 4 bit where each groups is called:
A. BCD
B. Nibble
C. Half byte
D. None of these
B. Nibble
1
. A nibble can be represented in the from of:
A. Octal digit
B. Decimal
C. Hexadecimal
D. None of these
C. Hexadecimal
2
. The left side of any binary number is called:
A. Least significant digit
B. Most significant digit
Allenhouse Institute of Technology (UPTU Code : 505)
C. Medium significant digit
Rooma, Kanpur – 208 008
D. low significant digit
B. Most significant digit
3
. MSD stands for:
A. Least significant digit
B. Most significant digit
C. Medium significant digit
D. low significant digit
B. Most significant digit
4
. _____ a subsystem that transfer data between computer components inside a computer or
between computer:
A. Chip
B. Register
C. Processor
D. Bus
D. Bus
5
. The external system bus architecture is created using from ______ architecture:
A. Pascal
B. Dennis Ritchie
C. Charles Babbage
D. Von Neumann
D. Von Neumann
6
. Which bus carry addresses:
A. System bus
B. Address bus
C. Control bus
D. Data bus
B. Address bus
7
. A 16 bit address bus can generate___ addresses:
A. 32767
Allenhouse Institute of Technology (UPTU Code : 505)
B. 25652
Rooma, Kanpur – 208 008
C. 65536
D. none of these
C. 65536
8
. CPU can read & write data by using :
A. Control bus
B. Data bus
C. Address bus
D. None of these
B. Data bus
9
. Which bus transfer singles from the CPU to external device and others that carry singles from
external device to the CPU:
A. Control bus
B. Data bus
C. Address bus
D. None of these
A. Control bus
10
. When memory read or I/O read are active data is to the processor :
A. Input
B. Output
C. Processor
D. None of these
A. Input
This section contains more frequently asked Microprocessors Basics Multiple Choice Questions
and Answers in the various University Level and Competitive Examinations.
1
. When memory write or I/O read are active data is from the processor:
A. Input
B. Output
C. Processor
D. None of these
Allenhouse Institute of Technology (UPTU Code : 505)
B. Output
Rooma, Kanpur – 208 008
2
. CS stands for:
A. Cable select
B. Chip select
C. Control select
D. Cable system
B. Chip select
3
. WE stands for
A. Write enable
B. Wrote enable
C. Write envy
D. None of these
A. Write enable
4
. MAR stands for
A. Memory address register
B. Memory address recode
C. Micro address register
D. None of these
A. Memory address register
5
. MDR stands for
A. Memory data register
B. Memory data recode
C. Micro data register
D. None of these
A. Memory data register
6
. Which are the READ operation can in simple steps
A. Address
B. Data
C. Control
D. All of these
D. All of these
7
. DMA stands for
A. Direct memory access
Allenhouse Institute of Technology (UPTU Code : 505)
B. Direct memory allocation
Rooma, Kanpur – 208 008
C. Data memory access
D. Data memory allocation
A. Direct memory access
8
. The ____ place the data from a register onto the data bus
A. CPU
B. ALU
C. Both A and B
D. None of these
A. CPU
9
. The microcomputer system by using the ____device interface
A. Input
B. Output
C. Both A and B
D. None of these
C. Both A and B
10
. The standard I/O is also called
A. Isolated I/O
B. Parallel I/O
C. both a and b
D. none of these
A. Isolated I/O
1
. The external device is connected to a pin called the ______ pin on the processor chip
A. Interrupt
B. Transfer
C. Both
D. None of these
A. Interrupt
2
. Which interrupt has the highest priority?
A. INTR
B. TRAP
C. RST6.5
D. none of these
B. TRAP
Allenhouse Institute of Technology (UPTU Code : 505)
3
Rooma, Kanpur – 208 008
. In 8085 name the 16 bit registers?
A. Stack pointer
B. Program counter
C. a & b
D. none of these
C. a & b
4
. What are level Triggering interrupts?
A. INTR&TRAP
B. RST6.5&RST5.5
C. RST7.5&RST6.5
D. none of these
B. RST6.5&RST5.5
5
. Which stack is used in 8085?
A. FIFO
B. LIFO
C. FILO
D. none of these
B. LIFO
6
. What is SIM?
A. Select Interrupt Mask
B. Sorting Interrupt Mask
C. Set Interrupt Mask.
D. none of these
C. Set Interrupt Mask.
7
. RIM is used to check whether, ______
A. The write operation is done or not
B. The interrupt is Masked or not
C. a & b
D. none of these
B. The interrupt is Masked or not
8
. In 8086, Example for Non maskable interrupts are
A. Trap
B. RST6.5
C. INTR
Allenhouse Institute of Technology (UPTU Code : 505)
D. none of these
Rooma, Kanpur – 208 008
A. Trap
9
. In 8086 microprocessor the following has the highest priority among all type interrupts.
A. NMI
B. DIV 0
C. TYPE 255
D. OVER FLOW
A. NMI
10
. BIU STAND FOR:
A. Bus interface unit
B. Bess interface unit
C. A and B
D. None of these
A. Bus interface unit
1
. EU STAND FOR
A. Execution unit
B. Execute unit
C. Exchange unit
D. None of these
A. Execution unit
2
. Which are the part of architecture of 8086
A. The bus interface unit
B. The execution unit
C. Both A and B
D. None of these
C. Both A and B
3
. Which are the four categories of registers:
A. General‐ purpose register
B. Pointer or index registers
C. Segment registers
D. Other register
E. All of these
E. All of these
Allenhouse Institute of Technology (UPTU Code : 505)
4
Rooma, Kanpur – 208 008
. IP Stand for
A. Instruction pointer
B. Instruction purpose
C. Instruction paints
D. None of these
A. Instruction pointer
5
. CS Stand for
A. Code segment
B. Coot segment
C. Cost segment
D. Counter segment
A. Code segment
6
. DS Stand for
A. Data segment
B. Direct segment
C. Declare segment
D. Divide segment
A. Data segment
7
. Which are the segment
A. CS: Code segment
B. DS: data segment
C. SS: Stack segment
D. ES:extra segment
E. All of these
E. All of these
8
. The acculatator is 16 bit wide and is called
A. AX
B. AH
C. AL
D. DL
A. AX
9
. The upper 8 bit are called______
A. BH
B. BL
Allenhouse Institute of Technology (UPTU Code : 505)
C. AH
Rooma, Kanpur – 208 008
D. CH
C. AH
10
. The lower 8 bit are called_______
A. AL
B. CL
C. BL
D. DL
A. AL
1
. IP stand for
A. Industry pointer
B. Instruction pointer
C. Index pointer
D. None of these
B. Instruction pointer
2
. Which has great important in modular programming
A. Stack segment
B. Queue segment
C. Array segment
D. All of these
A. Stack segment
3
. Which register containing the 8086/8088 flag
A. Status register
B. Stack register
C. Flag register
D. Stand register
A. Status register
4
. How many bits the instruction pointer is wide
A. 16 bit
B. 32 bit
C. 64 bit
D. 128 bit
A. 16 bit
Allenhouse Institute of Technology (UPTU Code : 505)
5
Rooma, Kanpur – 208 008
. How many type of addressing in memory
A. Logical address
B. Physical address
C. Both A and B
D. None of these
C. Both A and B
6
. The size of each segment in 8086 is
A. 64 kb
B. 24 kb
C. 50 kb
D. 16kb
A. 64 kb
7
. The physical address of memory is
A. 20 bit
B. 16 bit
C. 32 bit
D. 64 bit
A. 20 bit
8
. The _______ address of a memory is a 20 bit address for the 8086 microprocessor
A. Physical
B. Logical
C. Both
D. None of these
A. Physical
9
. The pin configuration of 8086 is available in the________
A. 40 pin
B. 50 pin
C. 30 pin
D. 20 pin
A. 40 pin
10
. DIP stand for
A. Deal inline package
B. Dual inline package
C. Direct inline package
Allenhouse Institute of Technology (UPTU Code : 505)
D. Digital inline package
Rooma, Kanpur – 208 008
B. Dual inline package
This section contains more frequently asked Microprocessor and Microcontroller Multiple
Choice Questions and Answers in the various University Level and Competitive Examinations.
1
. PA stand for
A. Project address
B. Physical address
C. Pin address
D. Pointer address
B. Physical address
2
. SBA stand for
A. Segment bus address
B. Segment bit address
C. Segment base address
D. Segment byte address
C. Segment base address
3
. EA stand for
A. Effective address
B. Electrical address
C. Effect address
D. None of these
A. Effective address
4
. BP stand for
A. Bit pointer
B. Base pointer
C. Bus pointer
D. Byte pointer
B. Base pointer
5
. DI stand for
A. Destination index
B. Defect index
C. Definition index
D. Delete index
Allenhouse Institute of Technology (UPTU Code : 505)
A. Destination index
Rooma, Kanpur – 208 008
6
. SI stand for
A. Stand index
B. Source index
C. Segment index
D. Simple index
B. Source index
7
. DS stand for
A. Default segment
B. Defect segment
C. Delete segment
D. Definition segment
A. Default segment
8
. ALE stand for
A. Address latch enable
B. Address light enable
C. Address lower enable
D. Address last enable
A. Address latch enable
9
. AD stand for
A. Address data
B. Address delete
C. Address date
D. Address deal
A. Address data
10
. NMI stand for
A. Non mask able interrupt
B. Non mistake interrupt
C. Both
D. None of these
A. Non mask able interrupt
Allenhouse Institute of Technology (UPTU Code : 505)
Microprocessors MCQs Set-20
Rooma, Kanpur – 208 008
A+
A
A-
This section contains more frequently asked Microprocessor and Micro-controller MCQs
in the various University Level and Competitive Examinations.
1
. PC stand for
A. program counter
B. project counter
C. protect counter
D. planning counter
A. program counter
2
. AH stand for
A. Accumulator high
B. Address high
C. Appropriate high
D. Application high
A. Accumulator high
3
. AL stand for
A. Accumulator low
B. Address low
C. Appropriate low
D. Application low
A. Accumulator low
4
. The offset of a particular segment varies from _________
A. 000H to FFFH
B. 0000H to FFFFH
C. 00H to FFH
D. 00000H to FFFFFH
B. 0000H to FFFFH
Allenhouse Institute of Technology (UPTU Code : 505)
5
Rooma, Kanpur – 208 008
. ________ is usually the first level of memory access by the microprocessor
A. Cache memory
B. Data memory
C. Main memory
D. All of these
A. Cache memory
6
. which is the small amount of high‐ speed memory used to work directly with the
microprocessor
A. Cache
B. Case
C. Cost
D. Coos
A. Cache
7
. The cache usually gets its data from the_________ whenever the instruction or data is
required by the CPU
A. Main memory
B. Case memory
C. Cache memory
D. All of these
A. Main memory
8
. How many type of cache memory
A. 1
B. 2
C. 3
D. 4
C. 3
9
. Which is the type of cache memory
A. Fully associative cache
B. Direct‐mapped cache
C. Set‐associative cache
D. All of these
Allenhouse Institute of Technology (UPTU Code : 505)
D. All of these
Rooma, Kanpur – 208 008
10
. Which memory is used to holds the address of the data stored in the cache
A. Associative memory
B. Case memory
C. Ordinary memory
D. None of these
A. Associative memory
HOME
CYBER SECURITY
CS CORE SUBJECTS
PROGRAMMING
MCQ SETS
ONLINE TESTS
QUE AND ANS
BOOKS
Microprocessors MCQs Set-21
A+
A
A-
This section contains more frequently asked Microprocessors 8085 Questions Bank
with Answers in the various University Level and Competitive Examinations.
1
. If the crystal oscillator is operating at 15 MHz, the PCLK output of 8284 is
A. 2.5 MHz.
B. 5 MHz.
C. 7.5 MHz.
D. 10 MHz.
A. 2.5 MHz.
2
. In which T-state does the CPU sends the address to memory or I/O and the ALE signal for
demultiplexing
A. T1.
Allenhouse Institute of Technology (UPTU Code : 505)
B. T2.
Rooma, Kanpur – 208 008
C. T3.
D. T4.
A. T1.
3
. If a 1M ×1 DRAM requires 4 ms for a refresh and has 256 rows to be refreshed, no more than
__________ of time must pass before another row is refreshed.
A. 64 ms.
B. 4 ns.
C. 0.5 ns.
D. 15.625 µs .
B. 4 ns.
4
. In a DMA write operation the data is transferred
A. from I/O to memory.
B. from memory to I/O.
C. from memory to memory.
D. from I/O to I/O.
A. from I/O to memory.
5
. Which type of JMP instruction assembles if the distance is 0020 h bytes
A. near.
B. far
C. short
D. none of the above.
A. near.
6
. A certain SRAM has CS = 0 , WE = 0 and OE = 1. In which of the following modes this
SRAM is operating
A. Read
B. Write
C. Stand by
D. None of the above
B. Write
7
. Which of the following is true with respect to EEPROM?
Allenhouse Institute of Technology (UPTU Code : 505)
A. contents can be erased byte wise only.
Rooma, Kanpur – 208 008
B. contents of full memory can be erased together
C. contents can be erased using ultra violet rays
D. contents can not be erased
C. contents can be erased using ultra violet rays
8
. Pseudo instructions are basically
A. false instructions.
B. instructions that are ignored by the microprocessor
C. assembler directives
D. instructions that are treated like comments
C. assembler directives
9
. Number of the times the instruction sequence below will loop before coming out of loop is
MOV AL, 00h A1: INC AL JNZ A1
A. 0
B. 1
C. 255
D. 256
D. 256
10
. What will be the contents of register AL after the following has been executed MOV BL, 8C
MOV AL, 7E ADD AL, BL
A. 0A and carry flag is set
B. 0A and carry flag is reset
C. 6A and carry flag is set
D. 6A and carry flag is reset
A. 0A and carry flag is set
1
. Direction flag is used with
A. String instructions.
B. Stack instructions
C. Arithmetic instructions
D. Branch instructions
A. String instructions.
Allenhouse Institute of Technology (UPTU Code : 505)
2
Rooma, Kanpur – 208 008
. Ready pin of a microprocessor is used
A. to indicate that the microprocessor is ready to receive inputs
B. to indicate that the microprocessor is ready to receive outputs
C. to introduce wait states
D. to provide direct memory access
C. to introduce wait states
3
. These are two ways in which a microprocessor can come out of Halt state.
A. When hold line is a logical 1
B. When interrupt occurs and the interrupt system has been enabled
C. When both (A) and (B) are true
D. When either (A) or (B) are true
A. When hold line is a logical 1
4
. In the instruction FADD, F stands for
A. Far
B. Floppy
C. Floating
D. File
C. Floating
5
. SD RAM refers to
A. Synchronous DRAM
B. Static DRAM
C. Semi DRAM
D. Second DRAM
A. Synchronous DRAM
6
. In case of DVD, the speed is referred in terms of n X (for example 32 X). Here, X refers to
A. 150 KB/s
B. 300 KB/s
C. 1.38 MB/s
D. 2.4 MB/s
C. 1.38 MB/s
7
. Itanium processor of Intel is a
A. 32 bit microprocessor.
B. 64 bit microprocessor.
C. 128 bit microprocessor.
Allenhouse Institute of Technology (UPTU Code : 505)
D. 256 bit microprocessor
Rooma, Kanpur – 208 008
B. 64 bit microprocessor.
8
. LOCK prefix is used most often
A. during normal execution.
B. during DMA accesses
C. during interrupt servicing
D. during memory accesses
C. during interrupt servicing
9
. The Pentium microprocessor has______execution units.
A. 1
B. 2
C. 3
D. 4
C. 3
10
. EPROM is generally erased by using
A. Ultraviolet rays
B. infrared rays
C. 12 V electrical pulse
D. 24 V electrical pulse
A. Ultraviolet ray
1
. Signal voltage ranges for a logic high and for a logic low in RS-232C standard are
A. Low = 0 volt to 1.8 volt, high = 2.0 volt to 5 volt
B. Low =-15 volt to –3 vol, high = +3 volt to +15 volt
C. Low = +3 volt to +15 volt, high = -3 volt to -15 volt
D. Low = 2 volt to 5.0 volt, high = 0 volt to 1.8 volt
B. Low =-15 volt to –3 vol, high = +3 volt to +15 volt
2
. The PCI bus is the important bus found in all the new Pentium systems because
A. It has plug and play characteristics
B. It has ability to function with a 64 bit data bus
C. Any Microprocessor can be interfaced to it with PCI controller or bridge
D. All of the above
D. All of the above
3
Allenhouse Institute of Technology (UPTU Code : 505)
. Which of the following statement is true?
Rooma, Kanpur – 208 008
A. The group of machine cycle is called a state.
B. A machine cycle consists of one or more instruction cycle.
C. An instruction cycle is made up of machine cycles and a machine cycle is made up of
number of states.
D. None of the above
B. A machine cycle consists of one or more instruction cycle.
4
. 8251 is a
A. UART
B. USART
C. Programmable Interrupt controller
D. Programmable interval timer/counter
B. USART
5
. 8088 microprocessor has
A. 16 bit data bus
B. 4 byte pre-fetch queue
C. 6 byte pre-fetch queue
D. 16 bit address bus
D. 16 bit address bus
6
. By what factor does the 8284A clock generator divide the crystal oscillator’s output frequency?
A. One
B. Two
C. Three
D. Four
C. Three
7
. The memory data bus width in Pentium is
A. 16 bit
B. 32 bit
C. 64 bit
D. None of these
C. 64 bit
8
. When the 82C55 is reset, its I/O ports are all initializes as
A. output port using mode 0
B. Input port using mode 1
Allenhouse Institute of Technology (UPTU Code : 505)
C. output port using mode 1
Rooma, Kanpur – 208 008
D. Input port using mode 0
D. Input port using mode 0
9
. Which microprocessor pins are used to request and acknowledge a DMA transfer?
A. reset and ready
B. ready and wait
C. HOLD and HLDA
D. None o these
C. HOLD and HLDA
10
. Which of the following statement is false?
A. RTOS performs tasks in predictable amount of time
B. Windows 98 is RTOS
C. Interrupts are used to develop RTOS
D. Kernel is the one of component of any OS
B. Windows 98 is RTOS
1
. The VESA local bus operates at
A. 8 MHz
B. 33 MHz
C. 16 MHz
D. None of these
B. 33 MHz
2
. The first modern computer was called_____________
A. FLOW-MATIC
B. UNIVAC-I
C. ENIAC
D. INTEL
C. ENIAC
3
. Software command CLEAR MASK REGISTER in DMA
A. Disables all channels.
B. Enables all channels.
C. None
D. Clears first/last flip-flop within 8237.
B. Enables all channels.
Allenhouse Institute of Technology (UPTU Code : 505)
4
. The first task of DOS operating system afterRooma, Kanpur – 208 008
loading into the memory is to use the file
called___________
A. HIMEM.SYS
B. CONFIG.SYS
C. AUTOEXEC.BAT
D. SYSTEM.INI
B. CONFIG.SYS
5
. If the programmable counter timer 8254 is set in mode 1 and is to be used to count six events, the
output will remain at logic 0 for _____ number of counts
A. 5
B. 6
C. All of the above
B. 6
6
. The flash memory is programmed in the system by 12 V programming pulse
A. TRUE
B. FALSE
A. TRUE
7
. A plug and play (PnP) interface is one that contains a memory that holds configuration
information of the system
A. 1
A. 1
8
. The accelerated graphics port (AGP) allows virtually any microprocessor to be interfaced with
PCI bus via the use of bridge interface
A. 1
A. 1
9
. A Bus cycle is equal to how many clocking periods
A. Two
B. Three
C. Four
D. Six
C. Four
10
. The time required to refresh a typical DRAM is
A. 2 – 4 us
Allenhouse Institute of Technology (UPTU Code : 505)
B. 2 – 4 ns
Rooma, Kanpur – 208 008
C. 2 – 4 ms
D. 2 – 4 ps
C. 2 – 4 ms
This section contains more frequently asked Microprocessors 8085 Basics MCQs in the various
University Level and Competitive Examinations.
1
. The no. of address lines required to address a memory of size 32 K is
A. 15 lines
B. 16 lines
C. 18 lines
D. 14 lines
A. 15 lines
2
. The no. of wait states required to interface 8279 to 8086 with 8MHz clock are
A. Two
B. Three
C. One
D. None
A. Two
3
. NMI input is
A. Edge sensitive
B. Level sensitive
C. Both edge and level triggered
D. edge triggered and level sensitive
D. edge triggered and level sensitive
4
. Data rate available for use on USB is
A. 12 Mbits per second
B. 1.5 Mbits per second
C. Both (A) and (B)
D. No restriction
C. Both (A) and (B)
5
. In 80186, the timer which connects to the system clock is
Allenhouse Institute of Technology (UPTU Code : 505)
A. timer 0
Rooma, Kanpur – 208 008
B. timer 1
C. timer 2
D. Any one can be connected
C. timer 2
6
. Conversion of the +1000 decimal number into signed binary word results
A. 0000 0011 1110 1000
B. 1111 1100 0001 1000
C. 1000 0011 1110 1000
D. 0111 1100 0001 1000
C. 1000 0011 1110 1000
7
. What do the symbols [ ] indicate?
A. Direct addressing
B. Register Addressing
C. Indirect addressing
D. None of the above
C. Indirect addressing
8
. SDRAM refers to
A. static DRAM
B. synchronous DRAM
C. sequential DRAM
D. semi DRAM
B. synchronous DRAM
9
. Which pins are general purpose I/O pins during mode-2 operation of the 82C55?
A. PA0 – PA7
B. PB0-PB7
C. PC3-PC7
D. PC0-PC2
A. PA0 – PA7
1. A microprocessor is a chip integrating all the functions of a CPU of a computer. A. multiple B. single C. double D. triple
ANSWER: B
2. Microprocessor is a/an circuit that functions as the CPU of the compute A. electronic B. mechanic C. integrating D.
processing ANSWER: A
3. Microprocessor is the of the computer and it perform all the computational tasks A. main B. heart C. important D.
simple ANSWER: B
Allenhouse Institute of Technology (UPTU Code : 505)
4. The purpose of the microprocessor is to control A. memory B. switches C. processing D. tasks ANSWER: A
5. The first digital electronic computer was built in the Rooma,
year A.Kanpur
1950 B.– 208
1960008C. 1940 D. 1930 ANSWER: C 6. In 1960's texas
institute invented A. integrated circuits B. microprocessor C. vacuum tubes D. transistors ANSWER: A
7. The intel 8086 microprocessor is a processor A. 8 bit B. 16 bit C. 32 bit D. 4 bit ANSWER: B
8. The microprocessor can read/write 16 bit data from or to A. memory B. I /O device C. processor D. register ANSWER:
A
9. In 8086 microprocessor , the address bus is bit wide A. 12 bit B. 10 bit C. 16 bit D. 20 bit ANSWER: D 10. The work of
EU is A. encoding B. decoding C. processing D. calculations ANSWER: B 11. The 16 bit flag of 8086 microprocessor is
responsible to indicate A. the condition of result of ALU operation B. the condition of memory C. the result of addition D.
the result of subtraction ANSWER: A
12. The CF is known as A. carry flag B. condition flag C. common flag D. single flag .ANSWER: A
13. The SF is called as A. service flag B. sign flag C. single flag D. condition flag ANSWER: B
14. The OF is called as A. overflow flag B. overdue flag C. one flag D. over flag ANSWER: A
15. The IF is called as A. initial flag B. indicate flag C. interrupt flag D. inter flag ANSWER: C
16. The register AX is formed by grouping A. AH & AL B. BH & BL C. CH & CL D. DH & DL ANSWER: A
17. The SP is indicated by A. single pointer B. stack pointer C. source pointer D. destination pointer ANSWER: B
18. The BP is indicated by A. base pointer B. binary pointer C. bit pointer D. digital pointer ANSWER: A
19. The SS is called as A. single stack B. stack segment C. sequence stack .D. random stack ANSWER: B
20. The index register are used to hold A. memory register B. offset address C. segment memory D. offset memory
ANSWER: A
21. The BIU contains FIFO register of size bytes A. 8 B. 6 C. 4 D. 12 ANSWER: B
22. The BIU prefetches the instruction from memory and store them in A. queue B. register C. memory D. stack ANSWER:
A
23. The 1 MB byte of memory can be divided into segment A. 1 Kbyte B. 64 Kbyte C. 33 Kbyte D. 34 Kbyte ANSWER: B
24. The DS is called as A. data segment B. digital segment C. divide segment D. decode segment ANSWER: A
25. The CS register stores instruction in code segment A. stream B. path C. codes D. stream line ANSWER: C
26. The IP is bits in length A. 8 bits B. 4 bits C. 16 bits D. 32 bits ANSWER: C
27. The push source copies a word from source to A. stack B. memory C. register D. destination ANSWER: A
28. LDs copies to consecutive words from memory to register and A. ES B. DS C. SS D. CS ANSWER: B
29. INC destination increments the content of destination by A. 1 B. 2 C. 30 D. 41
30. IMUL source is a signed A. multiplication B. addition C. subtraction D. division ANSWER: A
31. destination inverts each bit of destination A. NOT B. NOR C. AND D. OR ANSWER: A
32. The JS is called as A. jump the signed bit B. jump single bit C. jump simple bit D. jump signal it ANSWER: A
33. Instruction providing both segment base and offset address are called A. below type .B. far type C. low type D. high
type ANSWER: B
34. The conditional branch instruction specify for branching A. conditions B. instruction C. address D. memory ANSWER:
A
35. The microprocessor determines whether the specified condition exists or not by testing the A. carry flag B. conditional
flag C. common flag D. sign flag ANSWER: B
36. The LES copies to words from memory to register and A. DS B. CS C. ES D. DS ANSWER: C
37. The translates a byte from one code to another code A. XLAT B. XCHNG C. POP D. PUSH ANSWER: A 38. The contains
an offset instead of actual address A. SP B. IP C. ES D. SS ANSWER: B
39. The 8086 fetches instruction one after another from of memory A. code segment B. IP C. ES D. SS ANSWER: A
40. The BIU contains FIFO register of size 6 bytes called . A. queue B. stack C. segment D. register ANSWER: A
41. The is required to synchronize the internal operands in the processor CLK Signal A. UR Signal B. Vcc C. AIE D. Ground
ANSWER: A
42. The pin of minimum mode AD0-AD15 has address A. 16 bit B. 20 bit C. 32 bit D. 4 bit ANSWER: B
43. The pin of minimum mode AD0- AD15 has _ data bus A. 4 bit B. 20 bit C. 16 bit D. 32 bit ANSWER: C
44. The address bits are sent out on lines through ANSWER: B A. A16-19 B. A0-17 C. D0-D17 D. C0-C17 ANSWER: A
45. is used to write into memory A. RD B. WR C. RD / WR D. CLK ANSWER: B 46. The functions of Pins from 24 to 31
depend on the mode in which is operating A. 8085 B. 8086 C. 80835 D. 80845 ANSWER: B
47. The RD, WR, M/IO is the heart of control for a mode A. minimum B. maximum C. compatibility mode D. control mode
ANSWER: A
Allenhouse Institute of Technology (UPTU Code : 505)
48. In a minimum mode there is a on the system bus A. single B. double C. multiple D. triple ANSWER: A 49. If MN/MX is
low the 8086 operates in mode A. Minimum B. Maximum Rooma, Kanpur
C. both (A)– and
208 008
(B) D. medium ANSWER: B
50. In max mode, control bus signal So,S1 and S2 are sent out in form A. decoded B. encoded C. shared D. unshared
ANSWER: B
51. The bus controller device decodes the signals to produce the control bus signal A. internal B. data C. external D.
address ANSWER: C
52. A Instruction at the end of interrupt service program takes the execution back to the interrupted program A. forward
B. return C. data D. line ANSWER: B
53. The main concerns of the are to define a flexible set of commands A. memory interface B. peripheral interface C.
both (A) and (B) D. control interface .ANSWER: A
54. Primary function of memory interfacing is that the should be able to read from and write into register A.
multiprocessor B. microprocessor C. dual Processor D. coprocessor ANSWER: B
55. To perform any operations, the Mp should identify the A. register B. memory C. interface D. system ANSWER: A
56. The Microprocessor places address on the address bus A. 4 bit B. 8 bit C. 16 bit D. 32 bit ANSWER: C
57. The Microprocessor places 16 bit address on the add lines from that address by register should be selected A. address
B. one C. two D. three ANSWER: B
58. The of the memory chip will identify and select the register for the EPROM A. internal decoder B. external decoder
C. address decoder D. data decoder ANSWER: A
59. Microprocessor provides signal like to indicate the read operatio A. LOW B. MCMW C. MCMR D. MCMWR ANSWER:
C
60. To interface memory with the microprocessor, connect register the lines of the address bus must be added to address
lines of the chip. A. single B. memory C. multiple D. triple ANSWER: B
61. The remaining address line of bus is decoded to generate chip select signal A. data B. address C. control bus D. both
(a) and (b) ANSWER: B
62. signal is generated by combining RD and WR signals with IO/M A. control B. memory C. register D. system ANSWER:
A
63. Memory is an integral part of a system A. supercomputer B. microcomputer C. mini computer D. mainframe computer
ANSWER: B
64. has certain signal requirements write into and read from its registers A. memory B. register C. both (a) and (b) D.
control ANSWER: A
65. An is used to fetch one address A. internal decoder B. external decoder C. encoder D. register ANSWER: A
66. The primary function of the is to accept data from I/P devices A. multiprocessor B. microprocessor C. peripherals D.
interfaces ANSWER: B
67. signal prevent the microprocessor from reading the same data more than one A. pipelining B. handshaking C.
controlling D. signaling ANSWER: B
68. Bits in IRR interrupt are A. reset B. set C. stop D. start ANSWER: B
69. generate interrupt signal to microprocessor and receive acknowledge A. priority resolver B. control logic C. interrupt
request register D. interrupt register ANSWER: B
70. The pin is used to select direct command word A. A0 B. D7-D6 C. A12 D. AD7-AD6 ANSWER: A
71. The is used to connect more microprocessor A. peripheral device B. cascade C. I/O devices D. control unit
72. CS connect the output of A. encoder B. decoder C. slave program D. buffer ANSWER: B
73. In which year, 8086 was introduced? A. 1978 B. 1979 C. 1977 D. 1981 ANSWER: A
74. Expansion for HMOS technology_ A. high level mode oxygen semiconductor B. high level metal oxygen semiconductor
C. high performance medium oxide semiconductor D. high performance metal oxide semiconductor ANSWER: D
75. 8086 and 8088 contains transistors A. 29000 B. 24000 C. 34000 D. 54000 ANSWER: A
76. ALE stands for A. address latch enable B. address level enable C. address leak enable D. address leak extension
ANSWER: A
77. What is DEN? A. direct enable B. data entered C. data enable D. data encoding ANSWER: C
78. In 8086, Example for Non maskable interrupts are . A. TRAP B. RST6.5 C. INTR D. RST6.6 ANSWER: A 79. In 8086 the
overflow flag is set when . A. the sum is more than 16 bits. B. signed numbers go out of their range after an arithmetic
operation. C. carry and sign flags are set. D. subtraction ANSWER: B
80. In 8086 microprocessor the following has the highest priority among all type interrupts? A. NMI B. DIV 0 C. TYPE 255
D. OVER FLOW ANSWER: A
Allenhouse Institute of Technology (UPTU Code : 505)
81. In 8086 microprocessor one of the following statements is not true? A. coprocessor is interfaced in max mode. B.
coprocessor is interfaced in min mode. C. I /O can be Rooma, Kanpur
interfaced – 208/008
in max min mode. D. supports pipelining ANSWER: B
82. Address line for TRAP is? A. 0023H B. 0024H C. 0033H D. 0099H ANSWER: B
83. Access time is faster for . A. ROM B. SRAM C. DRAM D. ERAM ANSWER: B
84. The First Microprocessor was . A. Intel 4004 B. 8080 C. 8085 D. 4008 ANSWER: A
85. Status register is also called as . A. accumulator B. stack C. counter D. flags ANSWER: D
86. Which of the following is not a basic element within the microprocessor? A. Microcontroller B. Arithmetic logic unit
(ALU) C. Register array D. Control unit Ans.: A
87. Which method bypasses the CPU for certain types of data transfer? A. Software interrupts B. Interrupt-driven I/O C.
Polled I/O D. Direct memory access (DMA) Ans.: D
88. Which bus is bidirectional? A. Address bus B. Control bus C. Data bus D. None of the above Ans.: C
89. The first microprocessor had a(n) . A. 1 – bit data bus B. 2 – bit data bus C. 4 – bit data bus D. 8 – bit data bus Ans.: C
90. Which microprocessor has multiplexed data and address lines? A. 8086 B. 80286 C. 80386 D. Pentium Ans.: A
91. Which is not an operand? A. Variable B. Register C. Memory location D. Assembler Ans.: D
92. Which is not part of the execution unit (EU)? A. Arithmetic logic unit (ALU) B. Clock C. General registers D. Flags Ans.:
B
93. A 20-bit address bus can locate . A. 1,048,576 locations B. 2,097,152 locations C. 4,194,304 locations D. 8,388,608
locations Ans.: A
94. Which of the following is not an arithmetic instruction? A. INC (increment) B. CMP (compare) C. DEC (decrement) D.
ROL (rotate left) Ans.: D
95. During a read operation the CPU fetches _. A. a program instruction B. another address C. data itself D. all of the
above Ans.: D
96. Which of the following is not an 8086/8088 general-purpose register? A. Code segment (CS) B. Data segment (DS) C.
Stack segment (SS) D. Address segment (AS) Ans.: D
97. A 20-bit address bus allows access to a memory of capacity A. 1 MB B. 2 MB C. 4 MB D. 8 MB Ans.: A
98. Which microprocessor accepts the program written for 8086 without any changes? A. 8085 B. 8086 C. 8087 D. 8088
Ans.: D
99. Which group of instructions do not affect the flags? A. Arithmetic operations B. Logic operations C. Data transfer
operations D. Branch operations Ans.: C
100. The result of MOV AL, 65 is to store A. store 0100 0010 in AL B. store 42H in AL C. store 40H in AL D. store 0100 0001
in AL Ans.: D
Important Theory
1.
A. +0
B. -0
C. +1
D. -1
Allenhouse Institute of Technology (UPTU Code : 505)
Answer & Solution Discuss in Board Save for Later
Rooma, Kanpur – 208 008
Answer: Option B
No explanation is given for this question Let's Discuss on Board
2.
Answer: Option A
No explanation is given for this question Let's Discuss on Board
3.
A. True
B. False
Answer: Option A
No explanation is given for this question Let's Discuss on Board
Allenhouse Institute of Technology (UPTU Code : 505)
4. Rooma, Kanpur – 208 008
A. Less than
B. Greater than
C. The same as
D. Cannot be determined
Answer: Option C
No explanation is given for this question Let's Discuss on Board
5.
A. Z, CY, S, P and AC
B. D, Z, S, P, AC
C. Z, C, S, P, AC
D. Z, CY, S, D, AC
Answer: Option A
Allenhouse Institute of Technology (UPTU Code : 505)
6. Rooma, Kanpur – 208 008
A. 6 decimal places
B. 8 decimal places
C. 10 decimal places
D. 11 decimal places
Answer: Option D
No explanation is given for this question Let's Discuss on Board
7.
DS directive in 8085
C. Forces the assembler to reserve a specified number of consecutive bytes in the memory
Answer: Option C
No explanation is given for this question Let's Discuss on Board
Allenhouse Institute of Technology (UPTU Code : 505)
8. Rooma, Kanpur – 208 008
A. BYTE
B. NIBBLE
Answer: Option A
No explanation is given for this question Let's Discuss on Board
9.
We say that a set of gates is logically complete if we can build any circuit
without using any other kind of gates. Which of the following sets are
logically complete
A. Set of {AND,OR}
C. Set of {AND,OR,NOT}
Answer: Option C
No explanation is given for this question Let's Discuss on Board
Allenhouse Institute of Technology (UPTU Code : 505)
10. Rooma, Kanpur – 208 008
Answer: Option D
Important Theory
11.
A. 1000
B. 10000
C. 100000
D. one million
Answer: Option D
Allenhouse Institute of Technology (UPTU Code : 505)
No explanation is given for this question Let's Discuss on Board
Rooma, Kanpur – 208 008
12.
In a computer the data transfer between hard disk and CPU is nearly the same as that
between diskette and CPU.
A. True
B. False
Answer: Option B
No explanation is given for this question Let's Discuss on Board
13.
Answer: Option C
No explanation is given for this question Let's Discuss on Board
14.
Assertion (A): Each memory chip has its own address latch.
Reason (R): ALE signal comes out of microprocessor 8085 and goes to memory chip.
C. A is correct R is wrong
D. A is wrong R is correct
Answer: Option D
No explanation is given for this question Let's Discuss on Board
15.
When the write enable input is not asserted, the gated D latch _________ its output.
B. Clears
C. Sets
D. Complements
Answer: Option A
A. 16 bits
B. 8 bits
C. 2^16 bits
D. Cannot be determined
Allenhouse Institute of Technology (UPTU Code : 505)
Answer & Solution Discuss in Board Save for Later
Rooma, Kanpur – 208 008
Answer: Option D
No explanation is given for this question Let's Discuss on Board
17.
A. 127
B. 127.0
C. 127
D. 125 + 3
Answer: Option A
No explanation is given for this question Let's Discuss on Board
18.
In 8085
Answer: Option A
No explanation is given for this question Let's Discuss on Board
19.
A. Direct
B. Register
C. Implicit
D. Immediate
Answer: Option C
No explanation is given for this question Let's Discuss on Board
20.
A. True
B. False
Answer: Option A
Important Theory
Allenhouse Institute of Technology (UPTU Code : 505)
21. Rooma, Kanpur – 208 008
A. Integer part
Answer: Option C
No explanation is given for this question Let's Discuss on Board
22.
A. NAND-NAND
B. OR-NAND
C. NAND-NOR
D. NOR-NAND
Answer: Option A
No explanation is given for this question Let's Discuss on Board
Allenhouse Institute of Technology (UPTU Code : 505)
23. Rooma, Kanpur – 208 008
If the sign bit of mantissa is 0 and the exponent is increased from a positive
to a more negative number the result is
Answer: Option A
No explanation is given for this question Let's Discuss on Board
24.
Answer: Option B
No explanation is given for this question Let's Discuss on Board
Allenhouse Institute of Technology (UPTU Code : 505)
25. Rooma, Kanpur – 208 008
A. Special words
B. Reserved words
C. Class words
D. Character words
Answer: Option B
Important Theory
26.
Answer: Option B
No explanation is given for this question Let's Discuss on Board
Allenhouse Institute of Technology (UPTU Code : 505)
27. Rooma, Kanpur – 208 008
A. R is asserted, S is asserted
B. R is asserted, S is negated
C. R is negated, S is asserted
D. R is negated, S is negated
Answer: Option A
No explanation is given for this question Let's Discuss on Board
28.
If m is a power of 2, the number of select lines required for an m-input mux is:
A. m
B. 2^m
C. log2 (m)
D. 2*m
Answer: Option C
No explanation is given for this question Let's Discuss on Board
Allenhouse Institute of Technology (UPTU Code : 505)
29. Rooma, Kanpur – 208 008
The timing difference between a slow memory and fast processor can be resolved if
C. Either A or B
D. Neither A nor B
Answer: Option C
No explanation is given for this question Let's Discuss on Board
30.
Which memory has read operation, byte erase, byte write and chip erase?
A. RAM
B. UVEPROM
C. EEPROM
D. Both B and C
Answer: Option C
31.
A. True
Allenhouse Institute of Technology (UPTU Code : 505)
B. False Rooma, Kanpur – 208 008
Answer: Option B
No explanation is given for this question Let's Discuss on Board
32.
A. Gate
B. Mux
C. Decoder
D. Register
Answer: Option D
No explanation is given for this question Let's Discuss on Board
33.
A. 1, 2, 3, 4
B. 1, 2, 4, 3
Allenhouse Institute of Technology (UPTU Code : 505)
C. 2, 1, 3, 4 Rooma, Kanpur – 208 008
D. 2, 1, 4, 3
Answer: Option A
No explanation is given for this question Let's Discuss on Board
34.
A. int bar
B. s=s+1
C. king = horse + 1
Answer: Option A
No explanation is given for this question Let's Discuss on Board
35.
A. Doubles
B. Remains unchanged
C. Halves
Allenhouse Institute of Technology (UPTU Code : 505)
D. Increases by 2^(address bits)/addressability Rooma, Kanpur – 208 008
Answer: Option C
36.
A. 2
B. 3
C. 4
D. 5
Answer: Option D
No explanation is given for this question Let's Discuss on Board
37.
C. A is correct R is wrong
Allenhouse Institute of Technology (UPTU Code : 505)
D. A is wrong R is correct Rooma, Kanpur – 208 008
Answer: Option B
No explanation is given for this question Let's Discuss on Board
38.
A. 2
B. 4
C. 6
D. 8
Answer: Option C
No explanation is given for this question Let's Discuss on Board
39.
A. 45 H
B. 6 AFH
C. 234
D. 64 H
Allenhouse Institute of Technology (UPTU Code : 505)
Answer & Solution Discuss in Board Save for Later
Rooma, Kanpur – 208 008
Answer: Option C
No explanation is given for this question Let's Discuss on Board
40.
A. True
B. False
Answer: Option B
41.
A. Concentrated refresh
B. Distributed refresh
C. Hidden refresh
Answer: Option A
No explanation is given for this question Let's Discuss on Board
Allenhouse Institute of Technology (UPTU Code : 505)
42. Rooma, Kanpur – 208 008
D. Both Ihe numbers are changed and their exponents are, made equal to -5
Answer: Option B
No explanation is given for this question Let's Discuss on Board
43.
A. 4 and 5 respectively
B. 5 and 4 respectively
C. 3 and 4 respectively
D. 4 and 3 respectively
Answer: Option B
No explanation is given for this question Let's Discuss on Board
Allenhouse Institute of Technology (UPTU Code : 505)
44. Rooma, Kanpur – 208 008
Answer: Option B
No explanation is given for this question Let's Discuss on Board
45.
A. RS Latch
B. Mux
C. Nand
D. Decoder
Answer: Option A
Important Theory
Allenhouse Institute of Technology (UPTU Code : 505)
46. Rooma, Kanpur – 208 008
A. True
B. False
Answer: Option A
No explanation is given for this question Let's Discuss on Board
47.
A. I/O port
Answer: Option C
No explanation is given for this question Let's Discuss on Board
48.
A. True
B. False
Allenhouse Institute of Technology (UPTU Code : 505)
Answer & Solution Discuss in Board Save for Later
Rooma, Kanpur – 208 008
Answer: Option B
No explanation is given for this question Let's Discuss on Board
49.
A. True
B. False
Answer: Option A
Field Programmable Gate Array (FPGA) is the re-configurable hardware, which consists
of millions of logic gates which could be arranged according to the user's demand. They
also have much higher frequency compared to micro controllers.
Verilog and VHDL are the hardware description languages that are used for the
programming of FPGAs. Both of these languages are case-insensitive in nature.
Here TRAP, INTR, RST 7.5 are vectored interrupts. But RST 3 is not a vectored interrupt.
Program counter (PC) and Stack pointer (SP) are basically used to hold 16 - bit memory
addresses. PC stores the 16-bit memory address of the next instruction to be fetched. SP
can be used to temporarily store the 16 - bit memory address as well as data. So PC and
SP are 16-bit registers.
SIM stands for set interrupt mask which is handling the interrupts in 8085
microprocessor.
02․ A combinational PLD with a fixed AND array and a programmable OR array is called
a
PLD
PROM
PAL
PLA
ROM – Fixed AND array and fixed OR array PROM – Fixed AND array and
Programmable OR array PAL – Programmable AND array and fixed OR array PLA –
Programmable AND array and programmable OR array
03․ A combinational PLD with a programmable AND array and a fixed OR array is called
a
PLD
PROM
PAL
Allenhouse Institute of Technology (UPTU Code : 505)
PLA Rooma, Kanpur – 208 008
ROM – Fixed AND array and fixed OR array PROM – Fixed AND array and
Programmable OR array PAL – Programmable AND array and fixed OR array PLA –
Programmable AND array and programmable OR array
ROM – Fixed AND array and fixed OR array PROM – Fixed AND array and
Programmable OR array PAL – Programmable AND array and fixed OR array PLA –
Programmable AND array and programmable OR array
The ROM programmed during manufacturing process itself is called MROM. Data is
stored by the manufacturer during fabrication and user can not alter the data. In PROM
data is stored by user. Only one time programmable and reprogramming is not possible.
In EPROM erasing is done using UV light and programming is through electrical.
Allenhouse Institute of Technology (UPTU Code : 505)
06․ The length of bus cycle in 8086/8088 is four clock cycles, T1, T2, T3, T4 and an
Rooma, Kanpur – 208 008
indeterminate number of wait state clock cycles denoted by Tw. The wait states are always
inserted between
T1 & T2
T2 & T3
T3 & T4
T4 & T1
07․ Which one of the following circuits transmits two messages simultaneously in one
direction
Duplex
Diplex
Simplex
Quadruplex
In 8085 microprocessor there are 40 pins out of which 27 are output pins and rest 13 are
including clock input, power supply and other input pins.
Allenhouse Institute of Technology (UPTU Code : 505)
09․ The program counter in a 8085 micro-processor is a 16-bit register, because
Rooma, Kanpur – 208 008
It counts 16-bits at a time
There are 16 address lines
It facilitates the user storing 16-bit data temporarily
It has to fetch two 8-bit data at a time
Program counter stores the address of next instruction to be fetched. AS 8085 address is
of 16-bit so program counter has to be of 16-bit.
04․ A good assembly language programmer should use general purpose registers rather
than memory in maximum possible ways for data processing. This is because:
Data processing with registers is easier than with memory
Allenhouse Institute of Technology (UPTU Code : 505)
Data processing with memory requires more
Rooma, instructions
Kanpur – 208 008 in the program than that
with registers
Of limited set of instructions for data processing with memory
Data processing with registers takes fewer cycles than that with memory
Data processing with registers takes fewer cycle than with memory which require extra
memory read or write signal.
06․ I)A total of about one million bytes can be directly addressed by the 8086
microprocessor II)8086 has thirteen 16-bit registers III)8086 has eight flags IV)Compared
to 8086, the 80286 provides a higher degree of memory protection Which one of the
statements given above are correct?
2,3&4
1,3 &4
1,2 & 4
1,2 & 3
→ 8086 has 9 flags i.e. CF, PF, AF, ZF, SF, TF, IF, DF, OF → 8086 has 20 address lines so it
can address 220 = 1Mbyte memory location. → 8086 has thirteen 16-bit registers.
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
07․ The processor status word of 8085 microprocessor has five flags namely:
S, Z, AC, P, CY
S, OV, AC, P, CY
S, Z, OV, P, CY
S, Z, AC, P, OV
8085 microprocessor has 5 status flag S → Sign flag Z → Zero flag AC → Auxiliary carry
flag P → Parity flag CY → Carry flag
08․ What are the sets of commands in a program which are not translated into machine
instructions during assembly process, called?
Mnemonics
Directives
Identifiers
Operands
Directives are not translated into machine instruction during assembly process.
09․ The cycle required to fetch and execute an instruction in a 8085 microprocessor is
which one of the following?
Clock cycle
Memory cycle
Machine cycle
Instruction cycle
One machine cycle is equivalent to one memory access. Clock cycle implies one clock
period. Instruction cycle includes fetching and execution of a given instruction.
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
In execution of any instruction first cycle is op-code fetch the memory read or write or I/O
read or write cycle occur as per instruction given.
When ALE signal is high all the buses are used as address bus and when it is low lower
byte of address bus is used as data bus.
Input to a assembler is the source program and assembler converts it into object program
01․ Both the ALU and control section of CPU employ which special purpose storage
location?
Buffers
Allenhouse Institute of Technology (UPTU Code : 505)
Decoders Rooma, Kanpur – 208 008
Accumulators
Registers
Accumulator is a special purpose 8-bit register which is used as a storage for almost all
arithmetic and logic operations.
05․ Consider the following statements: In 8085 microprocessor, data-bus and address bus
are multiplexed in order to I)Increase the speed of microprocessor. II)Reduce the number
of pins. III)Connect more peripheral chips. Which of these statements is/are correct?
(I) only
(II) only
(II) & (III)
(I), (II) & (III)
Lower byte of address bus (A0 - A7) are multiplexed with data bus (AD0 - AD7) to reduce
the number of pins of microprocessor. This multiplexed address is controlled by ALE
signal.
ALU consists of Accumulator, temporary register, arithmetic, logic circuits and five flags.
09․ Which components are NOT found on chip in a microprocessor but may be found on
chip in a microcontroller?
SRAM & USART
EPROM & PORTS
EPROM, USART & PORTS
SRAM, EPROM & PORTS
EPROM, USART & PORTS are found on chip in microcontroller but not in
microprocessor chip.
8085 requires a signal +5V power supply and operates at 3.2 MHZ single phase clock
02․ The output data lines of microprocessor and memories are usually tristated because
More than one device can transmit information over the data bus by enabling only
one device at a time
More than one device can transmit over the data bus at the same time
The data line can be multiplexed for both input and output
It increases the speed of data transfer over the data bus
Using tristate buffer, more than one device can transmit information over the data bus by
enabling only one device at a time.
03․ The correct sequence of steps in the instruction cycle of a basic computer is
Fetch, Execute, Decode and Read effective address.
Read effective address, Decode, Fetch and Execute.
Fetch, Decode, Read effective address and, Execute.
Allenhouse Institute of Technology (UPTU Code : 505)
Fetch, Read effective address, DecodeRooma,
andKanpur
Execute.
– 208 008
At first instruction is fetched then decoded and then read effective address and executed.
In a 8085 microprocessor Accumulator, register B & C are of 8-bit whereas stack pointer is
a 16-bit register.
05․ The register which holds the information about the nature of results of arithmetic and
logic operations is called as
Accumulator
Condition code register
Flag register
Process status register
07․ While using a frequency counter for measuring frequency, two modes of
measurement are possible:
1. Period time
2. Frequency mode
There is a ‘cross-over frequency’ below which the period mode is preferred. Assuming
the crystal oscillator frequency to be 4MHz, the crossover frequency is given by
8 Mhz.
2 Mhz.
2 Khz.
1Khz.
08․ In 8085 microprocessor system with memory mapped I/O, which of the following is
true?
Devices have 8-bit address line
Devices are accessed using IN and OUT instructions
There can be maximum of 256 input devices and 256 output devices
Arithmetic and logic operations can be directly performed with the I/O data
With the memory mapped I/O arithmetic and logic operations can be directly performed
whereas with I/O mapped I/O it is not possible. Options A, B, C are valid for I/O mapped
I/O.
Allenhouse Institute of Technology (UPTU Code : 505)
09․ Consider the following statements: Arithmetic Logic Unit (ALU) 1.Performs
Rooma, Kanpur – 208 008
arithmetic operations 2.Performs comparisons. 3.Communicates with I/O devices 4.Keeps
watch on the system Which of these statements are correct?
1, 2, 3 and 4
1, 2 and 3
1 and 2 only
3 and 4 only
ALU performs arithmetic and logical operations. Note: Comparison is a logical operation.
Ready signal is used to provide proper wait state when processor is communicating with
a slow peripheral device.
01․ A bus connected between the CPU and main memory that permits transfer of
information between main memory and the CPU is known as
DMA bus
Memory bus
Address bus
Control bus
We know data bus (Also known as Memory bus) allows transfer of information between
main memory and the CPU.
Allenhouse Institute of Technology (UPTU Code : 505)
02․ The operations executed by two or more control units are referred as
Rooma, Kanpur – 208 008
Micro-operations
Macro-operations
Multi-operations
Bi control-operations
The operations executed by two or more control units are referred as Macro-operations.
03․ Consider the following registers: 1. Accumulator and flag register 2. B and C register
3. D and E register 4. H and L register Which of these 8-bit registers of 8085
microprocessor can be paired together to make a 16-bit register?
1, 3 and 4
2, 3 and 4
1, 2 and 3
1, 2 and 4
We can not combine accumulator and flag register to form 16-bit register whereas B & C,
D & E, H & L can be combined to form a 16-bit register.
04․ In a microcomputer , the address of memory locations are binary numbers that
identify each memory circuit where a byte is stored. If a microcomputer uses 20-bit
address, then numbers of different memory locations are
20
220
220-1
220 - 1
Since one hex digit can represent 4 binary bits, it will take 5 hex digits to represent the 20-
bit address of a memory location.
08․ Bus Interface Unit (BIU) in 8086 performs the following functions:
Instruction decoding.
Allenhouse Institute of Technology (UPTU Code : 505)
Instruction fetch. Rooma, Kanpur – 208 008
Arithmatic and Logic operations.
All the above.
BIU has the following functions: Instruction fetching, Instruction queuing, Operand
fetching and storage, Address relocation and Bus control.
10․ During the execution of the instruction, the ________tests the status and control flags
and updates them based on the results of executing the instruction.
None of these
Both ‘c’ and ‘d’
Bus Interface Unit (BIU)
Execution Unit (EU)
EU tests the status and control flags and updates them based on the results of executing
the instruction, during the execution of the instruction.
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
01․ How many bytes in a zero memory page should be reserved for vectors used by RST
instructions?
16.
32.
64.
128.
First 64 bytes in a zero memory page should be reserved for vectors used by RST
instructions.
CALL instruction is a 3 bytes instruction. The processor calls the subroutine, address of
which is specified in the second and third bytes of the instruction.
RESET OUT signal indicates that microprocessor is being reset. This signal can be used to
reset other devices. The signal is synchronized to the processor clock and lasts an integral
number of clock periods.
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
HOLD, HLDA and READY all are Direct Memory Access signals of 8085.
PUSH: This instruction pushes the register pair onto stack. The contents of the register
pair designated in the operand are copied onto the stack in the following sequence. The
stack pointer register is decremented and the contents of the highorder register (B, D, H,
A) are copied into that location. The stack pointer register is decremented again and the
contents of the low-order register (C, E, L, flags) are copied to that location. Eg: - PUSH B
PUSH A POP: This instruction pop off stack to register pair. The contents of the memory
location pointed out by the stack pointer register are copied to the low-order register (C,
E, L, status flags) of the operand. The stack pointer is incremented by 1 and the contents
of that memory location are copied to the high-order register (B, D, H, A) of the operand.
The stack pointer register is again incremented by 1. Eg: - POP H POP A
06․ XCHG instruction exchanges the content of H-L with ______ register pair.
B-C
Allenhouse Institute of Technology (UPTU Code : 505)
PSW Rooma, Kanpur – 208 008
D-E
Stack Pointer
Exchange H and L with D and E. The contents of register H are exchanged with the
contents of register D, and the contents of register L are exchanged with the contents of
register E.
07․ SPHL instruction copies the content of H-L register pair to the _________.
D-E
B-C
Stack Pointer
PSW
SPHL: - This instruction copies H and L register to the stack pointer. The instruction
loads the contents of the H and L registers into the stack pointer register, the contents of
the H register provide the high-order address and the contents of the L register provide
the low-order address. The contents of the H and L registers are not altered.
Software Interrupts are those which are inserted in between the program which means
these are mnemonics of microprocessor. There are 8 software interrupts in 8085
microprocessor. They are – RST 0, RST 1, RST 2, RST 3, RST 4, RST 5, RST 6, RST 7.
Non-Vectored Interrupts are those in which vector address is not predefined. The
interrupting device gives the address of sub-routine for these interrupts. INTR is the only
non-vectored interrupt in 8085 microprocessor.
Allenhouse Institute of Technology (UPTU Code : 505)
roprocessor Rooma, Kanpur – 208 008
8
Page 8 of 19. Go to page
01․ ________used to implement the hardware interrupts (RST 7.5, RST 6.5, RST 5.5) by
setting various bits to form masks or generate output data via the Serial Output Data
(SOD) line.
RIM
SIM
EI
DI
Set Interrupt Mask (SIM) – It is used to implement the hardware interrupts (RST 7.5, RST
6.5, RST 5.5) by setting various bits to form masks or generate output data via the Serial
Output Data (SOD) line. First the required value is loaded in accumulator then SIM will
02․ _____________is used to read the status of the hardware interrupts (RST 7.5, RST 6.5,
RST 5.5) by loading into the A register a byte which defines the condition of the mask bits
for the interrupts.
SIM
RIM
DI
EI
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
Read Interrupt Mask (RIM) – This instruction is used to read the status of the hardware
interrupts (RST 7.5, RST 6.5, RST 5.5) by loading into the A register a byte which defines
the condition of the mask bits for the interrupts. It also reads the condition of SID (Serial
4.
3.
2.
There are four segments in 8086: Code, Stack, Data and Extra.
04․ The first microprocessor to include virtual memory in the intel microprocessor family
is
80286
80386
80486
Pentium
05․ Assertion(A): Segment override prefix (SOP) is used when a default offset register is
not used with its default base segment register but with a different base register.
Reason(R): The offset registers IP and SP can never be associated with any other segment
registers apart from their respective default segments.
Both A & R are true and R is the correct explanation of A.
Program counter is a 16-bit register which points the address of next instruction to be
fetched.
08․ During which T-state, contents of OP code from memory are loaded into IR
(Instruction Register)?
T1 OP code fetch
T2 OP code fetch
T3 OP code fetch
T4 OP code fetch
During T3 time period opcode from memory are loaded into instruction register (IR).
09․ Assuming LSB is at position 0 and MSB at position 7, which bit positions are not used
(Undefined) in flag register of an 8085 microprocessor?
1, 3, 5
2, 3, 5
1, 2, 5
Allenhouse Institute of Technology (UPTU Code : 505)
1, 3, 4 Rooma, Kanpur – 208 008
Among eight bit (0 to 7) 1st, 3rd and 5th bits are undefined in a flag register.
10․ At the beginning of a fetch cycle, the contents of the program counter are
incremented by one.
Memory Address Register (MAR) is used to hold the address of memory before it is
placed on address bus.
9
Page 9 of 19. Go to page
01․ The relation among IC (Instruction Cycle), FC (Fetch cycle) and EC (Execute Cycle) is
IC = FC - EC
IC = FC + EC
IC = FC + 2EC
EC = IC + FC
Allenhouse Institute of Technology (UPTU Code : 505)
Instruction cycle consists of fetch cycle and execute cycle.
Rooma, Kanpur – 208 008
02․ Each instruction in an assembly language program has the following fields 1. Label
field 2. Mnemonic field 3. Operand field 4. Comment field What are the correct sequence
of these fields?
1, 2, 3 and 4
2, 1, 4 and 3
1, 3, 2 and 4
2, 4, 1 and 3
The correct sequence of any Instruction in an assembly language program is Label field,
Mnemonic field, Operand field and Comment field.
245
246
247
8-bit controller
8-interrupt lines
Z-80
68000
6502
8085, Z-80 and 6502 are 8-bit microprocessors whereas 68000 is a 16-bit microprocessor.
06․ Which one of the following microprocessor has 16-bit data bus?
8085
Z-80
68000
6502
Allenhouse Institute of Technology (UPTU Code : 505)
68000 is a 16-bit microprocessor. So it hasRooma,
16 data lines.
Kanpur – 208 008
memory
I/O device
Bi-directional
None
Address bus of any microprocessor is always Unidirectional. Address bus points only
memory location so it is unidirectional.
None
A data can be moved from microprocessor to memory and also from memory to
microprocessor. So Data bus of any microprocessor is always Bi-directional.
never multiplexed.
none of these.
Multiplexing of address bus and data buses depends upon internal architecture of any
microprocessor.
9
Page 9 of 19. Go to page
01․ The relation among IC (Instruction Cycle), FC (Fetch cycle) and EC (Execute Cycle) is
IC = FC - EC
IC = FC + EC
Allenhouse Institute of Technology (UPTU Code : 505)
IC = FC + 2EC Rooma, Kanpur – 208 008
EC = IC + FC
02․ Each instruction in an assembly language program has the following fields 1. Label
field 2. Mnemonic field 3. Operand field 4. Comment field What are the correct sequence
of these fields?
1, 2, 3 and 4
2, 1, 4 and 3
1, 3, 2 and 4
2, 4, 1 and 3
The correct sequence of any Instruction in an assembly language program is Label field,
Mnemonic field, Operand field and Comment field.
245
246
247
8-bit controller
8-interrupt lines
Z-80
68000
6502
8085, Z-80 and 6502 are 8-bit microprocessors whereas 68000 is a 16-bit microprocessor.
06․ Which one of the following microprocessor has 16-bit data bus?
8085
Z-80
68000
Allenhouse Institute of Technology (UPTU Code : 505)
6502 Rooma, Kanpur – 208 008
memory
I/O device
Bi-directional
None
Address bus of any microprocessor is always Unidirectional. Address bus points only
memory location so it is unidirectional.
Allenhouse Institute of Technology (UPTU Code : 505)
09․ The data bus of any microprocessor is always
Rooma, Kanpur – 208 008
Unidirectional
Bi-directional
None
A data can be moved from microprocessor to memory and also from memory to
microprocessor. So Data bus of any microprocessor is always Bi-directional.
never multiplexed.
none of these.
Multiplexing of address bus and data buses depends upon internal architecture of any
microprocessor.
One and only non-maskable interrupt in 8085 microprocessor is TRAP which is also
known as RST 4.5
When more data is to be transferred between memory and I/O device DMA operation is
used with the help of DMA controller.
Interrupt facility is mandatory for any process control system to have proper control on
the system.
In microprocessor based system I/O ports are used to interface all the I/O devices.
Stack pointer is nothing but the register which holds the address of the top of the stack,
resides within the microprocessor.
In a microprocessor based system the stack is always in Random Access Memory (RAM).
01․ The 8085 microprocessor uses a crystal of frequency 6.25 Mhz. The T-state value is
320ns
640ns
960ns
1280ns
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
We know Now,
03․ In an 8085 microprocessor based system, the contents of SP are 1000H, PUSH B
instruction will transfer the contents of registers B & C respectively for memory locations
0FFF H and 0FFE H
0FFE H and 0FFF H
1000 H and 0FFF H
1000 H and 1001 H
Stack pointer indicates the top of the stack memory. If data are to be moved in stack
memory then those will start to be stored from above the address contained by stack
pointer. In this problem stack pointer contains 1000 H. So when PUSH B instruction is
given data will start to be stored from 0FFF H, 0FFE H, 0FFD H onwards.
04․ In an 8085 microprocessor based system, the contents of SP are 2000H. POP H
instruction will transfer the contents of memory location
2001H and 2002H to H and L registers respectively
2001H and 2000H to H and L registers respectively
Allenhouse Institute of Technology (UPTU Code : 505)
2000H and 1FFFH to H and L registers respectively
Rooma, Kanpur – 208 008
2000H and 1999H to H and L registers respectively
The content of 2001 H will be stored into H and content of 2000 H will be stored in L.
PUSH B instruction allows to copy the contents of register pairs B & C to the stack
SUB R instruction allows to subtract the content of register R from Accumulator (A).
Likewise, SUB A instruction will allow to subtract the content of Accumulator form
Accumulator. Hence, carry and sign flags will be reset.
07․ In 8085 microprocessor , let the accumulator contains the value 0AH and register C
contains the value 05H. After CMP C instruction is executed, the
zero and carry flags will be set
zero and carry flags will be reset
Allenhouse Institute of Technology (UPTU Code : 505)
zero flag will be set and carry flag will be reset
Rooma, Kanpur – 208 008
zero flag will be reset and carry flag will be set
CMP C instruction allows to subtract the content of Register C from Accumulator. So, in
the given problem 05 H will be subtracted from 0AH and results 05 H whose binary form
is (0000 0101)2. As content of Accumulator is greater than register C then both the carry
and zero flag are reset.
09․ In 8085 microprocessor, in response to RST 7.5 interrupts the execution is transferred
to memory location
0000H
002CH
0034H
003CH
The vector address of RST 7.5 is hexadecimal equivalent of . So, in response to RST
7.5 interrupts the execution is transferred to memory location 003CH.
8085 microprocessor has two signals to implement serial data transmission SID(Serial
Input Data) and SOD(Serial Output Data).Serial I/O is also possible through SIM (Serial
output data) and RIM (Serial input data) instruction in 8085 microprocessor.
01․ EPROMs are preferred for storing programs while developing new microprocessor
based system. Because of their
non-volatile characteristic
erasable and programmable characteristic
random access characteristic
all the above characteristic
02․ When any data transfer instruction, to transfer the data from memory to
microprocessor, is executed the condition flags are
not affected
always set
always reset
affected indicating specific conditions
Data transfer operation does not affect any of the flags in 8085 microprocessor.
Allenhouse Institute of Technology (UPTU Code : 505)
03․ Let the content of accumulator and register B be 0000 0100 and 0100 0000 respectively
Rooma, Kanpur – 208 008
before execution of instruction SUB B. The content of accumulator after the execution of
this instruction will be
00000100
01000000
11000100
010001000
SUB B allows subtraction of content B from A and the result is stored in the accumulator.
In the given problem we have to subtract 0100 0000 from 0000 0100. Hence the
content of the accumulator after execution the given instruction will be 11000100.
04․ Let the content of register C be 00000000 before the instruction DCR C is executed.
The content of register C after the after the execution of this instruction will be
00000000
11111111
00000001
None
Cycle stealing mode of DMA operation takes place while the microprocessor is executing
a program and an interface circuit takes over control of address, data and control buses
when not in use by microprocessor.
07․ Which of the following is not true during the execution of an interrupt service routine,
which does not contain any EI instructions
the microprocessor can be interrupted by a non-mask able interrupt
the microprocessor cannot be interrupted by any interrupt
the microprocessor cannot be interrupted by any mask able interrupt
all interrupts except non-maskable interrupt are disabled
8085 has multiplexed bus which acts as address bus as well as data bus(AD0-AD7). So
ALE is required to indicate status of the buses.
09․ Which of the following interrupt is both level and edge sensitive?
RST 5.5
INTR
RST 7.5
TRAP
TRAP is one and only interrupt having both level and edge sensitive triggering.
The addressing mode in instruction PUSH B is register indirect. The contents of the
source registers are not altred after the PUSH instruction
Among all interrupts RST 7.5 is only positive edge sensitive.RST 6.5 and RST 5.5 are level
sensitive triggered.TRAP is both level and edge sensitive triggered.
INTR is the one and only non-vectored interrupt in 8085 microprocessor so it has no
addressing available in 8085 microprocessor. For INTR, external hardware is used to
transfer program to specific CALL location.
After receiving an interrupt signal at first microprocessor will complete the current
instruction and then it will branch off to the interrupt service routine.
The ALE (Address Latch Enable) line of 8085 microprocessor is used to latch the 8-bit of
address lines AD0-AD7 into an external latch.
05․ The first operation performed in INTEL 8085 microprocessor after RESET is
instruction fetch from 0000H
memory read from the location 0000H
instruction fetch from location 8000H
stack initialization
After RESET instruction the processor execution will initialize from 0000H.
07․ The 8085 microprocessor will enter into INA cycle after recognition of
Allenhouse Institute of Technology (UPTU Code : 505)
any interrupt Rooma, Kanpur – 208 008
TRAP only
INTR only
RST 7.5,RST 6.5 & RST 5.5 only
The 8085 microprocessor will enter into INA cycle after recognition of INTR only.
08․ Which of the following lists the interrupt in decreasing order of priority?
TRAP, RST 5.5, RST 6.5, RST 7.5, INTR
INTR, TRAP, RST 7.5, RST 6.5, RST 5.5
TRAP, RST 7.5, RST 6.5, RST 5.5, INTR
RST 7.5, RST 6.5, RST 5.5, TRAP, INTR
Priority wise decreasing order of interrupts is TRAP, RST 7.5, RST 6.5, RST 5.5, INTR. The
first four interrupt are vectored interrupt. TRAP is highest priority interrupt but has a
lower priority than HOLD signal.
For vectored interrupt the microprocessor assigns a specified memory location. The
interrupt vector address for TRAP is 0024H.
10․ In order to reset the carry without affecting the accumulator content one has to use,
Allenhouse Institute of Technology (UPTU Code : 505)
SUB A Rooma, Kanpur – 208 008
XRA A
ORA A
CMC
After OR operation CY (carry flag) & AC (auxiliary carry flag) is reset by default. So this
is the most suitable instruction to reset carry
01․ Maximum number of I/O that can be addressed by the INTEL 8085 is
65536
285
512
256
I/O has 8 bit port address so maximum number of I/O that can be addressed by the
INTEL 8085 is 28=256
02․ The microprocessor may be made to exit from HALT state by asserting
RESTART
any of the five interrupt lines
READY line
A or B or HOLD line
The microprocessor may be made to exit from HALT state by asserting RESTART or any
of the five interrupt lines or HOLD line.
03․ In order to complement the lower nibble of accumulator one can use
ANI 0FH
XRI 0FH
Allenhouse Institute of Technology (UPTU Code : 505)
ORI 0FH Rooma, Kanpur – 208 008
CMA
By XRI operation the 8 bit data are exclusive ORed with the contents of the accumulator
and results are placed in the accumulator.Let the content of accumulator is 0101 1010.
Now EXORing it with 0FH = (0000 1111)2. We will get the answer 0101 0101 which will be
stored in the accumulator. Hence we can see XRI 0FH instruction can be used to
complement the content of lower nibble of accumulator.
04․ The 8085 microprocessor enters into bus idle machine cycle whenever
INTR interrupt is recognized
RST 7.5 is recognized
DAD RP instruction is executed
none of the above
When RST 7.5 is recognized the 8085 microprocessor enters into bus idle machine cycle.
In INTEL 8255, RESET is a active high signal which clears the control register and sets all
the ports in the input mode or mode 0.
ALE is address latch enable signal.The microprocessor issues ALE or it goes high during
first clock cycle of every machine cycle.
AD0 to AD7 can be used for both transmit data or address at different moments.Thus
these bus operate in time sharing mode which is called multiplexing.The data lines of
8085 microprocessor are multiplexed with lower order address lines to increase the
effective width of address bus.
09․ RST 3 instruction will cause the processor to branch to the location
Allenhouse Institute of Technology (UPTU Code : 505)
0000H Rooma, Kanpur – 208 008
0018H
0024H
0028H
For every vectored interrupt irrespective of software and hardware 8-bytes are
allocated.Generally the allocated memory address will be 8*interrupt and its equivalent
hexadecimal value. Example for RST 3 the memory address location would be
8*3=(24)10=(18)H.So the correct ans will be (0018)H.
10․ Which of the following instruction will never affect the zero flag?
DCR R
ORA R
DCX Rp
XRA R
By DCR B, the contents of the register is decreased by 1.The zero flag is affected but the
carry flag is not affected. Due to ORA R the contents of the accumulator is ORed with the
contents of register R.Zero and carry flag both are affected. Due to DCX Rp instruction
register pair is decremented by1, no flags will be affected i.e. zero flag also will be
unaffected. Due to XRA R the content of accumulator is Ex-ORed with register R, both
zero and carry flag is affected.
01․ The content of the A15-A8 (higher order address lines) while executing “IN 8-bit port
address” instruction are
same as the content of A7-A0
irrelevant
all bits reset (i.e. 00H)
all bits set (i.e. FFH)
“IN 8-bit port address” is an 8 bit port address. The maximum port range is up to (FF)H.
For executing this instruction the high order (A15-A8) port address is duplicated to low
Allenhouse Institute of Technology (UPTU Code : 505)
order (A7 -A0) port address. So high order address bus has same content as low order
Rooma, Kanpur – 208 008
address bus.
TRAP, RST 7.5, RST 6.5 and RST 6.5 are the vector interrupts in 8085. In a vector interrupt
the branch address is assigned to a specific location in memory page without any external
hardware.
02․ A sequence of two registers that multiplies the content of DE register pair by two and
stores the result in HL register pair (in 8085 assembly language) is
XCHG & DAD B
XTHL & DAD H
PCHL & DAD D
XCHG & DAD H
XCHG → exchange the content of DE register pair with HL pair. DAD H → add the
content of HL pair with HL pair. So, after following these two sequences of instructions
the content of DE register pair will be multiplied by two and saved to the HL register
pair.
8253 and 8254 are the programmable interval timer. It can generate accurate time delays
by using software instruction.It can be used as accurate time delays,square wave
generator etc.
Programmable communication interface is used for the serial data transmission.Intel 8251
is a programmable communication interface.It is Universal Synchronous /Asynchronous
Receiver/ Transmitter (USART).
In DMA data transfer data is directly transferred between I/O to the RAM or from the
RAM to the I/O. 8257 and the 8237 are used as a programmable DMA controller. In this
question the correct answer would be 8257.
Allenhouse Institute of Technology (UPTU Code : 505)
06․ Pick up the programmable interrupt controller from the following
Rooma, Kanpur – 208 008
8279
8259
8257
8275
08․ The maximum number of seven segment displays that can be connected to 8279 is
12
16
18
8
The maximum number of seven segment displays that can be connected to 8279 is 18.
09․ Using one 8259 IC is equivalent to providing …………. INTR pins on 8085
Allenhouse Institute of Technology (UPTU Code : 505)
16 Rooma, Kanpur – 208 008
12
8
18
The 8253 is a 24 pin IC which can be programmed in any of the following 6 operating
modes e.g. Interrupt on terminal count,programmable one shot,Rate generator, Square
wave generator, software triggered strobe and hardware triggered strobe
POP 30 H instruction is not possible in 8085 because POP instruction is used with register
pair or PSW. By using this instruction the content of the memory location pointed out by
the stack pointer register are copied to the low order register. 30 H is not a valid register
pair or memory address so this instruction is invalid
Allenhouse Institute of Technology (UPTU Code : 505)
04․ How many T-states are required for execution of OUT 80H instruction?
Rooma, Kanpur – 208 008
10
13
16
7
OUT operation means Output data from Accumulator to a port with 8 bit address.The
contents of the accumulator are copied into the output port.It is a two byte operation with
3 machine cycles and 10 T states.10T states 4 for Opcode fetch, 3 for Memory read and 3
for I/O write operation.
05․ How many machine cycles are required for execution of IN 30H instruction
3
4
5
6
IN instruction means Input data to Accumulator from a port with 8-bit address.IN 30H is
a 2 byte instruction which requires 3 machine cycles i.e. Opcode fetch, read, read(operand
read from the 8 bit port address).
By POP instruction the contents of the memory location pointed out by the stack pointer
register are copied to the low order register of the operand.POP D is an 1 byte instruction.
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
The flags (flip flop) are affected by the arithmetical and logical operations in the ALU.
Flags generally reflects the data conditions in the accumulator with some exception. INX
B is a instruction which increment the content of the register pair BC by 1 and it does not
affect any of the flags.
While STC instruction executes, microprocessor sets the carry flag to 1. So this instruction
affects the carry flag only.
10․ Which instruction is required to rotate the content of accumulator one bit right along
with carry?
RLC
RAL
RRC
RAR
RAR instruction means rotate accumulator right through carry. By this instruction each
bit of the accumulator is rotated right by one position through the carry flag. The carry
flag is set by the least significant digit and content of the carry flag is placed in the most
significant position. Example : accumulator contents before instruction is 10100111 and
the flag is set by 0. After the instruction executes the accumulator content is 01010011 and
the flag is set by 1.
If we want to make any bit “1”, then we have to OR that bit with “1” so that the bit
becomes “1”. We also have to OR the remaining bits of the register with “0” so that they
remain unaltered.
When RET instruction is executed by any subroutine then two bytes from the top of the
stack will be popped out and assigned to the Program counter and the program execution
begins at the new address.
TRAP, RST 7.5, RST 6.5 and RST 6.5 are the vector interrupts in 8085. In a vector interrupt
the branch address is assigned to a specific location in memory page without any external
hardware.
02․ A sequence of two registers that multiplies the content of DE register pair by two and
stores the result in HL register pair (in 8085 assembly language) is
XCHG & DAD B
XTHL & DAD H
PCHL & DAD D
XCHG & DAD H
XCHG → exchange the content of DE register pair with HL pair. DAD H → add the
content of HL pair with HL pair. So, after following these two sequences of instructions
the content of DE register pair will be multiplied by two and saved to the HL register
pair.
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
8253 and 8254 are the programmable interval timer. It can generate accurate time delays
by using software instruction.It can be used as accurate time delays,square wave
generator etc.
Programmable communication interface is used for the serial data transmission.Intel 8251
is a programmable communication interface.It is Universal Synchronous /Asynchronous
Receiver/ Transmitter (USART).
08․ The maximum number of seven segment displays that can be connected to 8279 is
12
16
18
8
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
The maximum number of seven segment displays that can be connected to 8279 is 18.
09․ Using one 8259 IC is equivalent to providing …………. INTR pins on 8085
16
12
8
18
The 8253 is a 24 pin IC which can be programmed in any of the following 6 operating
modes e.g. Interrupt on terminal count,programmable one shot,Rate generator, Square
wave generator, software triggered strobe and hardware triggered strobe
28. The first microprocessor to include virtual memory in the Intel microprocessor
family is
a. 80286
b. 80386
c. 80486
d. Pentium
Answer
Answer. a
29. Program counter in a digital computer
a. counts the numbers of programs run in the machine ,
b. counts the number of times a subroutine is called
c. counts the number of times the loops are executed
d. points the memory address of the current or the next instruction to be
executed
Answer
Answer. d
30. Assuming LSB is at position 0 and MSB at position 7, which bit positions are not
used (undefined) in Flag Register of an 8085 microprocessor?
a. 1, 3, 5
b. 2, 3, 5
c. 1, 2, 5
d. 1, 3, 4
Answer
Answer. a
31. At the beginning of a fetch cycle, the contents of the program counter are
a. incremented by one
b. transferred to address bus
c. transferred to memory address register
d. transferred to memory data register
Answer
Answer. c
32. Each instruction in an assembly language program has the following fields
1. Label field
2. Mnemonic field
Allenhouse Institute of Technology (UPTU Code : 505)
3. Operand field Rooma, Kanpur – 208 008
4. Comment field
What is the correct sequence of these fields?
a. 1, 2, 3 and 4
b. 2, 1, 4 and 3
c. 1,3, 2 and 4
d. 2, 4, 1 and 3
Answer
Answer. a
33. The relation among IC (lnstruction Cycle), FC (Fetch Cycle) and EC (Execute
Cycle) is
a. IC = FC − EC
b. IC = FC+ EC
c. IC= FC + 2EC
d. EC = IC+FC
Answer
Answer. b
34. When a peripheral is connected to the microprocessor in input/output mode,
the data transfer takes place between
a. any register and I/O device
b. memory and I/O device
c. accumulator and I/O device
d. HL registerand I/O device
Answer
Answer. c
35. While execution of I/O instruction takes place, the 8-bit address of the port is
placed on
a. lower address bus
b. higher address bus
c. data bus
d. lower as well as higher-order address bus
Answer
Answer. d
Allenhouse Institute of Technology (UPTU Code : 505)
36. The length of a bus cycle in 8086/8088 is four clock cycles, T1, T2, T3, T4 and an
Rooma, Kanpur – 208 008
indeterminate number of wait state clock cycles denoted by TW. The wait states are
always inserted between
a. T1 and T2
b. T2 and T3
c. T3 and T4
d. T4 and T1
Answer
Answer. c
37. Which one of the following circuits transmits two messages simultaneously in
one direction?
a. Duplex
b. Diplex
c. Simplex
d. Quadruplex
Answer
Answer. b
38. A microprocessor is ALU
a. and control unit on a single chip
b. and memory on a single chip
c. register unit and I/O device on a single chip
d. register unit and control unit on a single chip
Answer
Answer. d
39. In Intel 8085 microprocessor, ALE signal is made high to
a. Enable the data bus to be used as low order address bus
b. To latch data D0— D7 from the data bus
c. To disable data bus
d. To achieve all the functions listed above
Answer
Answer. a
40. Output of the assembler in machine codes is referred to as
a. Object program
b. Source program
c. Macro instruction
Allenhouse Institute of Technology (UPTU Code : 505)
d. Symbolic addressing Rooma, Kanpur – 208 008
Answer
Answer. a
41. Which one of the following statements for Intel 8085 is correct?
a. Program counter (PC) specifies the address of the instruction last executed
b. PC specifies the address of the instruction being executed
c. PC specifies the address of the instruction be executed
d. PC specifies the number of instruction executed so far
Answer
Answer. c
42. The instruction RET executes with the following series of machine cycle
a. Fetch, read, write
b. Fetch, write, write
c. Fetch, read, read
d. Fetch, read
Answer
Answer. c
43. Which one of the following statements is correct regarding the instruction CMP
A?
a. Compare accumulator with register A
b. Compare accumulator with memory
c. Compare accumulator with register H
d. This instruction does not exist
Answer
Answer. a
44. The instruction JNC 16-bit refers to jump to 16-bit address if
a. Sign flag is set
b. Carry flag is reset
c. Zero flag is set
d. Parity flag is reset
Answer
Answer. b
45. Consider the following interrupts for 8085 microprocessor:
1. INTR
2. RST 5.5
Allenhouse Institute of Technology (UPTU Code : 505)
3. RST 6.5
4. RST 7.5 Rooma, Kanpur – 208 008
5. TRAP
If the interrupt is to be vectored to any memory location then which of the above
interrupt is/are correct?
a. 1 and 2 only
b. 1, 2, 3 and 4
c. 5 only
d. 1 only
Answer
Answer. d
46. Consider the following statements:
1. Auxiliary carry flag is used only by the DAA and DAS instruction.
2. Zero flag is set to 1 if the two operands compared are equal.
3. All conditional jumps are long type jumps.
Which of the above statements are correct?
a. 1, 2 and 3 only
b. 1 and 2 only
c. 1 and 3 only
d. 2 and 3 only
Answer
Answer. b
47. Among the given instructions, the one which affects maximum number of flags
is
a. RAL
b. POP PSW
c. XRA A
d. DCR A
Answer
Answer. c
48. XCHG instruction of 8085 exchanges the content of
a. top of stack with contents of register pair
b. BC and DE register pairs
c. HL and DE register pairs
d. None of the above
Answer
Answer. c
Allenhouse Institute of Technology (UPTU Code : 505)
49. Direction flag is used with Rooma, Kanpur – 208 008
a. String instructions
b. Stack instructions
c. Arithmetic instructions
d. Branch instructions
Answer
Answer. a
50. What will be the contents of DE and HL register pairs respectively after the
execution of the following instructions?
LXIH, 2500 H
LXID, 0200 H
DAD D
XCHG
a. 0200 H, 2500 H
b. 0200 H, 2700 H
c. 2500 H, 0200 H
d. 2700 H, 0200 H
Answer
Answer. d
51. In 8085 microprocessor, the address for ‘TRAP’ interrupt is
a. 0024 H
b. 002C H
c. 0034 H
d. 003C H
Answer
Answer. a
52. A ‘DAD H” instruction is the same as shifting each bit by one position to the
a. left
b. right
c. left with a zero inserted in LSB position
d. right with a zero inserted in LSB position
Answer
Answer. c
53. When a program is being executed in an 8085 microprocessor, its program
counter contains
Allenhouse Institute of Technology (UPTU Code : 505)
a. the memory address as the instruction that is to be executed next.
Rooma, Kanpur – 208 008
b. the memory address of the instruction that is being currently matched.
c. the total number of instructions in the program being executed.
d. the number of instructions in the current program that have already been
executed.
Answer
Answer. a
54. Which of the following data transfer is not possible in microprocessor?
a. Memory to accumulator
b. Accumulator to memory
c. Memory to memory
d. I/O device to accumulator
Answer
Answer. c
55. LOADER is a program that
a. loads the memories and generates a hex file
b. loads the hex file and converts to the executable file
c. loads the COM file and generates the binary code
d. loads English like command and generates the binary code
Answer
Answer. b
56. Which of the following instructions is closest match to the instruction POP PC?
a. RET
b. PCHL
c. POP PSW
d. DAD SP
Answer
Answer. a
57. How many machine cycles are required by STA instruction?
a. 2
b. 3
c. 4
d. 5
Answer
Answer. c
Allenhouse Institute of Technology (UPTU Code : 505)
58. Which of the following 8085 instruction will require maximum T-states for
Rooma, Kanpur – 208 008
execution?
a. XRI byte
b. STA address
c. CALL address
d. JMP address
Answer
Answer. c
59. In 8085 microprocessor, which mode of addressing does the instruction CMP M
use?
a. Direct addressing
b. Register addressing
c. Indirect addressing
d. Immediate addressing
Answer
Answer. c
60. With reference to 8085 microprocessor, which of the following statements are
correct?
1. INR is 1 byte instruction
2. OUT is 2 byte instruction
3. STA is 3 byte instruction
a. 1 and 2 only
b. 2 and 3 only
c. 1 and 3 only
d. 1, 2 and 3
Answer
Answer. d
61. Assume that the accumulator and the register C of 8085 microprocessor contain
respectively F0 H
and OF H initially. What will be the content of accumulator after execution of
instruction ADD C?
a. 00 H
b. FF H
c. EF H
d. FE H
Allenhouse Institute of Technology (UPTU Code : 505)
Answer
Rooma, Kanpur – 208 008
Answer. b
62. It is desired to multiply the numbers 0A H by OB H and store the result in the
accumulator. The numbers are available in registers B and C respectively. A part of
the 8085 program for this purpose is given below:
MVI A, OO H
Loop; ………..
………..
………..
HLT END
The sequence of instruction to complete the program would be
a. JNZ LOOP; ADD B, DCR C
a. 255
b. 510
c. 65025
d. 65279
Allenhouse Institute of Technology (UPTU Code : 505)
Answer
Rooma, Kanpur – 208 008
Answer. d
68. What is content of accumulator of 8085 microprocessor after the execution of
XRI F0 H instruction?
a. Only the upper nibble of accumulator is complemented
b. Only the lower nibble is complemented
c. Only the upper nibble is reset to zero
d. Only the lower nibble is reset to zero
Answer
Answer. a
69. The 8085 programming manual says that it takes seven T states to fetch and
execute the MOV instruction. If the system clock has a frequency of 2.5 MHz, how
long is an instruction Cycle?
a. 2.8 s
b. 2.5ns
c. 2.8 ns
d. 2.8 μs
Answer
Answer. d
70. The instruction PCHL, in 8085 is used for
71. The following instruction copies a byte of data from the accumulator into the
memory address given in the instruction
a. STA address
b. LDAX B
c. LHLD address
d. LDA address
Allenhouse Institute of Technology (UPTU Code : 505)
Answer
Rooma, Kanpur – 208 008
Answer. a
72. The instruction that exchanges top of stack with HL pair is
a. XTHL
b. SPHL
c. PUSH H
d. POP H
Answer
Answer. a
73. In 8085 microprocessor, during PUSH PSW Operation, Stack pointer is
a. Decremented by one
b. Decremented by two
c. Incremented by one
d. Incremented by two
Answer
Answer. b
74. While a program is being executed in an Intel 8085 microprocessor, the
program counter of the microprocessor contains:
a. The memory address of the instruction that is being currently executed.
b. The memory address of the instruction that is to be executed next.
c. The number of instructions that have already been executed.
d. The total number of instructions in the current program still to be executed.
Answer
Answer. b
75. The description of a program counter (PC) in 8085 microprocessor is
a. An up/down counter
b. An 8-bit register
c. Initialized automatically by microprocessor
d. Used to point to stack memory area
Answer
Answer. c
76. If the status of the control lines SI and SO is LOW, then 8085 microprocessor is
performing
Allenhouse Institute of Technology (UPTU Code : 505)
a. Reset operation Rooma, Kanpur – 208 008
b. HOLD operation
c. Halt operation
d. Interrupt acknowledge
Answer
Answer. c
77. LXI SP, 7FFF H
MVI A, 25 H
XRI 02 H
PUSH PSW
POP H
MOV A,L
ORI 10 H
HLT
What are the contents of A, H, L, SP and PSW registers after executing the above set
of instructions? Assume undefined flags always remain clear.
a. 10H, 25H, 00H, 7FFFH, 00H respectively
b. 14H, 27H, 04H, 7FFFH, 04H respectively
c. 14H, 25H, 00H. 7FFFH, 04H respectively
d. 10H, 27H, 04H, 7FFFH, 00H respectively
Answer
Answer. b
78. The content of the programme counter of an 8085 microprocessor is
a. the total number of instructions in the program already executed.
a. ADI
b. ACI
c. ADC
Allenhouse Institute of Technology (UPTU Code : 505)
d. ADD Rooma, Kanpur – 208 008
Answer
Answer. b
80. MVI A, AA H
ORI FFH
RRC
RRC
CMC
INR A
What are the contents of A and PSW registers after executing the above set of
instructions in sequence?
a. AAH and 00H
b. FFH and 66H
c. 00H and 54H
d. 00H and 00H
Answer
Answer. c
81. For which one of the following, the instruction XRA A in 8085 microprocessor
can be used?
a. Set the carry flag
b. Set the zero flag
c. Reset the carry flag and clear the accumulator
d. Transfer FFH to the accumulator
Answer
Answer. b
82. An 8085 microprocessor is executing the programme as follows:
MVI A, 20H
MVI B, 10H
BACK: NOP
ADD B
RLC
JNC BACK
HLT
Allenhouse Institute of Technology (UPTU Code : 505)
How many times the instruction NOP will be executed?
Rooma, Kanpur – 208 008
a. 4
b. 3
c. 2
d. 1
Answer
Answer. b
83. The stack pointer of an 8085 microprocessor is ABCD H. At the end of execution
of the sequence of instructions, what will be the content of the stack pointer?
PUSH PSW
XTHL
PUSH D
JMP FC70 H
a. ABCB H
b. ABCA H
c. ABC9 H
d. ABC8 H
Answer
Answer. c
84. What is the correct 8085 assembly language instruction that stores the contents
of H and L registers into the memory locations 1080 H and 1081 H respectively?
a. SPHL 1080 H
b. SHLD 1080 H
c. STAX 1080 H
d. SPHL 1081 H
Answer
Answer. b
85. When the operand requires for instruction is stored inside the processor, then
What this addressing mode is called?
a. Direct
b. Register
c. Implicit
d. Immediate
Answer
Answer. b
Allenhouse Institute of Technology (UPTU Code : 505)
86. Which one of the following addressing technique is not used in 8085
Rooma, Kanpur – 208 008
microprocessor?
a. Register
b. Immediate
c. Register indirect
d. Relative
Answer
Answer. d
87. In an instruction of 8085 microprocessor, how many bytes are present?
a. One or two
b. One, two or three
c. One only
d. Two or three
Answer
Answer. b
88. Which one is the indirect addressing mode in the following instructions?
a. LXI H 2050 H
b. MOV A, B
c. LDAX B
d. LDA 2050 H
Answer
Answer. c
89. The addressing mode used in the instruction JMP F347 H in case of an Intel
8085A microprocessor is which one of the following?
a. Direct
b. Register—indirect
c. Implicit
d. Immediate
Answer
Answer. d
Allenhouse Institute of Technology (UPTU Code : 505)
90. Carry flag is not affected after the execution of
Rooma, Kanpur – 208 008
a. ADD B
b. SBB B
c. INR B
d. ORA B
Answer
Answer. c
91. The contents of the Program Counter (PC), when the microprocessor is reading
from 2FFF H memory location, will be
a. 2FFE H
b. 2FFF H
c. 3000 H
d. 3001 H
Answer
Answer. c
92. If the HLT instruction of an Intel 8085A microprocessor is executed
a. the microprocessor is disconnected from the system bus till the RESET is
pressed.
b. the microprocessor halts the execution of the program and returns to the
monitor.
c. the microprocessor enters into a HALT state and the buses are tri-stated.
d. the microprocessor reloads the program counter from the locations 0024 H
and 0025 H.
Answer
Answer. c
93. The stack pointer of an 8085 A microprocessor contains ABCD H.
PUSH PSW
XTHL
PUSH D
JMP EC75 H
Allenhouse Institute of Technology (UPTU Code : 505)
At the end of the execution of the above instructions, what would be the content of
Rooma, Kanpur – 208 008
the stack pointer?
a. ABCB H
b. ABCA H
c. ABC9 H
d. ABC8 H
Answer
Answer. c
94. In an Intel 8085 A, what is the content of the Instruction Register (IR)?
a. MVI A
b. LDAX B
c. JMP 2050 H
d. MOV A,M
Answer
Answer. c
98. In 8085, the DAA instruction is used for
a. 10
b. 100
c. 16
d. 15
Answer
Answer. c
102. Read the following assembly language program segment of the 8085
microprocessor:
LXIH, 2501 H
MOV A, L
ORI F0 H
MOV L, A
MOV A, H
ANI F0 H
MOV H, A
HLT
What are the contents of A, H and L registers after executing the above set of
instructions in sequence?
a. Contents of A, H and L registers are 25, 20 and F1, respectively
b. Contents of A, H and L registers are 05, 25 and 01, respectively
c. Contents of A, H and L registers are 20, 20 and F1, respectively
d. Contents of A, H and L registers are 25, 05 and 01, respectively
Answer
Answer. c
103. On execution of the following segment 0f instructions in sequence
MVI A, 91H
XRI 91 H
Which one of the following is correct?
Allenhouse Institute of Technology (UPTU Code : 505)
a. Content of accumulator is 00 H. Carry, Auxiliary Carry and Zero flag set to 0, 1
Rooma, Kanpur – 208 008
and 0, respectively.
b. Content of accumulator is 91 H. Carry, Auxiliary Carry and Zero flag set to 0, 0
and 1, respectively.
c. Content of accumulator is 00 H. Carry, Auxiliary Carry and Zero flag set to 0, 0
and 1, respectively.
d. Content of accumulator is 91 H. Carry, Auxiliary Carry and Zero flag set to 0, 1
and 0, respectively.
Answer
Answer. c
104. Consider the following statements:
1. Indirect addressing is not possible for mapped I/O port addresses
2. Pointers can not be used to access memory-mapped I/O addresses
3. Fewer machine instructions can be used with I/O mapped I/O addressing as
compared to memory mapped I/O addressing
4. With an 8085 microprocessor, one can access at the most 512 devices with
unique addresses using I/O mapped I/O addressing
Which of these statements are correct?
a. 1, 2 and 3
b. 2 and 4
c. 3 and 4
d. 1 and 3
Answer
Answer. d
105. The contents of memory locations 2000 H, 2001 H and 2002 H are AAH, BBH
and CCH respectively. What are the contents of H and L registers after executing
the following instructions in sequence?
LXI H, 2001 H
LHLD 2001 H
Select the correct answer using the codes given below:
a. Contents of H and L registers are 20 H and 01 H, respectively
b. Contents of H and L registers are AAH and BBH, respectively
c. Contents of H and L registers are BBH and CCH, respectively
d. Contents of H and L registers are CCH and BBH, respectively
Answer
Answer. d
Allenhouse Institute of Technology (UPTU Code : 505)
106. The following sequences of instructions are executed by an 8085
Rooma, Kanpur – 208 008
microprocessor:
1000 LXI SP, 27FF
1003 CALL 1006
1006 POPH
What are the contents of the stack pointer (SP) and the HL register pair on
completion of execution of these instructions?
a. SP = 27 FF, HL = 1003
b. SP = 27 FD, HL = 1003
c. SP = 27 FF, HL = 1006
d. SP = 27 FD, HL = 1006
Answer
Answer. c
107. INR instruction of 8085 does not affect carry flag. Which of the following is
correct about INR instruction?
a. Overflow cannot be detected
b. Overflow can be detected
c. If a programme requires overflow to be detected, ADD instruction should be
used instead of INR
d. It can be used to increase the contents of the BC register pair
Answer
Answer. c
108. Consider the following 8085 instructions:
ANA A, ORA A, XRA A, SUB A, CMP A.
Now, consider the following statements:
1. All are arithmetic and logic instructions
2. All cause the accumulator to be cleared irrespective of its original contents
3. All reset the carry flag
4. All of them are 1-byte instructions
Which of these statements is/are correct?
a. 1, 2, 3 and 4
b. 2 only
c. 1, 2 and 4
d. 1,3 and 4
Answer
Answer. d
Allenhouse Institute of Technology (UPTU Code : 505)
109. Consider the program given below, which transfer a block of data from one
Rooma, Kanpur – 208 008
place in memory to another:
MVI C, 0B H
LXI H, 2400 H
LXI D, 3400 H
L1: MOV A, M
STAX D
INR L
INR E
DCR C
JNZ L1
What is the total number of memory accesses (including instruction fetches) carried
out?
a. 118
b. 140
c. 98
d. 108
Answer
Answer. a
110. Consider the following statements about register indirect addressing:
1. It helps in writing code that executes faster
2. It helps in writing compact code
3. It allows reuse of memory CPU data transfer instruction
4. It is essential for stack operations
Which of these statements are correct?
a. 1, 3 and 4
b. 1, 2 and 4
c. 2,3 and 4
d. 1,2 and 3
Answer
Answer. b
111. Which one of the following 8085 assembly language instructions does not
affect the contents of the accumulator?
a. CMA
b. CMP B
Allenhouse Institute of Technology (UPTU Code : 505)
c. DAA Rooma, Kanpur – 208 008
d. ADD B
Answer
Answer. b
112. If the accumulator of an Intel 8085A microprocessor contains 37 H and the
previous operation has set the carry flag, the instruction ACI 56 H will result in
a. 8E H
b. 94H
c. 7E H
d. 84 H
Answer
Answer. a
113. Examine the following instruction to be executed by a 8085 microprocessor.
The input port has an address of 01 h and has a data 05 h to input:
IN 01 H
ANI 80 H
After the execution of the two instructions the following flag portions may occur:
1. Zero flag is set
2. Zero flag is reset
3. Carry flag is cleared
4. Auxiliary carry flag is set
Select the correct answer using the codes given below:
a. 1 and 3
b. 2, 3 and 4
c. 1, 3 and 4
d. 1, 2 and 4
Answer
Answer. c
114. For 8085 microprocessor, the instruction RST 6 restarts subroutine at address
a. 00 H
b. 03 H
c. 30 H
d. 33 H
Allenhouse Institute of Technology (UPTU Code : 505)
Answer
Rooma, Kanpur – 208 008
Answer. c
115. Which one of the following function is performed by the 8085 instruction MOV
H, C?
ANI FF H
RAL
MOV B, A
ANI FF H
RAL
ANI FF H
RAL
ADD B
The operation carried out by the programme is
Allenhouse Institute of Technology (UPTU Code : 505)
a. multiplication of accumulator content by 10
Rooma, Kanpur – 208 008
b. complement of accumulator content
c. multiplication of accumulator content by 9
d. rotation of accumulator content three times
Answer
Answer. a
118. When RET instruction is executed by any Subroutine then
a. the top of the stack will be popped out and assigned to the PC
b. without any operation, the calling program would resume from instruction
immediately following the call instruction
c. the PC will be incremented after the execution of the instruction
d. without any operation, the calling program would resume from instruction
immediately following the call instruction, and also the PC will be incremented
after the execution of the instruction
Answer
Answer. a
119. An 8085 microprocessor-based system uses a 4 K x 8-bit RAM whose starting
address is AA00 H. The address of the last byte in this RAM is
a. 0FFF H
b. 1000 H
c. B9FF H
d. BA00 H
Answer
Answer. c
120. The address bus of Intel 8085 is 16-bit wide and hence the memory which can
be accessed by this address bus is
a. 2 k bytes
b. 4 k bytes
c. 16 k bytes
d. 64 k bytes
Answer
Answer. d
121. To address the full memory space of an Intel 8085 microprocessor four RAMS
of different sizes are available:
Allenhouse Institute of Technology (UPTU Code : 505)
1. 8K x 8 Rooma, Kanpur – 208 008
2. 16K x 4
3. 32K x 4
4. 32K x 16
What minimal combination of chip(s) will serve the purpose?
a. 1, 2, 3 and 4
b. 2
c. 3
d. 4
Answer
Answer. d
122. An example of 8085 instruction that uses direct addressing is
a. RLC
b. STA
c. RRC
d. CMA
Answer
Answer. b
123. A 16 bit memory address register can address memory locations of
a. 16 k
b. 32 k
c. 64 k
d. 128 k
Answer
Answer. c
124. What are the number of memories required of size 16 x 4 to design a memory
of size 64 x 8?
a. 2
b. 4
c. 6
d. 8
Answer
Answer. d
125. Which stack is used in 8085 microprocessors?
a. FIFO
Allenhouse Institute of Technology (UPTU Code : 505)
b. FILO Rooma, Kanpur – 208 008
c. LIFO
d. LILO
Answer
Answer. c
126. Memory chips of four different sizes as below are available:
1. 32 K x 4
2. 32 K x 16
3. 8 K x 8
4. 16 K x 4
All the memory chips as mentioned in the above list are Read/Write memory. What
minimal combination of chips or chip alone can map full address space of 8085
microprocessor?
a. 1 and 2
b. 1 only
c. 2 only
d. 4 only
Answer
Answer. b
127. A memory system of 64 Kbytes needs to be designed with RAM chips of 1
Kbyte each, and a decoder tree constructed with 2 : 4 decoder chips with “Enable”
input. What is the total number of decoder chips?
a. 21
b. 64
c. 32
d. 25
Answer
Answer. a
128. Which one of the following statements is correct?
a. ROM is 3 Read/Write Memory
b. PC points to the last instruction that was executed
c. Stack works on the principle of LIFO
d. All instructions affect the flags
Answer
Allenhouse Institute of Technology (UPTU Code : 505)
Answer. c Rooma, Kanpur – 208 008
129. How many and which types of machine cycles are needed to execute PUSH
PSW by an Intel 8085 A microprocessor?
a. 2; Fetch and Memory write
b. 3; Fetch and 2 Memory write
c. 3; Fetch and 2 Memory read
d. 3; Fetch, Memory read and Memory write
Answer
Answer. b
130. Memory-mapped I/O-scheme for the allocation of address to memories and
I/O devices, is used
for
a. small systems
b. large systems
c. both large and small systems
d. very large systems
Answer
Answer. A
Module 01
3. Microprocessor is the ________ of the computer and it perform all the computational tasks
A. main
B. heart
C. important
D. simple
ANSWER: B
Allenhouse Institute of Technology (UPTU Code : 505)
4. The purpose of the microprocessor is to control
A. memory Rooma, Kanpur – 208 008
B. switches
C. processing
D. tasks
ANSWER: A
22. The BIU prefetches the instruction from memory and store them in
A. queue
B. register
C. memory
ANSWER: A
33. Instruction providing both segment base and offset address are called
A. below type
.B. far type
C. low type
D. high type
ANSWER: B
35. The microprocessor determines whether the specified condition exists or not by testing the
A. carry flag
B. conditional flag
C. common flag
D. sign flag
ANSWER: B
Allenhouse Institute of Technology (UPTU Code : 505)
36. The LES copies to words from memory to register and
A. DS Rooma, Kanpur – 208 008
B. CS
C. ES
D. DS
ANSWER: C
39. The 8086 fetches instruction one after another from________of memory
A. code segment
B. IP
C. ES
D. SS
ANSWER: A
41. The_________is required to synchronize the internal operands in the processor CLK Signal
A. UR Signal
B. Vcc
C. AIE
D. Ground
ANSWER: A
43. The pin of minimum mode AD0- AD15 has _________data bus
A. 4 bit
B. 20 bit
Allenhouse Institute of Technology (UPTU Code : 505)
C. 16 bit
D. 32 bit Rooma, Kanpur – 208 008
ANSWER: C
44. The address bits are sent out on lines throughA. A16-19
B. A0-17
C. D0-D17
D. C0-C17
ANSWER: A
46. The functions of Pins from 24 to 31 depend on the mode in which________is operating
A. 8085
B. 8086
C. 80835
D. 80845
ANSWER: B
47. The RD, WR, M/IO is the heart of control for a_______mode
A. minimum
B. maximum
C. compatibility mode
D. control mode
ANSWER: A
50. In max mode, control bus signal So,S1 and S2 are sent out in _______form
A. decoded
B. encoded
C. shared
D. unshared
ANSWER: B
Allenhouse Institute of Technology (UPTU Code : 505)
51.What type of circuit is used at the interface point of an input port?
A. decoder Rooma, Kanpur – 208 008
B. latch
C. tristate buffer
D. none of the above
ANSWER: C
52.Because microprocessor CPUs do not understand mnemonics as they are, they have to be converted to ________.
A. hexadecimal machine code
B. binary machine code
C. assembly language
D. all of the above
ANSWER:B
53.A register in the microprocessor that keeps track of the answer or results of any arithmetic or logic operation is the:
A. stack pointer
B. program counter
C. instruction pointer
D. accumulator
ANSWER:D
56. Which of the following buses is primarily used to carry signals that direct other ICs to find out what type of
operation is being performed?
A. data bus
B. control bus
C. address bus
D. address decoder bus
ANSWER: B
57.What kind of computer program is used to convert mnemonic code to machine code?
A. debug
B. assembler
C. C++
D. Fortran
ANSWER: B
58. Which of the following are the three basic sections of a microprocessor unit?
A. operand, register, and arithmetic/logic unit (ALU)
Allenhouse Institute of Technology (UPTU Code : 505)
B. control and timing, register, and arithmetic/logic unit (ALU)
C. control and timing, register, and memory Rooma, Kanpur – 208 008
D. arithmetic/logic unit (ALU), memory, and input/output
ANSWER:B
72. The coded object modules of the program to be assembled are present in
A .ASM file
B .OBJ file
C .EXE file
D.OBJECT file
ANSWER: B
Explanation: .OBJ file is created with same name as source file and extension .OBJ. It contains the coded object modules
of the program to be assembled.
74. The extension that is essential for every assembly level program is
A. .ASP
B. .ALP
C. .ASM
D. .PGM
ANSWER:C
Explanation: All the files should have the extension, .ASM
75. The directory that is under work must have the files that are related to
A. Norton’s editor
B. Assembler
C. Linker
D. All of the mentioned
ANSWER: D
Explanation: Before starting the process of entering a small program on PC, ensure that all the files namely Norton’s
editor, assembler, linker and debugger are available in the same directory in which work is been done.
Module 02
5. Which flag is set to 1 when the result of arithmetic or logical operation is zero else it is set to 0?
A. Binary bit
B. Zero flag
C. Sign flag
D. Overflow flag
Answer : B
Explanation: Zero flag : This flag is set to 1 when the result of arithmetic or logical operation is zero else it is set to 0.
6. Which flag represents the result when the system capacity is exceeded?
A. Carry flag
B. Auxiliary flag
C. Trap flag
D. Overflow flag
Answer : D
Explanation: Overflow flag : This flag represents the result when the system capacity is exceeded.
9. Which instruction is Used to load the address of operand into the provided register?
A. LEA
B. LDS
C. LES
D. LAHF
Answer : A
Explanation: LEA : Used to load the address of operand into the provided register.
10. The different ways in which a source operand is denoted in an instruction is known as
A. Instruction Set
B. Interrupts
C. 8086 Configuration
D. Addressing Modes
Answer : D
Explanation: The different ways in which a source operand is denoted in an instruction is known as addressing modes.
There are 8 different addressing modes in 8086 programming
11. The remaining address line of ______ bus is decoded to generate chip select signal
A. Data
B. Address
C. Control bus
D. Both (a) and (b)
Answer : B
14. _____ has certain signal requirements write into and read from its registers
A. Memory
B. Register
C. Both (a) and (b)
Allenhouse Institute of Technology (UPTU Code : 505)
D. Control
Answer : A Rooma, Kanpur – 208 008
16. The primary function of the _____________ is to accept data from I/P devices
A. Multiprocessor
B. microprocessor
C. Peripherals
D. Interfaces
Answer : B
17. ___________ signal prevent the microprocessor from reading the same data more than one
A. pipelining
B. Handshaking
C. Controlling
D. Signaling
Answer : B
25. Which flag is set to 1 when the result of arithmetic or logical operation is zero else it is set to 0?
A. Binary bit
B. Zero flag
C. Sign flag
D. Overflow flag
Answer: B
Explanation: Zero flag : This flag is set to 1 when the result of arithmetic or logical operation is zero else it is set to 0.
26. Which flag represents the result when the system capacity is exceeded?
A. Carry flag
B. Auxiliary flag
C. Trap flag
D. Overflow flag
Answer : D
Explanation: Overflow flag : This flag represents the result when the system capacity is exceeded.
27. It is an edge triggered input, which causes an interrupt request to the microprocessor.
A. NMA
B. INTR
C. INTA
D. ALE
Answer : A
Explanation: NMI : It stands for non-maskable interrupt and is available at pin 17. It is an edge triggered input, which
causes an interrupt request to the microprocessor.
Allenhouse Institute of Technology (UPTU Code : 505)
28. It is used to write the data into the memory or the output device depending on the status of M/IO signal.
A. IR Rooma, Kanpur – 208 008
B. HLDA
C. HR
D. WR
Answer: D
Explanation: WR : It stands for write signal and is available at pin 29. It is used to write the data into the memory or the
output device depending on the status of M/IO signal.
29. Which instruction is Used to load the address of operand into the provided register?
A. LEA
B. LDS
C. LES
D. LAHF
Answer: A
Explanation: LEA : Used to load the address of operand into the provided register.
30. The different ways in which a source operand is denoted in an instruction is known as
A. Instruction Set
B. Interrupts
C. 8086 Configuration
D. Addressing Modes
Answer: D
Explanation: The different ways in which a source operand is denoted in an instruction is known as addressing modes.
There are 8 different addressing modes in 8086 programming
38. The _______ address of a memory is a 20 bit address for the 8086 microprocessor
A. Physical
B. Logical
C. Both
D. None of these
Answer :A
Module 03
4. If the data is present in a register and it is referred using the particular register, then it is
a) direct addressing mode
b) register addressing mode
c) indexed addressing mode
d) immediate addressing mode
Answer: b
Explanation: Since register is used to refer the address.
Allenhouse Institute of Technology (UPTU Code : 505)
5. The instruction, MOV AX,[BX] is an example of
a) direct addressing mode Rooma, Kanpur – 208 008
b) register addressing mode
c) register relative addressing mode
d) register indirect addressing mode
Answer: d
Explanation: Since the register used to refer to the address is accessed indirectly.
6. If the offset of the operand is stored in one of the index registers, then it is
a) based indexed addressing mode
b) relative based indexed addressing mode
c) indexed addressing mode
d) none of the mentioned
Answer: c
Explanation: In the indexed addressing mode, the offset of an operand is stored and in the rest of them, address is
stored.
8. If the location to which the control is to be transferred lies in a different segment other than the current one, then
the mode is called
a) intrasegment mode
b) intersegment direct mode
c) intersegment indirect mode
d) intersegment direct and indirect mode
Answer: d
Explanation: In intersegment mode, the control to be transferred lies in a different segment.
10. The contents of a base register are added to the contents of index register in
a) indexed addressing mode
b) based indexed addressing mode
c) relative based indexed addressing mode
d) based indexed and relative based indexed addressing mode
Answer: d
Allenhouse Institute of Technology (UPTU Code : 505)
Explanation: The effective address is formed by adding the contents of both base and index registers to a default
segment. Rooma, Kanpur – 208 008
29. The instructions which after execution transfer control to the next instruction in the sequence are called
a) Sequential control flow instructions
b) control transfer instructions
c) Sequential control flow & control transfer instructions
d) none of the mentioned
Answer: a
Explanation: The sequential control flow instructions follow sequence order in their execution.
30. The instructions that transfer the control to some predefined address or the address specified in the instruction are
called as
a) sequential control flow instructions
b) control transfer instructions
c) sequential control flow & control transfer instructions
d) none of the mentioned
Answer: b
Explanation: The control transfer instructions transfer control to the specified address.
32. The instruction, “INC” increases the contents of the specified register or memory location by
a) 2
b) 0
c) 1
d) 3
Answer: c
Explanation: This instruction adds 1 to the contents of the operand and so increments by 1.
Allenhouse Institute of Technology (UPTU Code : 505)
33. The instruction that subtracts 1 from the contents of the specified register/memory location is
a) INC Rooma, Kanpur – 208 008
b) SUBB
c) SUB
d) DEC
Answer: d
Explanation: The DEC instruction decrements the contents of a specified register/memory location by 1.
35. The flag that acts as Borrow flag in the instruction, SBB is
a) direction flag
b) carry flag
c) parity flag
d) trap flag
Answer: b
Explanation: If borrow exists in the subtraction operation performed then carry flag is set.
38. The instruction, CMP to compare source and destination operands it performs
a) addition
b) subtraction
c) division
d) multiplication
Answer: b
Explanation: For comparison, the instruction CMP subtracts source operand from destination operand.
40. The instruction that converts the result in an unpacked decimal digits is
a) AAA
b) AAS
c) AAM
d) All of the mentioned
Answer: d
Explanation: All the ASCII adjust instructions give result in unpacked decimal form and so are called as “Unpacked BCD
arithmetic instructions”.
42. The instruction in which adjustment is made before performing the operation is
a) AAA
b) AAS
c) AAM
d) AAD
Answer: d
Explanation: The AAD instruction converts two unpacked BCD digits in AH and AL to the equivalent binary number in AL.
This adjustment must be made before dividing the two unpacked BCD digits.
44. The instruction that is used to convert the result of the addition of two packed BCD numbers to a valid BCD number
is
a) DAA
b) DAS
c) AAA
d) AAS
Answer: a
Explanation: In this conversion, the result has to be only in AL.
45. The ROR instruction rotates the contents of the destination operand to
a) left
b) right
Allenhouse Institute of Technology (UPTU Code : 505)
c) left and then right
d) right and then left Rooma, Kanpur – 208 008
Answer: b
Explanation: ROR stands for Rotate Right without carry. so, the instruction rotates right.
46. The mnemonic that is placed before the arithmetic operation is performed is
a) AAA
b) AAS
c) AAM
d) AAD
Answer: d
Explanation: The AAD instruction converts two unpacked BCD digits in AH and AL to the equivalent binary number in AL.
48. The instruction that performs logical AND operation and the result of the operation is not available is
a) AAA
b) AND
c) TEST
d) XOR
Answer: c
Explanation: In the TEST instruction, the logical AND operation is performed and the result is not stored but flags are
affected.
49. In the RCL instruction, the contents of the destination operand undergo function as
a) carry flag is pushed into LSB & MSB is pushed into the carry flag
b) carry flag is pushed into MSB & LSB is pushed into the carry flag
c) auxiliary flag is pushed into LSB & MSB is pushed into the carry flag
d) parity flag is pushed into MSB & LSB is pushed into the carry flag
Answer: a
Explanation: In RCL(Rotate right through carry), for each operation, the carry flag is pushed into LSB and the MSB of the
operand is pushed into carry flag.
50. The instruction that is used as prefix to an instruction to execute it repeatedly until the CX register becomes zero is
a) SCAS
b) REP
c) CMPS
d) STOS
Answer: b
Explanation: The instruction to which the REP is prefix, is executed repeatedly until CX register becomes zero. When CX
becomes zero, the execution proceeds to the next instruction in sequence.
a) A-3,B-4,C-2,D-1
b) A-2,B-1,C-4,D-3
c) A-2,B-3,C-1,D-4
d) A-2,B-3,C-4,D-1
Answer: d
Explanation: By using the string instructions, the operations on strings can be performed.
52. The instructions that are used to call a subroutine from the main program and return to the main program after
execution of called function are
a) CALL, JMP
b) JMP, IRET
c) CALL, RET
d) JMP, RET
Answer: c
Explanation: At each CALL instruction, the IP and CS of the next instruction are pushed onto the stack, before the
control is transferred to the procedure. At the end of the procedure, the RET instruction must be executed to retrieve
the stored contents of IP & CS registers from a stack.
53. The instruction that unconditionally transfers the control of execution to the specified address is
a) CALL
b) JMP
c) RET
d) IRET
Answer: b
Explanation: In this the control transfers to the address specified in the instruction and flags are not affected by this
instruction.
54. Which instruction cannot force the 8086 processor out of ‘halt’ state?
a) Interrupt request
b) Reset
c) Both interrupt request and reset
d) Hold
Answer: d
Explanation: Only an interrupt request or Reset will force the 8086 processor to come out of the ‘halt’ state.
58. The coded object modules of the program to be assembled are present in
a) .ASM file
b) .OBJ file
c) .EXE file
d) .OBJECT file
Answer: b
Explanation: .OBJ file is created with same name as source file and extension .OBJ. It contains the coded object modules
of the program to be assembled.
60. The extension that is essential for every assembly level program is
a) .ASP
b) .ALP
c) .ASM
d) .PGM
Answer: c
Explanation: All the files should have the extension, .ASM.
61. The directory that is under work must have the files that are related to
a) Norton’s editor
b) Assembler
c) Linker
d) All of the mentioned
Answer: d
Explanation: Before starting the process of entering a small program on PC, ensure that all the files namely Norton’s
editor, assembler, linker and debugger are available in the same directory in which work is been done.
63. The extension file that is must for a file to be accepted by the LINK as a valid object file is
a) .OBJ file
b) .EXE file
c) .MASM file
d) DEBUG file
Answer: a
Explanation: The .OBJ extension is a must for a file to be accepted by the LINK as a valid object file.
Module 04
3. PUSH operation
a) decrements SP
b) increments SP
c) decrements SS
d) increments SS
Answer: a
Explanation: Each PUSH operation decrements the SP ( Stack Pointer) register.
4. POP operation
a) decrements SP
b) increments SP
c) decrements SS
d) increments SS
Answer: b
Explanation: Each POP operation increments the SP ( Stack Pointer) register.
5. The register or memory location that is pushed into the stack at the end must be
a) popped off last
b) pushed off first
c) popped off first
d) pushed off last
Answer: c
Explanation: The data can be retrieved by POP operation and as in stack, the data that is pushed at the end must be
popped off first.
10. For 8086 microprocessor, the stack segment may have a memory block of a maximum of
a) 32K bytes
b) 64K bytes
c) 16K bytes
d) NONE
Answer: b
Explanation: In 8086 microprocessor, the memory segments each have a memory of 64K bytes.
12. An interrupt breaks the execution of instructions and diverts its execution to
a) Interrupt service routine
b) Counter word register
c) Execution unit
d) control unit
Answer: a
Explanation: An interrupt transfers the control to interrupt service routine (ISR). After executing ISR, the control is
transferred back again to the main program.
13. While executing the main program, if two or more interrupts occur, then the sequence of appearance of interrupts
is called
a) multi-interrupt
b) nested interrupt
c) interrupt within interrupt
d) nested interrupt and interrupt within interrupt
Answer: d
Explanation: If an interrupt occurs while executing a program, and the processor is executing the interrupt, if one more
interrupt occurs again, then it is called a nested interrupt.
Allenhouse Institute of Technology (UPTU Code : 505)
14. Whenever a number of devices interrupt a CPU at a time, and if the processor is able to handle them properly, it is
said to have Rooma, Kanpur – 208 008
a) interrupt handling ability
b) interrupt processing ability
c) multiple interrupt processing ability
d) multiple interrupt executing ability
Answer: c
Explanation: The processor if handles more devices as interrupts then it has multiple interrupt processing ability.
16. If any interrupt request given to an input pin cannot be disabled by any means then the input pin is called
a) maskable interrupt
b) nonmaskable interrupt
c) maskable interrupt and nonmaskable interrupt
d) none of the mentioned
Answer: b
Explanation: A nonmaskable interrupt input pin is one which means that any interrupt request at NMI (nonmaskable
interrupt) input cannot be masked or disabled by any means.
21. The interrupt for which the processor has highest priority among all the internal interrupts is
a) keyboard interrupt
b) TRAP
c) NMI
d) INT
Answer: b
Explanation: TRAP is the internal interrupt that has highest priority among all the interrupts except the Divide By Zero
(Type 0) exception.
22. In case of string instructions, the NMI interrupt will be served only after
a) initialisation of string
b) execution of some part of the string
c) complete string is manipulated
d) the occurrence of the interrupt
Answer: c
Explanation: When NMI is activated, the current instruction being executed is completed and then NMI is served. In the
case of string instructions, it is served after the complete string is manipulated.
25. For the INTR signal, to be responded to in the next instruction cycle, it must go ________ in the last clock cycle of
the current instruction
a) high
b) low
c) high or low
d) unchanged
Answer: a
Allenhouse Institute of Technology (UPTU Code : 505)
Explanation: The INTR signal must go high in the clock cycle of the current instruction in order to respond in the next
instruction cycle. Rooma, Kanpur – 208 008
28. If the pin LOCK (active low based) is low at the trailing edge of the first ALE pulse, then till the start of the next
machine cycle, the pin LOCK (active low) is
a) low
b) high
c) low or high
d) none of the mentioned
Answer: a
Explanation: The pin LOCK (active low) remains low till the start of the next machine cycle.
29. With the trailing edge of the LOCK (active low), the INTA (active low) goes low and remains in it for
a) 0 clock cycle
b) 1 clock cycle
c) 2 clock cycles
d) 3 clock cycles
Answer: c
Explanation: The INTA (active low) goes low and remains low for two clock cycles before returning back to the high
state.
30. If a number of instructions are repeating through the main program, then to reduce the length of the program,
__________ is used.
a) procedure
b) subroutine
c) macro
d) none of the mentioned
Answer: c
Explanation: For a certain number of instructions that are repeated in the main program, when macro is defined then
the code of a program is reduced by placing the name of the macro at which the set of instructions are needed to be
repeated.
37. The time required for execution of a macro is ________ that of the procedure.
a) greater than
b) less than
c) equal to
Allenhouse Institute of Technology (UPTU Code : 505)
d) none of the mentioned
Answer: b Rooma, Kanpur – 208 008
Explanation: The time required for execution of a macro is less than that of procedure as it does not contain CALL and
RET instructions as the procedures do.
40. If ‘n’ denotes the number of clock cycles and ‘T’ denotes period of the clock at which the microprocessor is running,
then the duration of execution of loop once can be denoted by
a) n+T
b) n-T
c) n*T
d) n/T
Answer: c
Explanation: The duration of execution of the loop is the product of number of clock cycles and the period of the clock
cycle at which microprocessor is running.
41. The number of instructions actually executed by the microprocessor depends on the
a) stack
b) loop count
c) program counter
d) time duration
Answer: b
Explanation: As the microprocessor executes each instruction corresponding loop counter value decreases and the
microprocessor executes the instructions till the loop counter becomes zero.
42. In case of subroutines, the actual number of instructions executed by the processor depends on
a) loop count
b) length of interrupt service routine
c) length of procedure
d) none
Answer: c
Explanation: In case of subroutines or interrupt service routines, the number of instructions executed by the processor
depends on the length of procedure (or subroutine) or length of interrupt service routine along with the main calling
program.
Allenhouse Institute of Technology (UPTU Code : 505)
43. The step included in generating delays is
a) determining exact required delay Rooma, Kanpur – 208 008
b) selecting instructions for delay loop
c) finding period of clock frequency
d) all of the mentioned
Answer: d
Explanation: The delays can be generated step wise.
WAIT: DEC CX
NOP
JNZ WAIT
RET
if the zeroth condition is satisfied then, for execution, the JNZ instruction takes
a) 1 clock cycle
b) 2 clock cycles
c) 3 clock cycles
d) 4 clock cycles
Answer: d
Explanation: The JNZ instruction takes only 4 clock cycles if the zeroth condition is satisfied.
WAIT: DEC CX
NOP
JNZ WAIT
RET
if the zeroth condition is not satisfied, then the JNZ instruction takes
a) 2 clock cycles
b) 8 clock cycles
c) 16 clock cycles
d) 64 clock cycles
Answer: c
Explanation: The JNZ instruction takes 16 clock cycles if the zeroth condition is not satisfied.
Allenhouse Institute of Technology (UPTU Code : 505)
47. The maximum count value of 16-bit count register puts a limitation on
a) memory usage Rooma, Kanpur – 208 008
b) storage of address of registers
c) to generate clock pulse
d) to generate maximum delay
Answer: d
Explanation: The maximum count value of 16-bit count register is FFFFH. This may put the limitation on the maximum
delay that can be generated using the instructions.
48. When large delays are required, then to serve the purpose
a) one or more count registers can be used
b) one or more shift registers can be used
c) one or more pointer registers can be used
d) one or more index registers can be used
Answer: a
Explanation: One or more count registers can be used to serve large delays.
49. The device that enables the microprocessor to read data from the external devices is
a) printer
b) joystick
c) display
d) reader
Answer: b
Explanation: Since joystick is an input device, it reads data from the external devices.
51. The input and output operations are respectively similar to the operations,
a) read, read
b) write, write
c) read, write
d) write, read
Answer: c
Explanation: The input activity is similar to read operation and the output activity is similar to write operation.
54. While performing read operation, one must take care that much current should not be
a) sourced from data lines
b) sinked from data lines
c) sourced or sinked from data lines
d) sinked from address lines
Answer: c
Explanation: More current should not be sourced or sinked from data lines while reading to avoid loading.
61. All the functions of the ports of 8255 are achieved by programming the bits of an internal register called
a) data bus control
b) read logic control
c) control word register
d) none of the mentioned
Answer: c
Explanation: By programming the bits of control word register, the operations of the ports are specified.
63. The input provided by the microprocessor to the read/write control logic is
a) RESET
b) A1
c) WR(ACTIVE LOW)
d) All of the mentioned
Answer: d
Explanation: RD(ACTIVE LOW), WR(ACTIVE LOW), A1, A0, RESET are the inputs provided by the microprocessor to the
read/write control logic of 8255.
64. The device that receives or transmits data upon the execution of input or output instructions by the microprocessor
is
a) control word register
b) read/write control logic
c) 3-state bidirectional buffer
d) none of the mentioned
Answer: c
Explanation: 3-state bidirectional buffer is used to receives or transmits data upon the execution of input or output
instructions by the microprocessor.
65. The port that is used for the generation of handshake lines in mode 1 or mode 2 is
a) port A
b) port B
c) port C Lower
d) port C Upper
Allenhouse Institute of Technology (UPTU Code : 505)
Answer: d
Explanation: Port C upper is used for the generation ofRooma, Kanpurlines
handshake – 208in008
mode 1 or mode 2.
66.. If A1=0, A0=1 then the input read cycle is performed from
a) port A to data bus
b) port B to data bus
c) port C to data bus
d) CWR to data bus
Answer: b
Explanation: If A1=0, A0=1 then the input read cycle is performed from port B to data bus.
68. The pin that clears the control word register of 8255 when enabled is
a) CLEAR
b) SET
c) RESET
d) CLK
Answer: c
Explanation: If reset pin is enabled then the control word register is cleared.
73. If the value of the pin STB (Strobe Input) falls to low level, then
a) input port is loaded into input latches
b) input port is loaded into output latches
c) output port is loaded into input latches
d) output port is loaded into output latches
Answer: a
Explanation: If the value of the pin STB (Strobe Input) falls to low level, the input port is loaded into input latches.
74. The signal, SLCT in the direction of signal flow, OUT, indicates the selection of
a) Control word register
b) CPU
c) Printer
d) Ports
Answer: c
Explanation: This signal indicates that the printer is selected.
75. The pulse width of the signal INIT at the receiving terminal must be more than
a) 10 microseconds
b) 20 microseconds
c) 40 microseconds
d) 50 microseconds
Answer: d
Explanation: The pulse width of the signal must be more than 50microseconds at the receiving terminal.
76. The level of the signal ERROR(active low) becomes ‘low’ when the printer is in
a) Paper end state
b) Offline state
c) Error state
d) All of the mentioned
Answer: d
Explanation: The level of the signal ERROR(active low) becomes ‘low’ when the printer is in the Paper end state, Offline
state and Error state.
77. The signals that are provided to maintain proper data flow and synchronization between the data transmitter and
receiver are
a) handshaking signals
b) control signals
c) input signals
d) none
Answer: a
Explanation: Handshaking signals maintain proper data flow and synchronization.
79. The number of counters that are present in the programmable timer device 8254 is
a) 1
b) 2
c) 3
d) 4
Answer: c
Explanation: There are three counters that can be used as either counters or delay generators.
81. The mode that is used to interrupt the processor by setting a suitable terminal count is
a) mode 0
b) mode 1
c) mode 2
d) mode 3
Answer: a
Explanation: Mode 0 is also called as an interrupt on the terminal count.
82. In mode 2, if N is loaded as the count value, then after (N-1) cycles, the output becomes low for
a) 1 clockcycle
b) 2 clockcycles
c) 3 clockcycles
d) 4 clockcycles
Answer: a
Explanation: After (N-1) cycles, the output becomes low for only 1 clockcycle. If the count N is reloaded and again the
output becomes high and remains so for (N-1) clock pulses.
84. In control word register, if SC1=0 and SC0=1, then the counter selected is
a) counter 0
b) counter 1
Allenhouse Institute of Technology (UPTU Code : 505)
c) counter 2
d) none Rooma, Kanpur – 208 008
Answer: b
Explanation: SC denotes select counter.
85. In control word format, if RL1=1, RL0=1 then the operation performed is
a) read/load least significant byte only
b) read/load most significant byte only
c) read/load LSB first and then MSB
d) read/load MSB first and then LSB
Answer: c
Explanation: To access 16 bit, first LSB is loaded first, and then MSB.
89.. The number of hardware interrupts that the processor 8085 consists of is
a) 1
b) 3
c) 5
d) 7
Answer: c
Explanation: The processor 8085 has five hardware interrupt pins. Out of these five, four pins were alloted fixed vector
addresses but the pin INTR was not alloted by vector address, rather an external device was supposed to hand over the
type of the interrupt to the microprocessor.
90. The register that stores all the interrupt requests in it in order to serve them one by one on a priority basis is
a) Interrupt Request Register
b) In-Service Register
Allenhouse Institute of Technology (UPTU Code : 505)
c) Priority resolver
d) Interrupt Mask Register Rooma, Kanpur – 208 008
Answer: a
Explanation: The interrupts at IRQ input lines are handled by Interrupt Request Register internally.
91. The register that stores the bits required to mask the interrupt inputs is
a) In-service register
b) Priority resolver
c) Interrupt Mask register
d) None
Answer: c
Explanation: Also, Interrupt Mask Register operates on IRR(Interrupt Request Register) at the direction of the Priority
Resolver.
94. When the PS(active low)/EN(active low) pin of 8259A used in buffered mode, then it can be used as a
a) input to designate chip is master or slave
b) buffer enable
c) buffer disable
d) none
Answer: b
Explanation: When the pin is used in buffered mode, then it can be used as a buffer enable to control buffer
transreceivers. If it is not used in buffered mode, then the pin is used as input to designate whether the chip is used as a
master or a slave.
95. Once the ICW1 is loaded, then the initialization procedure involves
a) edge sense circuit is reset
b) IMR is cleared
c) slave mode address is set to 7
d) all of the mentioned
Answer: d
Explanation: The initialization procedure involves
i) edge sense circuit is reset.
ii) IMR is cleared.
iii) IR7 input is assigned the lowest priority.
Allenhouse Institute of Technology (UPTU Code : 505)
iv) slave mode address is set to 7
Rooma,
v) special mask mode is cleared and the status read is set Kanpur – 208 008
to IRR.
97. In the application where all the interrupting devices are of equal priority, the mode used is
a) Automatic rotation
b) Automatic EOI mode
c) Specific rotation
d) EOI
Answer: a
Explanation: The automatic rotation is used in the applications where all the interrupting devices are of equal priority.
iii) choosing binary or BCD counters
iv) loading of the counter registers.
Module 05
1. The time taken by the ADC from the active edge of SOC(start of conversion) pulse till the active edge of EOC(end of
conversion) signal is called
a) edge time
b) conversion time
c) conversion delay
d) time delay
Answer: c
Explanation: Broadly speaking, the time taken by the converter to calculate the equivalent digital data output from the
moment of the start of conversion is called conversion delay.
6. The number of inputs that can be connected at a time to an ADC that is integrated with successive approximation is
a) 4
b) 2
c) 8
d) 16
Answer: c
Explanation: As these converters internally have 3:8 analog multiplexer, at a time 8 different analog inputs can be
connected to the chip.
8. Which of the following is not one of the phases of the total conversion cycle?
a) autozero phase
b) conversion phase
c) signal integrate phase
d) disintegrate phase
Answer: b
Explanation: Autozero phase, signal integrate phase and disintegrate phase are the three phases of total conversion
cycle.
10. In the signal integrate phase, the differential input voltage between IN LO(input low) and IN HI(input high) pins is
integrated by the internal integrator for a fixed period of
a) 256 clock cycles
b) 1024 clock cycles
c) 2048 clock cycles
d) 4096 clock cycles
Answer: c
Explanation: The internal integrator needs 2048 clock cycles to integrate voltage difference between input low and
input high.
13. All the functions of the ports of 8255 are achieved by programming the bits of an internal
register called
a) data bus control
b) read logic control
c) control word register
d) none
Answer: c
Explanation: By programming the bits of control word register, the operations of the ports are
specified.
15. The input provided by the microprocessor to the read/write control logic is
a) RESET
b) A1
c) WR(ACTIVE LOW)
Allenhouse Institute of Technology (UPTU Code : 505)
d) all of the mentioned
Answer: d Rooma, Kanpur – 208 008
Explanation: RD(ACTIVE LOW), WR(ACTIVE LOW), A1, A0, RESET are the inputs
provided by the microprocessor to the read/write control logic of 8255.
16. The device that receives or transmits data upon the execution of input or output instructions by the microprocessor
is
a) control word register
b) read/write control logic
c) 3-state bidirectional buffer
d) none
Answer: c
Explanation: 3-state bidirectional buffer is used to receives or transmits data upon the execution
of input or output instructions by the microprocessor.
17. The port that is used for the generation of handshake lines in mode 1 or mode 2 is
a) port A
b) port B
c) port C Lower
d) port C Upper
Answer: d
Explanation: Port C upper is used for the generation of handshake lines in mode 1 or mode 2.
18. If A1=0, A0=1 then the input read cycle is performed from
a) port A to data bus
b) port B to data bus
c) port C to data bus
d) CWR to data bus
Answer: b
Explanation: If A1=0, A0=1 then the input read cycle is performed from port B to data bus.
20. The pin that clears the control word register of 8255 when enabled is
a) CLEAR
b) SET
c) RESET
d) CLK
Answer: c
Explanation: If reset pin is enabled then the control word register is cleared.
21. The device that enables the microprocessor to read data from the external devices is
a) printer
b) joystick
c) display
Allenhouse Institute of Technology (UPTU Code : 505)
d) reader
Answer: b Rooma, Kanpur – 208 008
Explanation: Since joystick is an input device, it reads data from the external devices.
23. The input and output operations are respectively similar to the operations,
a) read, read
b) write, write
c) read, write
d) write, read
Answer: c
Explanation: The input activity is similar to read operation and the output activity is similar to
write operation.
26. While performing read operation, one must take care that much current should not be
a) sourced from data lines
b) sinked from data lines
c) sourced or sinked from data lines
d) sinked from address lines
Answer: c
Explanation: More current should not be sourced or sinked from data lines while reading to
avoid loading.
35. If the value of the pin STB (Strobe Input) falls to low level, then
a) input port is loaded into input latches
b) input port is loaded into output latches
c) output port is loaded into input latches
d) output port is loaded into output latches
Answer: a
Explanation: If the value of the pin STB (Strobe Input) falls to low level, then input port is
loaded into input latches.
36. The signal, SLCT in the direction of signal flow, OUT, indicates the selection of
a) control word register
b) CPU
c) Printer
d) ports
Answer: c
Explanation: This signal indicates that the printer is selected.
37. The pulse width of the signal INIT at the receiving terminal must be more than
a) 10 microseconds
b) 20 microseconds
c) 40 microseconds
d) 50 microseconds
Answer: d
Explanation: The pulse width of the signal must be more than 50microseconds at the receiving
terminal.
38. The level of the signal ERROR(active low) becomes „low‟ when the printer is in
a) Paper end state
b) Offline state
c) Error state
d) all of the mentioned
Answer: d
Explanation: The level of the signal ERROR(active low) becomes „low‟ when the printer is in
Paper end state, Offline state and Error state.
39. The signals that are provided to maintain proper data flow and synchronisation between the
data transmitter and receiver are
a) handshaking signals
b) control signals
c) input signals
Allenhouse Institute of Technology (UPTU Code : 505)
d) none
Answer: a Rooma, Kanpur – 208 008
Explanation: Handshaking signals maintain proper data flow and synchronisation.
41. The time taken by the ADC from the active edge of SOC(start of conversion) pulse till the
active edge of EOC(end of conversion) signal is called
a) edge time
b) conversion time
c) conversion delay
d) time delay
Answer: c
Explanation: Broadly speaking, the time taken by the converter to calculate the equivalent digital
data output from the moment of the start of conversion is called conversion delay.
42. The popular technique that is used in the integration of ADC chips is
a) successive approximation
b) dual slope integration
c) successive approximation and dual slope integration
d) none
Answer: c
Explanation: Successive approximation and dual slope integration are the most popular
techniques that are used in the integrated ADC chips.
46. The number of inputs that can be connected at a time to an ADC that is integrated with
successive approximation is
a) 4
b) 2
c) 8
d) 16
Answer: c
Explanation: As these converters internally have 3:8 analog multiplexer, at a time 8 different
analog inputs can be connected to the chip.
47. ADC 7109 integrated by Dual slope integration technique is used for
a) low cost option
b) slow practical applications
c) low complexity
d) all of the mentioned
Answer: d
Explanation: Compared to other 12-bit ADCs, it is of very low cost and useful for slow practical
applications.
48. Which of the following is not one of the phase of total conversion cycle?
a) autozero phase
b) conversion phase
c) signal integrate phase
d) deintegrate phase
Answer: b
Explanation: autozero phase, signal integrate phase and deintegrate phase are the three phases of
total conversion cycle.
50. In the signal integrate phase, the differential input voltage between IN LO(input low) and IN
HI(input high) pins is integrated by the internal integrator for a fixed period of
a) 256 clock cycles
b) 1024 clock cycles
c) 2048 clock cycles
Allenhouse Institute of Technology (UPTU Code : 505)
d) 4096 clock cycles
Answer: c Rooma, Kanpur – 208 008
Explanation: The internal integrator needs 2048 clock cycles to integrate voltage difference
between input low and input high.
52. To save the DAC from negative transients the device connected between OUT1 and OUT2 of
AD 7523 is
a) p-n junction diode
b) Zener
c) FET
d) BJT (Bipolar Junction transistor)
Answer: b
Explanation: Zener is connected between OUT1 and OUT2 pins of AD7523 to save from
negative transients.
55. The device that is used to obtain an accurate position control of rotating shafts in terms of
steps is
a) DC motor
b) AC motor
c) Stepper motor
d) Servo motor
Answer: c
Explanation: Stepper motor employs rotation of its shaft in terms of steps, rather than continuous
rotation as in case of AC or DC motors.
Allenhouse Institute of Technology (UPTU Code : 505)
56. The internal schematic of a typical stepper motor has
a) 1 winding Rooma, Kanpur – 208 008
b) 2 windings
c) 3 windings
d) 4 windings
Answer: d
Explanation: the internal schematic of a typical stepper motor has 4 windings.
57. The number of pulses required for one complete rotation of the shaft of the stepper motor is
equal to the
a) number of internal teeth on a rotor
b) number of internal teeth on a stator
c) number of internal teeth on a rotor and stator
d) number of external teeth on a stator
Answer: a
Explanation: The number of pulses required for one complete rotation of the shaft of the stepper
motor is equal to the number of internal teeth on its rotor.
58. A simple scheme for rotating the shaft of a stepper motor is called
a) rotating scheme
b) shaft scheme
c) wave scheme
d) none
Answer: c
Explanation: In this scheme, the windings are applied with the required voltage pulses, in a
cyclic fashion.
61. The number of counters that are present in the programmable timer device 8254 is
a) 1
b) 2
c) 3
d) 4
Allenhouse Institute of Technology (UPTU Code : 505)
Answer: c
Explanation: There are three counters that can be usedRooma, Kanpur
as either – 208 008
counters or delay generators.
63. The mode that is used to interrupt the processor by setting a suitable terminal count is
a) mode 0
b) mode 1
c) mode 2
d) mode 3
Answer: a
Explanation: Mode 0 is also called as interrupt on terminal count.
64. In mode 2, if N is loaded as the count value, then after (N-1) cycles, the output becomes low
for
a) 1 clockcycle
b) 2 clockcycles
c) 3 clockcycles
d) 4 clockcycles
Answer: a
Explanation: After (N-1) cycles, the output becomes low for only 1 clockcycle. If the count N is
reloaded and again the output becomes high and remains so for (N-1) clock pulses.
66. In control word register, if SC1=0 and SC0=1, then the counter selected is
a) counter 0
b) counter 1
c) counter 2
d) none
Answer: b
Explanation: SC denotes select counter.
67. In control word format, if RL1=1, RL0=1 then the operation performed is
a) read/load least significant byte only
b) read/load most significant byte only
c) read/load LSB first and then MSB
d) read/load MSB first and then LSB
Allenhouse Institute of Technology (UPTU Code : 505)
Answer: c
Rooma,
Explanation: To access 16 bit, first LSB is loaded first, and thenKanpur
MSB. – 208 008
71. The registers that store the keyboard and display modes and operations programmed by CPU
are
a) I/O control and data buffers
b) control and timing registers
c) return buffers
d) display address registers
Answer: b
Explanation: The control and timing registers store the keyboard and display modes and other
operations programmed by CPU.
73. The registers that holds the address of the word currently being written by the CPU from the
display RAM are
Allenhouse Institute of Technology (UPTU Code : 505)
a) control and timing register
b) control and timing register and timing control Rooma, Kanpur – 208 008
c) display RAM
d) display address registers
Answer: d
Explanation: The display address registers holds the address of the word currently being written
or read by the CPU to or from the display RAM.
75. The mode that is programmed using “end interrupt/error mode set command” is
a) scanned keyboard special error mode
b) scanned keyboard with N-key rollover
c) scanned keyboard mode with 2 key lockout
d) sensor matrix mode
Answer: a
Explanation: The scanned keyboard special error mode is programmed using end interrupt/error
mode set command. This mode is valid only under the N-key rollover mode.
76. When a key is pressed, the debounce circuit waits for 2 keyboard scans and then checks
whether the key is still depressed in
a) scanned keyboard special error mode
b) scanned keyboard with N-key rollover
c) scanned keyboard mode with 2 key lockout
d) sensor matrix mode
Answer: b
Explanation: In this mode, When a key is pressed, the debounce circuit waits for 2 keyboard
scans and then checks whether the key is still depressed. If it is still depressed, the code is
entered in FIFO RAM.
77. The data that is entered from the left side of the display unit is of
a) left entry mode
b) right entry mode
c) left and right entry modes
d) none
Answer: a
Explanation: The data that is entered from the left side of the display unit is of left entry mode, as
in a type-writer the first character typed appears at the left-most position, while the subsequent
characters appear successively to the right of the first one.
79. The flag that increments automatically after each read or write operation to the display RAM is
a) IF
b) RF
c) AI
d) WF
Answer: c
Explanation: AI refers to auto increment flag.
80. If any change in sensor value is detected at the end of a sensor matrix scan, then the IRQ line
a) goes low
b) goes high
c) remains unchanged
d) none
Answer: b
Explanation: In sensor matrix mode, the IRQ line goes high, if any change in sensor value is
detected at the end of a sensor matrix scan or the sensor RAM has a previous entry to be read by
the CPU.
Module 06
1. The unit that executes all the numeric processor instructions in 8087 is
a) Control unit
b) ALU
c) Numeric extension unit
d) None of the mentioned
Allenhouse Institute of Technology (UPTU Code : 505)
Answer: c
Rooma,
Explanation: The 8087 is divided into two sections namely Kanpur
control – 208
unit and008
numeric extension unit in which the numeric
extension unit executes all the numeric processor instructions.
4. When the numeric extension unit (NEU) begins its execution, then the signal that is active is
a) BUSY (active high)
b) BUSY (active low)
c) READY (active low)
d) RESET (active high)
Answer: a
Explanation: When NEU begins its execution, the BUSY signal is pulled up. Also, this output signal when high, indicates
to the CPU that it is busy with the execution of an allotted instruction.
5. The register that allows the register programmer to select the required processing options is
a) significant
b) exponent
c) control word register
d) none of the mentioned
Answer: c
Explanation: The control word register allows the register programmer to select the required processing options out of
available ones. It is used to control the operation of 8087.
7. The exception generated for a too big result to fit in the format is
a) invalid operation
b) overflow
c) denormalized operand
Allenhouse Institute of Technology (UPTU Code : 505)
d) result overflow
Answer: b Rooma, Kanpur – 208 008
Explanation: A too big result to fit in the format generates this exception. The condition code bits indicate that the
result is prohibitively large.
10. If the result is rounded according to the rounding control bits, then the exception generated is
a) denormalized operand
b) underflow
c) inexact result
d) invalid operation
Answer: c
Explanation: If it is impossible to fit the actual result in the specified format, the result is rounded according to the
rounding control bits, and an exception is generated. This sets the precision exception flag.
11. The instruction that stores a copy of top of the stack into the memory, and pops the top of the stack is
a) FST
b) FSTP
c) FIST
d) FLD
Answer: b
Explanation: FSTP (store floating point number and pop) stores a copy of top of the stack into memory or any
coprocessor register, and then pops the top of the stack.
12. The instruction that multiplies the content of the stack top by 2n is
a) FMUL
b) FPREM
c) FSCAL
d) FCSH
Answer: c
Explanation: FSCAL instruction multiplies the content of the stack top by 2n, where n is an integral part of stack and
stores the result in stack.
13. If the opcode bit is D=1, then the source and destination operands are
a) incremented
Allenhouse Institute of Technology (UPTU Code : 505)
b) decremented
c) cleared Rooma, Kanpur – 208 008
d) interchanged
Answer: d
Explanation: If D=1, then it interchanges the source and destination operands.
15. The unit that provides and controls the interface, between the internal 80287 bus and 80286 bus via data buffer is
a) bus control logic
b) data interface and control unit
c) floating point unit
d) none of the mentioned
Answer: a
Explanation: The bus control logic provides and controls the interface, between the internal 80287 bus and 80286 bus
via data buffer.
17. The word that optimizes the NDP performance, by maintaining a record of empty and non-empty register locations
is
a) Status and control words
b) TAG words
c) Error pointers
d) All of the mentioned
Answer: b
Explanation: The TAG word optimizes the NDP performance by maintaining a record of empty and non-empty register
locations. It helps the exception handler to identify special values in the contents of the stack locations.
18. The part of the data interface and control unit, that points to the source of exception generated is
a) Status and control words
b) TAG words
c) Error pointers
d) None of the mentioned
Answer: c
Allenhouse Institute of Technology (UPTU Code : 505)
Explanation: The error pointers point to the source of exception (address of the instruction that generated the
exception) generated. Rooma, Kanpur – 208 008
20. The arrangement of data that is to be shifted successively, whenever required for the execution, is done by
a) error pointer
b) data buffer
c) barrel shifter
d) none of the mentioned
Answer: c
Explanation: The barrel shifter arranges and presents the data to be shifted successively, whenever required for the
execution.
21. The word that is used to select one of the processing options, among the provided ones is
a) status word
b) control word
c) status and control words
d) none of the mentioned
Answer: b
Explanation: The control word is used to select one of the processing options, among the ones provided by 80287.
22. After reset of 80287, the control bit that is initialized to zero is
a) masking bits
b) precision control bits
c) rounding control bits
d) infinity control bits
Answer: d
Explanation: The infinity control bit is initialized to zero after reset.
23. The bits that are modified depending upon the result of the execution of arithmetic instructions are
a) masking bits
b) rounding control bits
c) condition code bits
d) error summary bits
Answer: c
Explanation: The condition code bits are similar to the flags of a CPU. These are modified depending upon the result of
the execution of arithmetic instructions.
24. If the stack flag is set, and condition code bit C1=1, then the stack is
a) full
b) overflown
c) underflown
d) empty
Allenhouse Institute of Technology (UPTU Code : 505)
Answer: b
Explanation: If the stack flag is set, and condition codeRooma, Kanpur
bit C1=1, then– the
208 008
stack has overflown.
25. If the stack flag is set, and condition code bit C1=0, then the stack is
a) full
b) overflown
c) underflown
d) empty
Answer: c
Explanation: If the stack flag is set, and condition code bit C1=0, then the stack has underflown.
26. The bits that affect the result of arithmetic operations like ADD, SUB, MUL, DIV are
a) condition code bits
b) rounding control bits
c) masking bits
d) precision control bits
Answer: d
Explanation: The precision control bits affect ADD, SUB, MUL, DIV and SQRT results.
28. If Numeric Processor Write (NPWR) active-low input pin is activated, then it enables a data transfer from
a) memory to processor
b) 80287 to 80286
c) 80286 to 80287
d) 8086 to 80287
Answer: c
Explanation: If Numeric Processor Write (NPWR) active-low input pin is activated, then it enables a data transfer from
80286 to 80287.
29. If Numeric Processor Read (NPRD) active-low input pin is activated, then it enables a data transfer from
a) memory to processor
b) 80287 to 80286
c) 80286 to 80287
d) 8086 to 80287
Answer: b
Explanation: If Numeric Processor Read (NPRD) active-low input pin is activated, then it enables a data transfer from
80287 to 80286.
30. Which of the input line(s) indicate that the CPU is performing an escape operation, and enables 80287 to execute
the next instruction?
a) NPWR (active low) and NPRD (active low)
b) NPS1 and NPS2 (active low)
c) NPS1 (active low) and NPS2
d) CMD0 and CMD1
Allenhouse Institute of Technology (UPTU Code : 505)
Answer: c
Explanation: The Numeric Processor select input lines, Rooma, Kanpur low)
NPS1 (active – 208and
008 NPS2, indicate that the CPU is performing
an escape operation, and enables 80287 to execute the next instruction.
31. For which pin of 80286 is the active low pin, BUSY of 80287, connected?
a) ERROR (active low)
b) BUSY (active low)
c) HLDA
d) TEST (active low)
Answer: d
Explanation: The BUSY (active low) is connected to the TEST (active low) pin of 80286.
32. If Clock Mode (CM) input pin is held low, then the CLK input is divided by
a) 1
b) 2
c) 3
d) 4
Answer: b
Explanation: If Clock Mode (CM) input pin is held high, then the CLK input is directly used for deriving the internal
timings. Else, it is divided by 2.
33. Which of the following pin is not involved in the interface of 80287 with 80286?
a) PEREQ
b) ERROR#
c) RESET
d) CMD0 and CMD1
Answer: c
Explanation: The 10 pins, PEREQ, PEACK#, BUSY#, ERROR#, NPRD(active low)#, NPWR(active low)#, NPS1(active low)#,
NPS2#, CMD0 and CMD1.
34. The PEACK (active low) when activated, the pin that goes into deactivation is
a) PEREQ
b) ERROR#
c) RESET
d) CMD0 and CMD1
Answer: a
Explanation: When the data transfer is over, the CPU activates PEACK (active low)# pin, which results in deactivating the
PEREQ pin by 80287.
35. If the stack flag is set, and condition code bit C1=1, then the stack is
a) full
b) overflown
c) underflown
d) empty
Answer: b
Explanation: If the stack flag is set, and condition code bit C1=1, then the stack has overflown.
36. If the stack flag is set, and condition code bit C1=0, then the stack is
a) full
b) overflown
c) underflown
d) empty
Allenhouse Institute of Technology (UPTU Code : 505)
Answer: c
Explanation: If the stack flag is set, and condition codeRooma, Kanpur
bit C1=0, then– the
208 008
stack has underflown.
37. The bits that affect the result of arithmetic operations like ADD, SUB, MUL, DIV are
a) condition code bits
b) rounding control bits
c) masking bits
d) precision control bits
Answer: d
Explanation: The precision control bits affect ADD, SUB, MUL, DIV and SQRT results.
39. If Numeric Processor Write (NPWR) active-low input pin is activated, then it enables a data transfer from
a) memory to processor
b) 80287 to 80286
c) 80286 to 80287
d) 8086 to 80287
Answer: c
Explanation: If Numeric Processor Write (NPWR) active-low input pin is activated, then it enables a data transfer from
80286 to 80287.
40. If Numeric Processor Read (NPRD) active-low input pin is activated, then it enables a data transfer from
a) memory to processor
b) 80287 to 80286
c) 80286 to 80287
d) 8086 to 80287
Answer: b
Explanation: If Numeric Processor Read (NPRD) active-low input pin is activated, then it enables a data transfer from
80287 to 80286.
41. Which of the input line(s) indicate that the CPU is performing an escape operation, and enables 80287 to execute
the next instruction?
a) NPWR (active low) and NPRD (active low)
b) NPS1 and NPS2 (active low)
c) NPS1 (active low) and NPS2
d) CMD0 and CMD1
Answer: c
Explanation: The Numeric Processor select input lines, NPS1 (active low) and NPS2, indicate that the CPU is performing
an escape operation, and enables 80287 to execute the next instruction.
42. For which pin of 80286 is the active low pin, BUSY of 80287, connected?
a) ERROR (active low)
b) BUSY (active low)
c) HLDA
Allenhouse Institute of Technology (UPTU Code : 505)
d) TEST (active low)
Answer: d Rooma, Kanpur – 208 008
Explanation: The BUSY (active low) is connected to the TEST (active low) pin of 80286.
43. If Clock Mode (CM) input pin is held low, then the CLK input is divided by
a) 1
b) 2
c) 3
d) 4
Answer: b
Explanation: If Clock Mode (CM) input pin is held high, then the CLK input is directly used for deriving the internal
timings. Else, it is divided by 2.
44. Which of the following pin is not involved in the interface of 80287 with 80286?
a) PEREQ
b) ERROR#
c) RESET
d) CMD0 and CMD1
Answer: c
Explanation: The 10 pins, PEREQ, PEACK#, BUSY#, ERROR#, NPRD(active low)#, NPWR(active low)#, NPS1(active low)#,
NPS2#, CMD0 and CMD1.
45. The PEACK (active low) when activated, the pin that goes into deactivation is
a) PEREQ
b) ERROR#
c) RESET
d) CMD0 and CMD1
Answer: a
Explanation: When the data transfer is over, the CPU activates PEACK (active low)# pin, which results in deactivating the
PEREQ pin by 80287.
46. The semiconductor memories are organised as __________ dimension(s) of array of memory locations.
a) one dimensional
b) two dimensional
c) three dimensional
d) none
Answer: b
Explanation: The semiconductor memories are organised as two dimensions of an array which consists of rows and
columns.
47. If a location is selected, then all the bits in it are accessible using a group of conductors called
a) control bus
b) address bus
c) data bus
d) either address bus or data bus
Answer: c
Explanation: The bits in a selected location are accessible using data bus.
48. To address a memory location out of N memory locations, the number of address lines required is
a) log N (to the base 2)
b) log N (to the base 10)
c) log N (to the base e)
Allenhouse Institute of Technology (UPTU Code : 505)
d) log (2N) (to the base e)
Answer: a Rooma, Kanpur – 208 008
Explanation: For n memory locations, log n(to the base of 2) address lines are required. For addressing 4K bytes of
memory, 12 address lines are required since log(4KB) =log(4*1024)=log(212)=12.
49. If the microprocessor has 10 address lines, then the number of memory locations it is able to address is
a) 512
b) 1024
c) 2048
d) none
Answer: b
Explanation: Since for n address lines, the number of memory locations able to address is 2^n.
50. In static memory, the upper 8-bit bank of an available 16-bit memory chip is called
a) upper address memory bank
b) even address memory bank
c) static upper memory
d) odd address memory bank
Answer: d
Explanation: In static memory, the upper 8-bit bank is called odd address memory bank.
51. In static memory, the lower 8-bit bank of an available 16-bit memory chip is called
a) lower address memory bank
b) even address memory bank
c) static lower memory bank
d) odd address memory bank
Answer: b
Explanation: In static memory, the lower 8-bit bank is called even address memory bank.
52. In most of the cases, the method used for decoding that may be used to minimise the required hardware is
a) absolute decoding
b) non-linear decoding
c) linear decoding
d) none
Answer: c
Explanation: In general, linear decoding is used to minimise the required hardware.
53. To obtain 16-bit data bus width, the two 4K*8 chips of RAM and ROM are arranged in
a) parallel
b) serial
c) both serial and parallel
d) neither serial nor parallel
Answer: a
Explanation: The two 4K*8 chips of RAM and ROM are arranged in parallel.
54. If (address line) Ao=0 then, the status of address and memory are
a) address is even and memory is in ROM
b) address is odd and memory is in ROM
c) address is even and memory is in RAM
d) address is odd and memory is in RAM
Answer: c
Explanation: If Ao=0 then address is even and is in RAM. If Ao=1 then, address is odd and is in RAM.
Allenhouse Institute of Technology (UPTU Code : 505)
55. If at a time Ao and BHE(active low) both are zero then, the chip(s) selected will be
a) RAM Rooma, Kanpur – 208 008
b) ROM
c) RAM and ROM
d) ONLY RAM
Answer: c
Explanation: If at a time Ao and BHE(active low) both are zero, then both RAM and ROM are selected
3. The __________ controls the flow of data and instructions within the computer.
A. control unit
B. register array
C. accumulator
D. ALU
View Answer
Ans : A
Explanation: The control unit controls the flow of data and instructions within the computer.
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
4. Which of the following is not a features of a Microprocessor?
A. Versatility
B. Reliability
C. Low Bandwidth
D. Low Power Consumption
View Answer
Ans : C
Explanation: The microprocessor fetches those instructions from the memory, then decodes it
Explanation: Clock Speed : It determines the number of operations per second the processor can
perform. It is expressed in megahertz (MHz) or gigahertz (GHz).
Explanation: Power PC: 501 is not a RISC processors, instead of that Power PC: 601, 604, 615, 620 are
RISC processors.
Explanation: A coprocessor is a specially designed microprocessor, which can handle its particular
function many times faster than the ordinary microprocessor.
Explanation: DSP: This processor is specially designed to process the analog signals into a digital form.
Explanation: A transputer is a specially designed microprocessor with its own local memory and having
links to connect one transputer to another transputer for inter-processor communications
Explanation: In 8085, 16-bit address bus, which can address upto 64KB.
Allenhouse Institute of Technology (UPTU Code : 505)
3. There are _______ general purpose registers in 8085 processor
Rooma, Kanpur – 208 008
A. 5
B. 6
C. 7
D. 8
View Answer
Ans : B
Explanation: There are 6 general purpose registers in 8085 processor, i.e. B, C, D, E, H & L. Each
register can hold 8-bit data.
Explanation: Stack pointer : It is also a 16-bit register works like stack, which is always
incremented/decremented by 2 during push & pop operations.
Explanation: These are the set of 5 flip-flops : Sign (S), Zero (Z), Auxiliary Carry (AC), Parity (P) and
Carry (C)
Explanation: Program counter : It is a 16-bit register used to store the memory address location of the
next instruction to be executed.
7. This signal indicates that another master is requesting the use of the address and
data buses.
A. READY
B. HOLD
C. HLDA
D. INTA
View Answer
Ans : B
Explanation: HOLD : This signal indicates that another master is requesting the use of the address and
data buses.
8. This signal is used as the system clock for devices connected with the
microprocessor.
A. X1, X2
B. CLK OUT
C. CLK IN
D. IO/M
View Answer
Ans : B
Explanation: CLK OUT : This signal is used as the system clock for devices connected with the
microprocessor.
Explanation: All of the above are correct about Control and status signals.
Allenhouse Institute of Technology (UPTU Code : 505)
10. MVI K, 20F is an example of? Rooma, Kanpur – 208 008
Explanation: Immediate addressing mode : In this mode, the 8/16-bit data is specified in the instruction
itself as one of its operand. For example: MVI K, 20F: means 20F is copied into register K
Explanation: It supports two modes of operation, i.e. Maximum mode and Minimum mode. Maximum
mode is suitable for system having multiple processors and Minimum mode is suitable for system having
a single processor.
Explanation: 8085 can access up to 64Kb, whereas 8086 can access up to 1 Mb of memory.
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
4. 8086 has ___ address bus.
A. 16-bit
B. 18-bit
C. 20-bit
D. 24-bit
View Answer
Ans : C
Explanation: Address Bus : 8085 has 16-bit address bus while 8086 has 20-bit address bus.
5. Which flag is set to 1 when the result of arithmetic or logical operation is zero
else it is set to 0?
A. Binary bit
B. Zero flag
C. Sign flag
D. Overflow flag
View Answer
Ans : B
Explanation: Zero flag : This flag is set to 1 when the result of arithmetic or logical operation is zero else it
is set to 0.
6. Which flag represents the result when the system capacity is exceeded?
A. Carry flag
B. Auxiliary flag
C. Trap flag
D. Overflow flag
View Answer
Ans : D
Explanation: Overflow flag : This flag represents the result when the system capacity is exceeded.
8. It is used to write the data into the memory or the output device depending on
the status of M/IO signal.
A. IR
B. HLDA
C. HR
D. WR
View Answer
Ans : D
Explanation: WR : It stands for write signal and is available at pin 29. It is used to write the data into the
memory or the output device depending on the status of M/IO signal.
9. Which intruction is Used to load the address of operand into the provided
register?
A. LEA
B. LDS
C. LES
D. LAHF
View Answer
Ans : A
Explanation: LEA : Used to load the address of operand into the provided register.
Explanation: The different ways in which a source operand is denoted in an instruction is known as
addressing modes. There are 8 different addressing modes in 8086 programming
Allenhouse Institute of Technology (UPTU Code : 505)
1. How many types of basic multiprocessor configurations?
Rooma, Kanpur – 208 008
A. 2
B. 3
C. 4
D. 5
View Answer
Ans : B
Explanation: A Coprocessor is a specially designed circuit on microprocessor chip which can perform the
same task very quickly, which the microprocessor performs.
Explanation: The coprocessor and the processor is connected via TEST, RQ-/GT- and QS0 & QS1
signals.
4. _________signal takes care of the coprocessor's activity, i.e. the coprocessor is busy
or idle.
A. TEST
B. QS0
C. QS1
D. None of the above
Allenhouse Institute of Technology (UPTU Code : 505)
View Answer
Ans : A Rooma, Kanpur – 208 008
Explanation: TEST signal takes care of the coprocessor's activity, i.e. the coprocessor is busy or idle.
Explanation: 8087 numeric data processor is also known as Math co-processor, Numeric processor
extension and Floating point unit.
Explanation: 8087 Architecture is divided into two groups, i.e., Control Unit (CU) and Numeric Extension
Unit (NEU).
8. It is a power supply signal, which requires +5V supply for the operation of the
circuit.
Allenhouse Institute of Technology (UPTU Code : 505)
A. VCA
Rooma, Kanpur – 208 008
B. VDD
C. VCC
D. INTA
View Answer
Ans : C
Explanation: VCC : It is a power supply signal, which requires +5V supply for the operation of the circuit.
9. The _________ handles all the communication between the processor and the
memory
A. numeric extension unit
B. Packed Unit
C. control unit
D. Binary Unit
View Answer
Ans : C
Explanation: The control unit handles all the communication between the processor and the memory
Explanation: It was the first math coprocessor designed by Intel to pair with 8086/8088 resulting in easier
and faster calculation
mpus interview, walk-in interview, company interview), placements, entrance exams and
other competitive examinations.
1. How many types of Interfacing?
A. 2
B. 3
C. 4
D. 5
View Answer
Ans : A
Allenhouse Institute of Technology (UPTU Code : 505)
Explanation: Interface is the path for communication between two components. Interfacing is of two
types, memory interfacing and I/O interfacing. Rooma, Kanpur – 208 008
2. In which type of communication, the interface gets a single byte of data from the
microprocessor and sends it bit by bit to the other system serially and vice-a-versa?
A. Parallel Communication Interface
B. Serial Communication Interface
C. Both A and B
D. None of the above
View Answer
Ans : B
Explanation: Serial Communication Interface : In this type of communication, the interface gets a single
byte of data from the microprocessor and sends it bit by bit to the other system serially and vice-a-versa.
4. In which mode, the CPU periodically reads an internal flag of 8279 to check
whether any key is pressed or not with key pressure?
A. Interrupt mode
B. Polled mode
C. Decoded Mode
D. Encoded Mode
View Answer
Ans : B
Explanation: In the Polled mode, the CPU periodically reads an internal flag of 8279 to check whether
any key is pressed or not with key pressure.
Explanation: In the encoded mode, the counter provides the binary count that is to be externally decoded
to provide the scan lines for the keyboard and display.
Explanation: BD : It stands for blank display. It is used to blank the display during digit switching.
Explanation: Display Scan : This mode allows 8/16 character multiplexed displays to be organized as
dual 4-bit/single 8-bit display units.
Explanation: It has four channels which can be used over four I/O devices is true.
4. This type of microcontroller is designed in such a way that they do not have a
program memory on the chip.
A. External memory microcontroller
B. Embedded memory microcontroller
C. CISC
D. RISC
View Answer
Ans : A
Explanation: External memory microcontroller : This type of microcontroller is designed in such a way
that they do not have a program memory on the chip. Hence, it is named as external memory
microcontroller.
7. At what PIN number, there is a RESET pin, which is used to reset the
microcontroller to its initial values?
A. PIN 9
B. PIN 20
C. PIN 30
D. PIN 35
View Answer
Ans : A
Explanation: Pin 9 : It is a RESET pin, which is used to reset the microcontroller to its initial values.
8. At what PIN number, there is EA pin which stands for External Access input?
A. PIN 28
B. PIN 29
C. PIN 30
D. PIN 31
View Answer
Ans : C
Explanation: Pin 30 : This is EA pin which stands for External Access input. It is used to enable/disable
the external memory interfacing.
9. When pins are configured as an output (i.e. logic 0), then the single port pins can
receive a current of?
A. 5mA
B. 8mA
C. 15mA
D. 10mA
View Answer
Ans : D
Explanation: When pins are configured as an output (i.e. logic 0), then the single port pins can receive a
current of 10mA.
Allenhouse Institute of Technology (UPTU Code : 505)
10. Which IO Port can be used for higher address byte with addresses A8-A15?
Rooma, Kanpur – 208 008
A. PORT1
B. PORT0
C. PORT3
D. PORT2
View Answer
Ans : D
Explanation: PORT2 : This port can be used for higher address byte with addresses A8-A15. When no
memory is added then this port can be used as a general input/output port similar to Port 1
Explanation: The 8255A is a general purpose programmable I/O device designed to transfer the data
from I/O to interrupt I/O
Explanation: 8255A has three ports, i.e., PORT A, PORT B, and PORT C.
Explanation: Read/Write Control Logic : This block is responsible for controlling the internal/external
transfer of data/control/status word.
Explanation: Data Bus Buffer : It is a tri-state, bi-directional, 8-bit buffer, which is used to interface the
8253/54 to the system data bus.
Explanation: Mode 1 : Programmable One Shot can be used as a mono stable multi-vibrator.
Correct
Interrupt is required for interruption of main program to perform a subroutine. It may be used at the start of
some program as per requirement but it is not mandatory at start of every program.
Which one of the following circuits transmits two messages simultaneously in one direction
Diplex
Duplex
Quadruplex
Simplex
Incorrect
Diplex circuits transmits two messages simultaneously
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
8085 microprocessor has how many pins
41
40
30
39
Incorrect
Intel 8085 NMOS microprocessor is a 8 bit, 40 pins IC. It is a 40 pin I.C. package fabricated on a single LSI chip. The
Intel 8085 uses a single + 5 V DC supply for its operation.Its clock speed is about 3 MHz. The clock cycle is 320 ns. It
has 80 basic instructions and 246 opcodes.
What is SIM?
Incorrect
Allenhouse Institute of Technology (UPTU Code : 505)
SIM stands for set interrupt mask which is handling the interrupts in 8085 microprocessor.
Rooma, Kanpur – 208 008
MROM
FROM
PROM
FPROM
Correct
In PROM data is stored by user. Only one time programmable and reprogramming is not possible
In 8085 microprocessor, the RST6 instruction transfer programme execution to following location
0060H
0024H
0030H
0048H
Incorrect
Allenhouse Institute of Technology (UPTU Code : 505)
6 X 8 = ( 48)10= 0030H.
Rooma, Kanpur – 208 008
end of program.
Correct
HLT opcode in 8085 microprocessor means end of program
A microprocessor is ALU
Incorrect
Allenhouse Institute of Technology (UPTU Code : 505)
A microprocessor is a semiconductor component designed by using VLSI technology and it contains ALU, Control unit
(CU) and registers of a CPU in a single package Rooma, Kanpur – 208 008
The length of bus cycle in 8086/8088 is four clock cycles, T1, T2, T3, T4 and an indeterminate
number of wait state clock cycles denoted by Tw. The wait states are always inserted between
𝑇4&𝑇1
𝑇2&𝑇3
𝑇3&𝑇4
𝑇1&𝑇2
Correct
A combinational PLD with a programmable AND array and a programmable OR array is called a
PAL
PLA
PROM
PLD
Allenhouse Institute of Technology (UPTU Code : 505)
Incorrect Rooma, Kanpur – 208 008
ROM – Fixed AND array and fixed OR array PROM – Fixed AND array and Programmable OR array PAL –
Programmable AND array and fixed OR array PLA – Programmable AND array and programmable OR array
VHDL
Verilog
Incorrect
Verilog and VHDL are the hardware description languages that are used for the programming of FPGAs. Both
of these languages are case-insensitive in nature.
program counter
stack pointer
Allenhouse Institute of Technology (UPTU Code : 505)
both stack pointer & program counter
Rooma, Kanpur – 208 008
Correct
Program counter (PC) and Stack pointer (SP) are basically used to hold 16 - bit memory addresses. PC stores
the 16-bit memory address of the next instruction to be fetched. SP can be used to temporarily store the 16 - bit
memory address as well as data. So PC and SP are 16-bit registers.
Incorrect
When ALE signal is high all the buses are used as address bus and when it is low lower byte of address bus is
used as data bus.
Incorrect
Program counter stores the address of next instruction to be fetched. AS 8085 address is of 16-bit so program
counter has to be of 16-bit
Program Counter (PC) specifies the address of the instruction last executed
Correct
21
40
Allenhouse Institute of Technology (UPTU Code : 505)
19
Rooma, Kanpur – 208 008
27
Incorrect
In 8085 microprocessor there are 40 pins out of which 27 are output pins and rest 13 are including clock input,
power supply and other input pins
I)A total of about one million bytes can be directly addressed by the 8086 microprocessor II)8086
has thirteen 16-bit registers III)8086 has eight flags IV)Compared to 8086, the 80286 provides a
higher degree of memory protection Which one of the statements given above are correct?
2,3&4
1,3 &4
1,2 & 4
1,2 & 3
Correct
→ 8086 has 9 flags i.e. CF, PF, AF, ZF, SF, TF, IF, DF, OF → 8086 has 20 address lines so it can address
220 = 1Mbyte memory location. → 8086 has thirteen 16-bit registers
Correct
What are the sets of commands in a program which are not translated into machine instructions
during assembly process, called?
Mnemonics
Directives
Identifiers
Operands
Incorrect
Directives are not translated into machine instruction during assembly process.
EEPROM
MROM
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
PROM
EPROM
Incorrect
The ROM programmed during manufacturing process itself is called MROM. Data is stored by the manufacturer during
fabrication. User can not alter
S, Z, AC, P, CY
S, Z, OV, P, CY
S, Z, AC, P, OV
S, OV, AC, P, CY
Incorrect
8085 microprocessor has 5 status flag S → Sign flag Z → Zero flag AC → Auxiliary carry flag P → Parity flag
CY → Carry flag
A combinational PLD with a fixed AND array and a programmable OR array is called a
PLA
PAL
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
PROM
PLD
Correct
ROM – Fixed AND array and fixed OR array PROM – Fixed AND array and Programmable OR array PAL –
Programmable AND array and fixed OR array PLA – Programmable AND array and programmable OR array
A combinational PLD with a fixed AND array and a programmable OR array is called a
PLA
PAL
PROM
PLD
Correct
ROM – Fixed AND array and fixed OR array PROM – Fixed AND array and Programmable OR array PAL –
Programmable AND array and fixed OR array PLA – Programmable AND array and programmable OR array
FPGA means
Correct
Field Programmable Gate Array (FPGA) are the re-configurable hardware. Which consists of millions of logic
gate which could be arranged according to the user's demand. Also having much higher frequency than in
micro controllers.
Object program
Macroinstruction
Source program
Symbolic addressing
Incorrect
Input to a assembler is the source program and assembler converts it into object program.
A combinational PLD with a programmable AND array and a fixed OR array is called a
PAL
PLD
Allenhouse Institute of Technology (UPTU Code : 505)
PROM
Rooma, Kanpur – 208 008
PLA
Incorrect
ROM – Fixed AND array and fixed OR array PROM – Fixed AND array and Programmable OR array PAL –
Programmable AND array and fixed OR array PLA – Programmable AND array and programmable OR array
TRAP
RST 3
RST 7.5.
INTR
Incorrect
Here TRAP, INTR, RST 7.5 are vectored interrupt. But RST 3 is not a non vectored interrupt.
The cycle required to fetch and execute an instruction in a 8085 microprocessor is which one of
the following?
Clock cycle
Memory cycle
Allenhouse Institute of Technology (UPTU Code : 505)
Instruction cycle
Rooma, Kanpur – 208 008
Machine cycle
Incorrect
One machine cycle is equivalent to one memory access. Clock cycle implies one clock period. Instruction cycle
includes fetching and execution of a given instruction.
A good assembly language programmer should use general purpose registers rather than memory
in maximum possible ways for data processing. This is because:
Data processing with memory requires more instructions in the program than that with registers
Data processing with registers takes fewer cycles than that with memory
Incorrect
Data processing with registers takes fewer cycle than with memory which require extra memory read or write
signal.
Incorrect
The ROM programmed during manufacturing process itself is called MROM. Data is stored by the
manufacturer during fabrication. User can not alter. In PROM data is stored by user. Only one time
programmable and reprogramming is not possible. EPROM erasing is done using UV light and programming is
through electrical.
2. B and C register
3. D and E register
4. H and L register
Which of these 8-bit registers of 8085 microprocessor can be paired together to make a 16-bit
register?
1, 2 and 4
2, 3 and 4
1, 2 and 3
Allenhouse Institute of Technology (UPTU Code : 505)
1, 3 and 4
Rooma, Kanpur – 208 008
We can not combine accumulator and flag register to form 16-bit register whereas B & C, D & E, H & L can
be combined to form a 16-bit register.
2.Performs comparisons.
1 and 2 only
3 and 4 only
1, 2 and 3
1, 2, 3 and 4
Incorrect
ALU performs arithmetic and logical operations. Note: Comparison is a logical operation.
Correct
While using a frequency counter for measuring frequency, two modes of measurement are
possible.
1. Period time
2. Frequency mode
There is a ‘cross-over frequency’ below which the period mode is preferred. Assuming the crystal
oscillator frequency to be 4Mhz the crossover frequency is given by
2 Mhz
8 Mhz
1Khz
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
2 Khz
Incorrect
As we know crossover frequency is the half of oscillator frequency. i.e.fcross-over = fcrystal/2 = 2Mhz
Number of Hex digits needed to represent the 20-bit address of a memory location are
20
16
Incorrect
Since a hex digit requires 4 bits to represent, it will take 5 hex digits to represent the 20-bit address of a
memory location.
Incorrect
Incorrect
ALU consists of Accumulator, temporary register, arithmetic, logic circuits and five flags.
Opcode
Operand
Continue
Allenhouse Institute of Technology (UPTU Code : 505)
Comment
Rooma, Kanpur – 208 008
Correct
Incorrect
At first instruction is fetched then decoded and then read effective address and executed.
A bus connected between the CPU and main memory that permits transfer of information between
main memory and the CPU is known as
Address bus
Memory bus
Control bus
Allenhouse Institute of Technology (UPTU Code : 505)
DMA bus
Rooma, Kanpur – 208 008
Correct
We know data bus (Also known as Memory bus) allows transfer of information between main memory and the
CPU.
I) Sign flag
(I) only
Correct
Multi-operations
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
Macro-operations
Micro-operations
Bi control-operations
Incorrect
The operations executed by two or more control units are referred as Macro-operations.
Incorrect
To provide proper WAIT states when the microprocessor is communicating with a slow peripheral device.
To indicate to user that the microprocessor is working and is ready for use.
Incorrect
Ready signal is used in microprocessor to communicate with slow peripheral device. It provides proper
synchronization between processor and slow devices.
Accumulator
Register
Stack pointer
Register C
Incorrect
In a 8085 microprocessor Accumulator, register B & C are of 8-bit whereas stack pointer is a 16-bit register.
Consider the following statements: In 8085 microprocessor, data-bus and address bus are
multiplexed in order to
II) only
(I) only
Incorrect
Lower byte of address bus (𝐴0-𝐴7 ) are multiplexed with data bus (𝐴𝐷0-𝐴𝐷7 ) to reduce the number of pins of
microprocessor. This multiplexed address is controlled by ALE signal.
Assertion(A): Monostable multivibrators (IC74121) are used in a microprocessor based system for
frequency measurement.
Incorrect
IC74121 is used for frequency measurement in microprocessor and microprocessor counts the number of
interrupt signals/second or within a specified interval through ISR.
Both the ALU and control section of CPU employ which special purpose storage location?
Buffers
Decoders
Accumulators
Registers
Correct
Accumulator is a special purpose 8-bit register which is used as a storage for almost all arithmetic and logic
operations.
Both the ALU and control section of CPU employ which special purpose storage location?
Buffers
Decoders
Accumulators
Allenhouse Institute of Technology (UPTU Code : 505)
Registers
Rooma, Kanpur – 208 008
Correct
Accumulator is a special purpose 8-bit register which is used as a storage for almost all arithmetic and logic
operations.
Incorrect
Ready signal is used to provide proper wait state when processor is communicating with a slow peripheral
device.
The register which holds the information about the nature of results of arithmetic and logic
operations is called as
Flag register
Accumulator
Incorrect
39
30
41
40
Correct
Intel 8085 NMOS microprocessor is a 8 bit, 40 pins IC. It is a 40 pin I.C. package fabricated on a single LSI
chip. The Intel 8085 uses a single + 5 V DC supply for its operation.Its clock speed is about 3 MHz. The clock
cycle is 320 ns. It has 80 basic instructions and 246 opcodes.
Which components are NOT found on chip in a microprocessor but may be found on chip in a
microcontroller?
Correct
EPROM, USART & PORTS are found on chip in microcontroller but not in microprocessor chip.
In 8085 microprocessor system with memory mapped I/O, which of the following is true?
There can be maximum of 256 input devices and 256 output devices
Arithmetic and logic operations can be directly performed with the I/O data
Incorrect
With the memory mapped I/O arithmetic and logic operations can be directly performed whereas with I/O
mapped I/O it is not possible. Options A, B, C are valid for I/O mapped I/O.
The output data lines of microprocessor and memories are usually tristated because
The data line can be multiplexed for both input and output
More than one device can transmit over the data bus at the same time
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
More than one device can transmit information over the data bus by enabling only one device at a time
Correct
Using tristate buffer, more than one device can transmit information over the data bus by enabling only one
device at a time.
a short abbreviation for the data word stored at the operand address
Question 28 of 30
Your Score: 9 of 30
A fetch cycle
Incorrect
Question 29 of 30
Your Score: 9 of 30
Incorrect
ALU consists of Accumulator, temporary register, arithmetic, logic circuits and five flags.
Q. Match the items given in List I and those in List II. Select your answers using the
codes given in the question.
List I List II
Instruction Operation
1. Exchange the top of the stack with
A. PCHL
the contents of HL pair
2. Exchange the contents of HL with
B. SPHL
those of DE pair
3. Transfer the contents of HL to the
C. XTHL
stack pointer
4. Transfer the contents of HL to the
D. XCHG
programme counter
Codes: A B C D
(a) 3 4 1 2
(b) 3 4 2 1
(c) 4 3 2 1
(d) 4 3 1 2
Answer
(d)
Allenhouse Institute of Technology (UPTU Code : 505)
Q. Match the items given in List I and those in List II. Select your answers using the
Rooma, Kanpur – 208 008
codes given in the question.
List I List II
Addressing mode Instruction
A. Implicit addressing 1. JMP 3FAO H
B. Register-indirect 2. MOV A,M
C. Immediate 3. LDA 03FC H
D. Direct addressing 4. RAL
Codes: A B C D
(a) 4 1 2 3
(b) 4 2 1 3
(c) 3 2 1 4
(d) 3 1 2 4
Answer
(b)
Q. Match the items given in List I and those in List II. Select your answers using the
codes given in the question.
List I List II
Instruction Type of addressing
A. MOV A,M 1. Direct addressing
B. LXIH, E400 H 2. Register addressing
C. LDA F1CD H 3. Implicit addressing
D. CMC 4. Register Indirect addressing
5. Immediate addressing
Codes: A B C D
(a) 5 4 1 3
(b) 4 5 3 1
(c) 5 4 2 3
(d) 4 5 1 3
Answer
(d)
stems, and mobile phones.
1). Microprocessor is a unit that controls ___________.
Allenhouse Institute of Technology (UPTU Code : 505)
Microcomputer - Rooma, Kanpur – 208 008
Marco computer
Input-output devices
System on chip
Hint
Read more about Microprocessor.
2). ALU stands for ________.
Both a and b -
ALU
Register array
Control unit
It consists of an accumulator
Allenhouse Institute of Technology (UPTU Code : 505)
Both a and b - Rooma, Kanpur – 208 008
It is a storage element
It decides how computer memory, ALU unit, the input-output device should respond to the processor's
instructions
Sequential manner -
Concurrent manner
Both a and b
Allenhouse Institute of Technology (UPTU Code : 505)
None of the above Rooma, Kanpur – 208 008
Hint
10). Instructions in a microprocessor, are fetched from _________.
Memory -
ALU
CPU
Start
Stop -
Continue
Decimal
Binary
Both b and c
Hint
13). Microprocessor understands a set of instructions called ________.
Instruction set -
Software
Code
Bandwidth -
Clock speed
Frequency
Hint
15). A number of operations processes per second by a processor is called ______.
Instruction processor
Bandwidth
Clock speed -
Frequency
Hint
16). Word length depends on _______.
Registers
ALU
8-
12
16
Hint
18). Word length in a microcomputer ranges from ______.
4 bits to 64 bits -
4 bits to 128bits
Allenhouse Institute of Technology (UPTU Code : 505)
16 bits to 64 bits Rooma, Kanpur – 208 008
4 bits to 64 bytes
Hint
19). Which of the following are the data types used in a microprocessor?
Binary
BCD
ASCII
A to Z
+1 and -1
Both a and b
Hint
21). BCD number is represented in which of the following.
4 bits -
+1 and -1
Both a and b
Hint
22). ASCII stands for _______.
Computers
Telecommunication
4 bits
+1 and -1 -
Both a and b
Hint
25). Un-Signed number is represented in which of the following?
4 bits
+1 and -1
0-
Hint
26). Which of the following are the features of a microprocessor?
Cost-effective
Is more versatile
Silicon
Allenhouse Institute of Technology (UPTU Code : 505)
Quartz Rooma, Kanpur – 208 008
Metals
1 month
2 months -
3 months
4 months
Hint
29). A microprocessor is classified based on which of the following factors.
3-
5
Hint
Read more about RISC and CISC Processors.
33). What is the main purpose of the RISC type processor?
Both a and b -
Yes -
No
Maybe
Hint
35). Choose the examples of RISC type processors.
Low optimized
Optimized
Instruction cache
Main memory
Simple -
Tough
Equal
Yes -
No
Maybe
Hint
40). RISC type processor uses _____ types of addressing modes?
Simple -
Complex
Common
Allenhouse Institute of Technology (UPTU Code : 505)
Both a and b Rooma, Kanpur – 208 008
Hint
41). RISC type processor uses _____ length instruction for pipelining.
Fixed -
Variable
Common
Both a and b
Hint
42). RISC type processor uses ______ cycle execution time.
One -
Two
Three
Four
Hint
43). Which of the following instruction in the RISC type processor access memory location?
LOAD instruction
STORE instruction
Transfer instruction
Both a and b -
Hint
44). RISC type processor contains ______ number of processors.
Many -
Few
Hint
45). RISC type processor contains _______ number of transistors.
Allenhouse Institute of Technology (UPTU Code : 505)
2 Rooma, Kanpur – 208 008
Large
Few -
Hint
46). CISC type processor is designed` to _______ number of instruction per program.
Maximize
Minimize -
Zero
Both a and b -
Large
Small -
Equal
IBM 370/168
VAX 11/780
Allenhouse Institute of Technology (UPTU Code : 505)
Intel 80486 Rooma, Kanpur – 208 008
Control unit
Cache
Main memory
Few
One
Various -
Zero
Hint
52). CISC type processor uses _______ number of instructions.
Less
Large -
Zero
Simple
Complex -
Fragile
4
Hint
55). What is the purpose of designing a special processor?
Math processor
Input-output processor
Transputer
Slower
Faster -
Allenhouse Institute of Technology (UPTU Code : 505)
Moderate Rooma, Kanpur – 208 008
DMA processor
Both a and b -
Transistor computer -
Transact computer
Transistor component
Own local -
External
Both a and b
1980 -
1979
1890
1888
Hint
65). Which of the following statement matches the transputer?
It improves performance
16bit T212
32 bit T425
T800
Voltage level sampling at periodic intervals of time and converting this voltage level at that instant into
digital form -
Voltage level sampling at aperiodic intervals of time and converting this voltage level at that instant into
digital form
Voltage level sampling at periodic intervals of time and converting current level at that instant into digital
form
Program memory
Data memory
Compute engine
Both a and b
Both a and b
Both a and b
AV compression
2D / 3D graphics acceleration
Music synthesis
TMS320C50
Both a and b -
8085
8086
8051
Both a and b -
Hint
78). 8085 is a ______ bit microprocessor.
8 bit -
16 bit
32 bit
Intel -
ADM
Microsoft
8 bits -
Allenhouse Institute of Technology (UPTU Code : 505)
16 bits Rooma, Kanpur – 208 008
32 bits
48 bits
Hint
81). 8085 microprocessor has _____ bits of address bus?
8 bits
16 bits -
32 bits
48 bits
Hint
82). 8085 microprocessor has ________ bits of program counter.
8 bits
16 bits -
32 bits
48 bits
Hint
83). 8085 microprocessor has ______ bits of stack pointer.
8 bits
16 bits -
32 bits
48 bits
Hint
84). 8085 microprocessor has six _______ bits of registers.
8 bits-
16 bits
32 bits
Allenhouse Institute of Technology (UPTU Code : 505)
48 bits Rooma, Kanpur – 208 008
Hint
85). Which of the following are the register pair in the 8085 microprocessor?
BC
DE
HL
Washing machine
Ovens
Mobiles
Accumulator
ALU
5-
7
Hint
Read more about Flip-Flops.
90). Which of the following are control signals of the 8085 processor?
HOLD, HLDA
RESET
Hint
HOLD, HLDA
RESET
Hint
92). Which of the following are DMA signals of the 8085 processor?
HOLD, HLDA -
RESET
Hint
93). Which of the following are RESET signals of the 8085 processor?
HOLD, HLDA
INTR
RST 7.5
RST 6.5
Both a and b
Allenhouse Institute of Technology (UPTU Code : 505)
None of the above Rooma, Kanpur – 208 008
Hint
98). Data bus in 8085 is _______ directional.
Unidirectional
Bi-directional -
Tri directional
Multi-directional
Hint
99). Data bus in 8085 is used for ______.
Storing data -
Carrying data
Manipulating data
Storing data
Manipulating data
4 bit ALU
8 bit ALU
16 bit ALU
32 bit ALU -
Hint
102). Which of the following are the types of registers in the 8086 microprocessor?
Allenhouse Institute of Technology (UPTU Code : 505)
General-purpose registers Rooma, Kanpur – 208 008
Segment registers
None
Hint
103). 8086 can operate in ______ modes.
2-
4
Hint
104). Name the modes in which 8086 performs operations.
Maximum mode
Minimum mode
Operating mode
Hint
105). How much power supply does 8086 need to perform operations?
4v
3v
2v
+ 5v -
Hint
106). What is the full form of HMOS?
None
Hint
107). 8086 uses ______ channel HMOS microprocessor.
P-channel
N- Channel -
Both a and b
None
Hint
108). What are the different types of flags in 8086?
Auxiliary carry flag, overflow flag, Parity flag, Sign flag Zero flag,
None
Hint
110). What is the size of the address bus and data bus in the 8086 processor?
16bits
20bits
Both a and b -
None
Hint
Allenhouse Institute of Technology (UPTU Code : 505)
111). What is the use of addressing mode in 8086 microprocessor?
Rooma, Kanpur – 208 008
To calculate the operands effective memory address -
None
Hint
112 ). Which type of package of 8086 microprocessor?
Multithreaded package
Both a and b
None
Hint
114). Does the 8086 processor has multiplication and division instructions?
8086 have both multiplication and division instructions
No
Only multiplication
Only Division
Hint
Allenhouse Institute of Technology (UPTU Code : 505)
115). What are the operating frequencies of the 8086 microprocessor?
Rooma, Kanpur – 208 008
8086 microprocessor operates 5 MHz, 8MHZ, 10MHZ
5 MHz
8 MHz
10 MHz
HMOS technology
NMOS technology
PMOS technology
Semiconductor technology
Hint
117). What are the characteristics of the flag register in 8086?
A flag register used in 8086 is a special purpose register, with 16 bits, it is changed to 0/ 1 after arithmetic and
logic operation
1 bit
6 bit
16bit
Hint
Allenhouse Institute of Technology (UPTU Code : 505)
119). What is the purpose of zero flags in the 8086 processor?
Rooma, Kanpur – 208 008
Checks the arithmetic operation
Checks the logical operation The purpose of zero flags in the 8086 processor is to check
arithmetic operations and include bitwise logical instruction
Both a and c
Hint
120). 8086 is a _________.
Microprocessor
Both a and b
None
Hint
121). 8051 is a ________.
Microcontroller
Both a and b
None
Hint
Marks : 0/20
Total number of questions : 20
B. for
C. if
D. union
2. A computer program is used to read M and print the sum 2 + 4 + 6 + 8 +.........+ 2M. If M = 9 , the print out will
show the number
A. 9
B. 18
C. 90
D. 100
B. 1, 2, 3 only
C. 2, 3, 4 only
D. 1, 2 and 4 only
REAL F , C
READ * , F
C = (5. / 9.) * (F - 32.)
A. 35.0
B. 35
C. 25.0
D. 25
B. 4
C. 5
D. 6
B. -2.3 E - 8
C. 2.3 E - 7
D. -2.3 E - 7
Which of the following methods does not cause any reduction in instruction length?
Allenhouse Institute of Technology (UPTU Code : 505)
A. Using program counter Rooma, Kanpur – 208 008
9. Assertion (A): In C arithmetic operations are pemiissible on ints, floats and chars.
Reason (R): In C every arithmetic operator must be written explicitly.
A. Both A and R are correct and R is correct explanation of A
C. A is correct R is wrong
D. A is wrong R is correct
10. Assertion (A): In microprocessor 8085 instruction LXIB, 90 FF H means register B and C are loaded with
upper and lower bytes to get B = 90 H and C = FFH.
Reason (R): In 8085 the stack pointer indicates which memory location is to accessed.
A. Both A and R are correct and R is correct explanation of A
C. A is correct R is wrong
D. A is wrong R is correct
A. 1 and 00000011
B. 0 and 00000011
C. 1 and 00000001
D. 0 and 00000001
12. The word size accessible at a time from the memory subsystem depends on
A. width of data bus
B. False
A PC has typically
Allenhouse Institute of Technology (UPTU Code : 505)
A. 5 to 10 KB of main memory Rooma, Kanpur – 208 008
B. False
A. All
B. 1 and 2 only
C. 1 and 3 only
D. 2 and 3 only
B. UVEPROM
C. EEPROM
C. A is correct R is wrong
D. A is wrong R is correct
Microprocessor: 8085
Multiple Choice Questions and Answers:-
1) Which is the microprocessor comprises:
a.Register section
b.One or more ALU
c.Control unit
d.All of these
Answer:D
2) What is the store by register?
a.data
b.operands
c.memory
d.None of these
Answer:A
3) Accumulator based microprocessor example are:
a.Intel 8085
b.Motorola 6809
c.A and B
d.None of these
Answer:C
Allenhouse Institute of Technology (UPTU Code : 505)
4) A set of register which contain are:
a.data Rooma, Kanpur – 208 008
b.memory addresses
c.result
d.all of these
Answer:D
5) There are primarily two types of register:
a.general purpose register
b.dedicated register
c.A and B
d.none of these
Answer:C
6) Name of typical dedicated register is:
a.PC
b.IR
c.SP
d.All of these
Answer:D
7) BCD stands for:
a.Binary coded decimal
b.Binary coded decoded
Allenhouse Institute of Technology (UPTU Code : 505)
c.Both a & b
d.none of these Rooma, Kanpur – 208 008
Answer:A
8) Which is used to store critical pieces of data during subroutines and interrupts:
a.Stack
b.Queue
c.Accumulator
d.Data register
Answer:A
9) The data in the stack is called:
a.Pushing data
b.Pushed
c.Pulling
d.None of these
Answer:A
10) The external system bus architecture is created using from ______ architecture:
a.Pascal
b.Dennis Ritchie
c.Charles Babbage
d.Von Neumann
Answer:D
Allenhouse Institute of Technology (UPTU Code : 505)
11) The processor 80386/80486 and the Pentium processor uses _____ bits address bus:
a.16 Rooma, Kanpur – 208 008
b.32
c.36
d.64
Answer:B
12) Which is not the control bus signal:
a.READ
b.WRITE
c.RESET
d.None of these
Answer:C
13) PROM stands for:
a.Programmable read-only memory
b.Programmable read write memory
c.Programmer read and write memory
d.None of these
Answer:A
14) EPROM stands for:
a.Erasable Programmable read-only memory
Allenhouse Institute of Technology (UPTU Code : 505)
b.ectrically Programmable read write memory
c.Electrically Programmable read-only memory Rooma, Kanpur – 208 008
d.None of these
Answer:A
15) Each memory location has:
a.Address
b.Contents
c.Both A and B
d.None of these
Answer:C
16) Which is the type of microcomputer memory:
a.Processor memory
b.Primary memory
c.Secondary memory
d.All of these
Answer:D
17) Secondary memory can store____:
a.Program store code
b.Compiler
c.Operating system
Allenhouse Institute of Technology (UPTU Code : 505)
d.All of these
Answer:D Rooma, Kanpur – 208 008
18) Secondary memory is also called____:
a.Auxiliary
b.Backup store
c.Both A and B
d.None of these
Answer:C
19 Customized ROMS are called:
a.Mask ROM
b.Flash ROM
c.EPROM
d.None of these
Answer:A
20) The RAM which is created using bipolar transistors is called:
a.Dynamic RAM
b.Static RAM
c.Permanent RAM
d.DDR RAM
Answer:B
Allenhouse Institute of Technology (UPTU Code : 505)
21) Which type of RAM needs regular referred:
a.Dynamic RAM Rooma, Kanpur – 208 008
b.Static RAM
c.Permanent RAM
d.SD RAM
Answer:A
22) Which RAM is created using MOS transistors:
a.Dynamic RAM
b.Static RAM
c.Permanent RAM
d.SD RAM
Answer:A
23) A microprocessor retries instructions from :
a.Control memory
b.Cache memory
c.Main memory
d.Virtual memory
Answer:C
24) The lower red curvy arrow show that CPU places the address extracted from the memory
location on the_____:
Allenhouse Institute of Technology (UPTU Code : 505)
a.Address bus
b.System bus Rooma, Kanpur – 208 008
c.Control bus
d.Data bus
Answer:A
25) The CPU sends out a ____ signal to indicate that valid data is available on the data bus:
a.Read
b.Write
c.Both A and B
d.None of these
Answer:B
26) The CPU removes the ___ signal to complete the memory write operation:
a.Read
b.Write
c.Both A and B
d.None of these
Answer:A
27) BIU STAND FOR:
a.Bus interface unit
b.Bess interface unit
c.A and B
Allenhouse Institute of Technology (UPTU Code : 505)
d.None of these
Answer:A Rooma, Kanpur – 208 008
28) EU STAND FOR:
a.Execution unit
b.Execute unit
c.Exchange unit
d.None of these
Answer:A
29) Which are the four categories of registers:
a.General- purpose register
b.Pointer or index registers
c.Segment registers
d.Other register
e.All of these
Answer:E
30) Eight of the register are known as:
a.General- purpose register
b.Pointer or index registers
c.Segment registers
d.Other register
Answer:A
Allenhouse Institute of Technology (UPTU Code : 505)
31) The four index register can be used for:
a.Arithmetic operation Rooma, Kanpur – 208 008
b.Multipulation operation
c.Subtraction operation
d.All of these
Answer:A
32) IP Stand for:
a.Instruction pointer
b.Instruction purpose
c.Instruction paints
d.None of these
Answer:A
33) CS Stand for:
a.Code segment
b.Coot segment
c.Cost segment
d.Counter segment
Answer:A
34) DS Stand for:
a.Data segment
Allenhouse Institute of Technology (UPTU Code : 505)
b.Direct segment
c.Declare segment Rooma, Kanpur – 208 008
d.Divide segment
Answer:A
35) Which are the segment:
a.CS: Code segment
b.DS: data segment
c.SS: Stack segment
d.ES:extra segment
e.All of these
Answer:D
36) The acculatator is 16 bit wide and is called:
a.AX
b.AH
c.AL
d.DL
Answer:A
37) How many bits the instruction pointer is wide:
a.16 bit
b.32 bit
c.64 bit
Allenhouse Institute of Technology (UPTU Code : 505)
d.128 bit
Answer:A Rooma, Kanpur – 208 008
38) How many type of addressing in memory:
a.Logical address
b.Physical address
c.Both A and B
d.None of these
Answer:C
39) The size of each segment in 8086 is:
a.64 kb
b.24 kb
c.50 kb
d.16kb
Answer:A
40) The _______ address of a memory is a 20 bit address for the 8086 microprocessor:
a.Physical
b.Logical
c.Both
d.None of these
Answer:A
Allenhouse Institute of Technology (UPTU Code : 505)
41) The pin configuration of 8086 is available in the________:
a.40 pin Rooma, Kanpur – 208 008
b.50 pin
c.30 pin
d.20 pin
Answer:A
42) DIP stand for:
a.Deal inline package
b.Dual inline package
c.Direct inline package
d.Digital inline package
Answer:B
43) EA stand for:
a.Effective address
b.Electrical address
c.Effect address
d.None of these
Answer:A
44) BP stand for:
a.Bit pointer
Allenhouse Institute of Technology (UPTU Code : 505)
b.Base pointer
c.Bus pointer Rooma, Kanpur – 208 008
d.Byte pointer
Answer:B
45) DI stand for:
a.Destination index
b.Defect index
c.Definition index
d.Delete index
Answer:A
46) SI stand for:
a.Stand index
b.Source index
c.Segment index
d.Simple index
Answer:B
47) ALE stand for:
a.Address latch enable
b.Address light enable
c.Address lower enable
d.Address last enable
Allenhouse Institute of Technology (UPTU Code : 505)
Answer:A
48) NMI stand for: Rooma, Kanpur – 208 008
a.Non mask able interrupt
b.Non mistake interrupt
c.Both
d.None of these
Answer:A
49) ________ is the most important segment and it contains the actual assembly language
instruction to be executed by the microprocessor:
a.Data segment
b.Code segment
c.Stack segment
d.Extra segment
Answer:B
50) The offset of a particular segment varies from _________:
a.000H to FFFH
b.0000H to FFFFH
c.00H to FFH
d.00000H to FFFFFH
Answer:B
Allenhouse Institute of Technology (UPTU Code : 505)
51) Which are the factor of cache memory:
a.Architecture of the microprocessor Rooma, Kanpur – 208 008
b.Properties of the programs being executed
c.Size organization of the cache
d.All of these
Answer:D
52) ________ is usually the first level of memory access by the microprocessor:
a.Cache memory
b.Data memory
c.Main memory
d.All of these
Answer:A
53) Which is the small amount of high- speed memory used to work directly with the
microprocessor:
a.Cache
b.Case
c.Cost
d.Coos
Answer:A
54) The cache usually gets its data from the_________ whenever the instruction or data is
Allenhouse Institute of Technology (UPTU Code : 505)
required by the CPU:
a.Main memory Rooma, Kanpur – 208 008
b.Case memory
c.Cache memory
d.All of these
Answer:A
55) Microprocessor reference that are available in the cache are called______:
a.Cache hits
b.Cache line
c.Cache memory
d.All of these
Answer:A
56) Microprocessor reference that are not available in the cache are called_________:
a.Cache hits
b.Cache line
c.Cache misses
d.Cache memory
Answer:C
57) Which causes the microprocessor to immediately terminate its present activity:
a.RESET signal
b.INTERUPT signal
Allenhouse Institute of Technology (UPTU Code : 505)
c.Both
d.None of these Rooma, Kanpur – 208 008
Answer:A
58) Which is responsible for all the outside world communication by the microprocessor:
a.BIU
b.PIU
c.TIU
d.LIU
Answer:A
59) INTR: it implies the__________ signal:
a.INTRRUPT REQUEST
b.INTRRUPT RIGHT
c.INTRRUPT RONGH
d.INTRRUPT RESET
Answer:A
60) Which of the following are the two main components of the CPU?
a.Control Unit and Registers
b.Registers and Main Memory
c.Control unit and ALU
d.ALU and bus
Answer:C
Allenhouse Institute of Technology (UPTU Code : 505)
61) Different components n the motherboard of a PC unit are linked together by sets of parallel
Rooma, Kanpur – 208 008
electrical conducting lines. What are these lines called?
a.Conductors
b.Buses
c.Connectors
d.Consecutives
Answer:B
62) The language that the computer can understand and execute is called
a.Machine language
b.Application software
c.System program
d.All of the above
Answer:A
63) Which of the following is used as a primary storage device?
a.Magnetic drum
b.PROM
c.Floppy disk
d.All of these
Answer:B
64) Which of the following memories needs refresh?
Allenhouse Institute of Technology (UPTU Code : 505)
a.SRAM
b.DRAM Rooma, Kanpur – 208 008
c.ROM
d.All of above
Answer:B
65) The memory which is programmed at the time it is manufactured
a.PROM
b.RAM
c.PROM
d.EPROM
Answer:A
66) Which of the following memory medium is not used as main memory system?
a.Magnetic core
b.Semiconductor
c.Magnetic tape
d.Both a and b
Answer:C
67) Registers, which are partially visible to users and used to hold conditional, are known as
Allenhouse Institute of Technology (UPTU Code : 505)
a.PC
b.Memory address registers Rooma, Kanpur – 208 008
c.General purpose register
d.Flags
Answer:C
68) One of the main feature that distinguish microprocessors from micro-computers is
a.Words are usually larger in microprocessors
b.Words are shorter in microprocessors
c.Microprocessor does not contain I/O devices
d.Exactly the same as the machine cycle time
Answer:C
69) The first microprocessor built by the Intel Corporation was called
a.8008
b.8080
c.4004
d.8800
Answer:C
70) An integrated circuit is
a.A complicated circuit
b.An integrating device
c.Much costlier than a single transistor
Allenhouse Institute of Technology (UPTU Code : 505)
d.Fabricated on a tiny silicon chip
Answer:D Rooma, Kanpur – 208 008
71) Most important advantage of an IC is its
a.Easy replacement in case of circuit failure
b.Extremely high reliability
c.Reduced cost
d.Low powers consumption
Answer:B
72) Which of the following items are examples of storage devices?
a.Floppy / hard disks
b.CD-ROMs
c.Tape devices
d.All of the above
Answer:D
73) The Width of a processor’s data path is measured in bits. Which of the following are common
data paths?
a.8 bits
b.12 bits
c.16 bits
d.32 bits
Allenhouse Institute of Technology (UPTU Code : 505)
Answer:A
74) Which is the type of memory for information that Rooma,
doesKanpur – 208 008
not change on your computer?
a.RAM
b.ROM
c.ERAM
d.RW / RAM
Answer:B
75) What type of memory is not directly addressable by the CPU and requires special softw3are
called EMS (expanded memory specification)?
a.Extended
b.Expanded
c.Base
d.Conventional
Answer:B
76) Before a disk can be used to store data. It must be…….
a.Formatted
b.Reformatted
c.Addressed
d.None of the above
Answer:A
Allenhouse Institute of Technology (UPTU Code : 505)
77) Which company is the biggest player in the microprocessor industry?
a.Motorola Rooma, Kanpur – 208 008
b.IBM
c.Intel
d.AMD
Answer:C
78) A typical personal computer used for business purposes would have… of RAM.
a.4 KB
b.16 K
c.64 K
d.256 K
Answer:D
78) The word length of a computer is measured in
a.Bytes
b.Millimeters
c.Meters
d.Bits
Answer:D
79) What are the three decisions making operations performed by the ALU of a computer?
a.Grater than
b.Less than
Allenhouse Institute of Technology (UPTU Code : 505)
c.Equal to
d.All of the above Rooma, Kanpur – 208 008
Answer:D
80) Which part of the computer is used for calculating and comparing?
a.Disk unit
b.Control unit
c.ALU
d.Modem
Answer:C
81) Can you tell what passes into and out from the computer via its ports?
a.Data
b.Bytes
c.Graphics
d.Pictures
Answer:A
82) What is the responsibility of the logical unit in the CPU of a computer?
a.To produce result
b.To compare numbers
c.To control flow of information
d.To do math’s works
Allenhouse Institute of Technology (UPTU Code : 505)
Answer:B
Rooma,
83) The secondary storage devices can only store data Kanpurcannot
but they – 208 008
perform
a.Arithmetic Operation
b.Logic operation
c.Fetch operations
d.Either of the above
Answer:D
84) Which of the following memories allows simultaneous read and write operations?
a.ROM
b.RAM
c.EPROM
d.None of above
Answer:B
85) Which of the following memories has the shortest access times?
a.Cache memory
b.Magnetic bubble memory
c.Magnetic core memory
d.RAM
Answer:A
86) A 32 bit microprocessor has the word length equal to
Allenhouse Institute of Technology (UPTU Code : 505)
a.2 byte
b.32 byte Rooma, Kanpur – 208 008
c.4 byte
d.8 byte
Answer:C
87) An error in computer data is called
a.Chip
b.Bug
c.CPU
d.Storage device
Answer:B
88) The silicon chips used for data processing are called
a.RAM chips
b.ROM chips
c.Micro processors
d.PROM chips
Answer:D
89) The metal disks, which are permanently housed in, sealed and contamination free containers
are called
a.Hard disks
Allenhouse Institute of Technology (UPTU Code : 505)
b.Floppy disk
c.Winchester disk Rooma, Kanpur – 208 008
d.Flexible disk
Answer:C
90) A computer consists of
a.A central processing unit
b.A memory
c.Input and output unit
d.All of the above
Answer:D
91) The instructions for starting the computer are house on
a.Random access memory
b.CD-Rom
c.Read only memory chip
d.All of above
Answer:C
92) The ALU of a computer normally contains a number of high speed storage element called
a.Semiconductor memory
b.Registers
c.Hard disks
d.Magnetic disk
Allenhouse Institute of Technology (UPTU Code : 505)
Answer:B
93) The first digital computer built with IC chips wasRooma,
knownKanpur
as – 208 008
a.IBM 7090
b.Apple – 1
c.IBM System / 360
d.VAX-10
Answer:C
94) Which of the following terms is the most closely related to main memory?
a.Non volatile
b.Permanent
c.Control unit
d.Temporary
Answer:D
95) Which of the following is used for manufacturing chips?
a.Control bus
b.Control unit
c.Parity unit
d.Semiconductor
Answer:D
96) To locate a data item for storage is
Allenhouse Institute of Technology (UPTU Code : 505)
a.Field
b.Feed Rooma, Kanpur – 208 008
c.Database
d.Fetch
Answer:D
97) A directly accessible appointment calendar is feature of a … resident package
a.CPU
b.Memory
c.Buffer
d.ALU
Answer:B
98) The term gigabyte refers to
a.1024 bytes
b.1024 kilobytes
c.1024 megabytes
d.1024 gigabyte
Answer:C
99) A/n …. Device is any device that provides information, which is sent to the CPU
a.Input
b.Output
c.CPU
Allenhouse Institute of Technology (UPTU Code : 505)
d.Memory
Answer:A Rooma, Kanpur – 208 008
100) Current SIMMs have either … or … connectors (pins)
a.9 or 32
b.30 or 70
c.28 or 72
d.30 or 72
Answer:D
Microprocessor 8085 MCQ Questions and Answers for preparation of MCA, BCA and other IT
examinations of various Institutions.
2) A device, which enables a microcomputer to perform the first of the above-mentioned tasks is
known as the input device.
a) Keyboard
b) Mouse
c) Toggle
d) All of the above.
3) The task of displaying the result computed by the microprocessor is performed by an output
device, some of the commonly used output device.
a) Cathode Ray Tube(CRT)
b) Light-Emitting diodes(LED’S)
c) Laser printer
d) All of the above.
8) Registers available for the temporary storage of operands or address affects the following:-
a) Memory space occupied by the program.
b) Time of execution of the program.
c) Ease of programming.
d) All of the above.
10) In the 8085A microprocessor, the data size is 8-bit and the address size is 16-bit.
a) B-C pair
b) D-E pair
c) H-L pair
d) All of the above.
12) A microprocessor to execute a program, the CPU has to do the following operations:
a) Fetch the opcode
b) Read a memory location for the data.
c) Perform the required operation
d) All of the above.
Allenhouse Institute of Technology (UPTU Code : 505)
13) An instruction cycle can be defined as the sum of an instruction fetch time and the instruction
Rooma, Kanpur – 208 008
execution time.
a) Instruction cycle=Instruction fetch + Instruction execute.
b) Memory location and deposited in the CPU’s
c) Both of these
d) None of the above.
30) The part of 8255 can be programmed for any other mode by writing a single control word into
the
a) Port
b) Control Logic
c) Set/Reset
d) Register.
21) The data which a microprocessor needs to process, comes from devices such as a keyboard.
a) Switch
b) Analog-to-digital
c) Digital-to-analog
d) All of the above.
23) To interconnect peripherals with the 8085 MPU, additional logic circuit, called interfacing devices.
These circuits include a device such as
a) buffer
b) Decoder
c) Encoder, latches
d) All of the above.
28) The ___ is a program that allows then used to test and debug the object file.
a) Assembler
b) Loader
c) Debugger
d) None of the above.
29) It is a program that takes the object file generated by the assembler program.
a) Loading
b) Loader
c) Debugger
d) All of the above.
30) Intel’s 8086 and 80286, Motorola’s M 68000 and Zilog’s Z8000 are some of the most powerful-
16-bit microprocessor are not available today. (T/F)
Ans. False
34) The physical components of this system are called the hardware. (T/F)
Ans. True
35) A set of instructions written for the microprocessor to perform a task is called an application.
(T/F)
Ans. False
37) The microprocessor applications are classified primarily into 3 categories: re-programmable
system and embedded system. (T/F)
Ans. True
Allenhouse Institute of Technology (UPTU Code : 505)
38) The first microprocessor was introduced by Intel Corporation in 1971. (T/F)
Rooma, Kanpur – 208 008
Ans. True
39) 4-bit microprocessor (Intel) introduced were ROCKWELL International‘s (PPS4). (T/F)
Ans. True
40) In 8087 ___ executes all the instructions including arithmetic, logical, transcendental, and data
transfer instructions.
A) Arithmetic and logical unit
B) Control Unit
C) Numeric Execution Unit
D) None of the above
42) The single IC which consists of ALU, control section, and register section is called___.
A) Microprocessor
B) Microcontroller
C) Register
D) Computer
43) A system bus which carries, only the control and timing signals then it is called as ____
A) Address bus
B) Data bus
C) Control bus
D) None of the above
44) Physical devices and circuitry of the computer are also known as ___ .
A) Hardware
B) Software
C) System Software
D) Application Software
45) Intel developed first processor 4004 in 1974 which was a ___ bit processor.
A) 1
B) 2
C) 3
D) 4
47) The ____ family was introduced as a part of Intel Centrino Technology.
A) Pentium M
B) Pentium I
C) Pentium II
D) Dual core
49) 16 bit microprocessor has ___ bit data bus and ___ bit address bus.
A) 16, 20
B) 8,16
C) 4, 16
D) 8,20
52) Assembler is a type of translator that translates ___ language into machine
level language.
A) High Level
B) Assembly level
C) Both A and B
D) None of the above
53) The addressing modes of 8086 can be categorized into ___ categories.
A) One
B) Two
Allenhouse Institute of Technology (UPTU Code : 505)
C) Three
Rooma, Kanpur – 208 008
D) Four
54) In ___ addressing mode the operands are specified in the instruction itself.
A) Immediate
B) Register
C) Direct
D) Indirect
55) ___ instructions are used in such cases when some instructions are needed to be executed
number of times to perform certain tasks.
A) Jump
B) Loop
C) Shift
D) Rotate
56) ___ instruction stops the execution of microprocessor and force microprocessor to enter into wait
state
A) WAIT
B) LOCK
C) ESC(Escape)
D) HALT
57) A series of data byte available in memory at consecutive locations is called as___.
A) Bit String
B) Byte String
C) Word
D) None of these
61) ___ is used by 8259 A to Decipher various Commnad Words the CPU writes.
A) INT
B) INTA
C) A0
D) RD
62) The length of a bus cycle in 8086 system is of ___ clock cycles.
A) One
B) Two
C) Three
D) Four
64) Data bus buffer is a ___ state bidirectional ___ bit buffer that is used to interface 8259A to the
system Data Bus.
A) 3,8
B) 2,8
C) 3,16
D) 2,16
66) In ___ cell the capacitor is used to store the charge as a representation of data.
A) Static RAM
B) ROM
C) Dynamic RAM
D) None of the above
69) In displays when small information or data has to be displayed then we can use ___.
A) LED
B) LCD
C) CRT
D) Both A and B
73) ___ is a programmable interval timer/counter designed for use with Intel Microprocessor system.
A) 8255
B) 8279
C) 8251
D) 8254
74) 8254 has powerful READ BACK command which allows the user to check the count value,
programmed mode, current mode and current status of counter
A) True
B) False
Microprocessor and Microcontroller multiple choice questions with answers for IT student who are
preparing for academic and competitive exam
3. A single IC which consists of ALU, control section and Register section is called ___.
Ans. Microprocessor
4. What is the name of the system which carries only the control and timing signals?
Ans. Control bus
7. Machine language can be directly understood and executed by a machine and it is the language of
0s and 1s. (True/False)
Ans. True
9. An operating system is a software component that acts as the ___ of a computer system.
Ans. Core
14. The 4004 was a ___ bit processor introduced by Intel in the year 1971.
Ans. 4
16. The ___ processor is the first in a family of the 64-bit microprocessor by Intel introduced in 2001.
Ans. Itanium
17. The original Core brand refers to Intel’s 32-bit mobile dual-core x86 CPUs that derived from the
___ branded processors.
Ans. Pentium M
23. 8086 microprocessor has ___ bit data bus and ___ bit address bus.
Ans. 16 bit, 20 bit
24. The prefetched instruction bytes are stored in a first in first out (FIFO) group of registers called an
___ for the Execution Unit.
Ans. Instruction Queue
Allenhouse Institute of Technology (UPTU Code : 505)
25. The ___ input provides the basic timing for processor operation and bus control activity.
Rooma, Kanpur – 208 008
Ans. Clock
29. An instruction has two fields one is ___ and another is ___.
Ans. Opcode, Operand
30. In 8086 microprocessor we use ___ to give instructions and to write the programs for 8086.
Ans. Assembly level Language
31. Interpreter translates ___ language into machine level language and the translation is done line by
line.
Ans. High level
33. ___ enables the programmers to run the program step by step so that the programmer can find
out the exact location of the error.
Ans. Debugger
34. In 8086 microprocessor address and control bus are multiplexed. (True/False)
Ans. False
36. How many processor cycles are there for all the bus cycles?
Ans. Four
38. In which mode the processor derives the status signals S2, S1 and S0?
Ans. Maximum mode
Allenhouse Institute of Technology (UPTU Code : 505)
39. The addressing modes of 8086 can be categorized into four categories. (True/False)
Rooma, Kanpur – 208 008
Ans. True
40. In ___ addressing mode the operand is specified in the instruction itself.
Ans. Immediate
41. Memory addressing mode can be divide into two groups. They are ___ and ___.
Ans. Direct, indirect
42. In ___ mode the address of the required data is calculated by adding signed or unsigned
displacement to the base registers BX or BP.
Ans. Based addressing with displacement mode
43. In ___ the port address can’t be changed throughout the execution of the program.
Ans. Fixed port addressing mode
44. ___ are the abbreviations used to write assembly language programs.
Ans. Mnemonics
45. The four fields in which the assembly level instruction is divided into are ___, ___, ___ and ___.
Ans. Label, opcode, operand, comments
47. ___ instruction adds the source, destination and also carry to the result.
Ans. ADC
49. ___ instruction suspends the execution of the microprocessor and it enters into the wait state.
Ans. Wait
50. CALL instruction transfers the control of execution of the program to the subroutine or
procedure. (True/False)
Ans. True
51. The ___ is used to reserve byte or bytes of memory locations in the available memory.
Ans. DB(Define Byte)
54. Regardless of the form of the primitive the actual ___ are determined solely by the contents of the
SI, DI, DS, and ES registers.
Ans. Operands
56. In assembly language the prefix is invoked by placing the appropriate repeat (REP) mnemonic
before the primitive. (True/False)
Ans. True
57. A terminal may communicate with the computer using the EBCDIC alphanumeric code even
though the computer’s software is designed to work with the ASCII code or vice versa. (True/False)
Ans. True
58. The XLAT instruction assumes the base address of the byte array is in the ___ register.
Ans. BX
59. Arithmetic using the ___ format is acceptable if only addition and subtraction are involved.
Ans. packed BCD
60. Branch to a procedure is referred to as the ____, and the corresponding branch back is known as
the ___.
Ans. Call, Return
61. If the attribute is NEAR, the RET instruction will only pop a word into the ___ register.
Ans. IP
62. A macro is unlike a ____ in that the machine instructions are repeated each time the macro is
referenced.
Ans. Procedure
63. ___ requires that each dummy-parameter appearing in the prototype code be preceded by a %
character.
Ans. ASM-86
64. The meaning of ‘interrupts’ is to break the sequence of operation. (True or False)
Ans. True
Allenhouse Institute of Technology (UPTU Code : 505)
65. The process of interrupting the normal program execution to carry out a specific task/work is
Rooma, Kanpur – 208 008
referred to as ___.
Ans. Interrupt
66. The interrupts generated by special instructions are called ___ interrupts.
Ans. software
67. The interrupts initiated by external hardware by sending an appropriate signal to the interrupt pin
of the processor is called ___.
Ans. hardware interrupt
68. In ___ interrupts the interrupting device should supply the address of the ISR to be executed in
response to the interrupt.
Ans. Non-vectored
72. Whenever a command is issued with A0=0 and D4=1, this is interpreted as ___.
Ans. Initialization Command Word1
75. The 8259A is polled by using software execution by microprocessor instead of the requests on
INT input. (True/False).
Ans. True
SAMPLE QUESTION PAPERS RRB-JE Classroom Online & Postal Coaching Call : 9990657855 RRB-JE 2018 2 nd STAGE CBT
ELECTRONICS ENGINEERING SAMPLE TEST PAPERS Classroom Batches For Complete Study Materials & Classroom
coaching Call : 9990657855 011-26514888 SAMPLE QUESTION PAPERS RRB-JE Classroom Online & Postal Coaching Call :
9990657855 RRB-JE 2018 Technical Abilities ELECTRONICS & ALLIED ENGINEERING 5. MICROPROCESSOR &
MICROCONTROLLER Admission open at our Delhi Centre. More info: Call 9990657855 , 011-26514888 SAMPLE QUESTION
PAPERS RRB-JE Classroom Online & Postal Coaching Call : 9990657855 Multiple choice Questions : RRB-JE Sample Practice
Test Microprocessor and Microcontroller Introduction to microprocessor, 8085 microprocessor working ; Assembly
Language programming ; Peripherals & other Microprocessors ; Microcontrollers Introduction to microprocessor
8085(Working, Hardware, Address) Part-1 1) Which is the microprocessor comprises: a.Register section b.One or more
Allenhouse Institute of Technology (UPTU Code : 505)
ALU c.Control unit d.All of these Ans: D 2) What is the store by register? a.data b.operands c.memory d.None of these
Ans: a 3) Accumulator based microprocessor example Rooma, Kanpur
are: a.Intel – 208
8085 008
b.Motorola 6809 c.A and B d.None of these Ans:
c 4) A set of register which contain are: a.data b.memory addresses c.result d.all of these Ans: D 5) There are primarily
two types of register: a.general purpose register b.dedicated register c.A and B d.none of these Ans: c 6) Name of typical
dedicated register is: a.PC b.IR c.SP d.All of these Ans: D 7) BCD stands for: a.Binary coded decimal b.Binary coded decoded
c.Both a & b d.none of these Ans: a 8) Which is used to store critical pieces of data during subroutines and interrupts:
a.Stack b.Queue c.Accumulator d.Data register Ans: a SAMPLE QUESTION PAPERS RRB-JE Classroom Online & Postal
Coaching Call : 9990657855 9) The data in the stack is called: a.Pushing data b.Pushed c.Pulling d.None of these Ans: a
10) The external system bus architecture is created using from ______ architecture: a.Pascal b.Dennis Ritchie c.Charles
Babbage d.Von Neumann Ans: D 11) The processor 80386/80486 and the Pentium processor uses _____ bits address bus:
a.16 b.32 c.36 d.64 Ans: b 12) Which is not the control bus signal: a.READ b.WRITE c.RESET d.None of these Ans: c 13)
PROM stands for: a.Programmable read-only memory b.Programmable read write memory c.Programmer read and write
memory d.None of these Ans: a 14) EPROM stands for: a.Erasable Programmable read-only memory b.ectrically
Programmable read write memory c.Electrically Programmable read-only memory d.None of these Ans: a 15) Each
memory location has: a.Address b.Contents c.Both A and B d.None of these Ans: c 16) Which is the type of microcomputer
memory: a.Processor memory b.Primary memory c.Secondary memory d.All of these Ans: D 17) Secondary memory can
store____: a.Program store code b.Compiler c.Operating system d.All of these Ans: D 18) Secondary memory is also
called____: a.Auxiliary b.Backup store c.Both A and B d.None of these Ans: c 19 Customized ROMS are called: a.Mask
ROM b.Flash ROM SAMPLE QUESTION PAPERS RRB-JE Classroom Online & Postal Coaching Call : 9990657855 c.EPROM
d.None of these Ans: a 20) The RAM which is created using bipolar transistors is called: a.Dynamic RAM b.Static RAM
c.Permanent RAM d.DDR RAM Ans: b 21) Which type of RAM needs regular referred: a.Dynamic RAM b.Static RAM
c.Permanent RAM d.SD RAM Ans: a 22) Which RAM is created using MOS transistors: a.Dynamic RAM b.Static RAM
c.Permanent RAM d.SD RAM Ans: a 23) A microprocessor retries instructions from : a.Control memory b.Cache memory
c.Main memory d.Virtual memory Ans: c 24) The lower red curvy arrow show that CPU places the address extracted from
the memory location on the_____: a.Address bus b.System bus c.Control bus d.Data bus Ans: a 25) The CPU sends out a
____ signal to indicate that valid data is available on the data bus: a.Read b.Write c.Both A and B d.None of these Ans: b
26) The CPU removes the ___ signal to complete the memory write operation: a.Read b.Write c.Both A and B d.None of
these Ans: a 27) BIU STAND FOR: a.Bus interface unit b.Bess interface unit c.A and B d.None of these Ans: a 28) EU STAND
FOR: a.Execution unit b.Execute unit c.Exchange unit d.None of these Ans: a 29) Which are the four categories of registers:
a.General- purpose register b.Pointer or index registers c.Segment registers d.Other register e.All of these SAMPLE
QUESTION PAPERS RRB-JE Classroom Online & Postal Coaching Call : 9990657855 Answer:E 30) Eight of the register are
known as: a.General- purpose register b.Pointer or index registers c.Segment registers d.Other register Ans: a 31) The
four index register can be used for: a.Arithmetic operation b.Multipulation operation c.Subtraction operation d.All of
these Ans: a 32) IP Stand for: a.Instruction pointer b.Instruction purpose c.Instruction paints d.None of these Ans: a 33)
CS Stand for: a.Code segment b.Coot segment c.Cost segment d.Counter segment Ans: a 34) DS Stand for: a.Data segment
b.Direct segment c.Declare segment d.Divide segment Ans: a 35) Which are the segment: a.CS: Code segment b.DS: data
segment c.SS: Stack segment d.ES:extra segment e.All of these Ans: D Part-2 1. Which interrupt has the highest priority?
a) INTR b) TRAP c) RST6.5 2. In 8085 name the 16 bit registers? a) Stack pointer b) Program counter c) a & b 3. Which of
the following is hardware interrupts? a) RST5.5, RST6.5, RST7.5 b) INTR, TRAP c) a & b 4. What is the RST for the TRAP? a)
RST5.5 b) RST4.5 c) RST4 5. What are level Triggering interrupts? a) INTR&TRAP b)RST6.5&RST5.5 c)RST7.5&RST6.5 6.
Which interrupt is not level sensitive in 8085? a) RST6.5 is a raising edge-trigging interrupt. b) RST7.5 is a raising edge-
trigging interrupt. c) a & b. 7. What are software interrupts? a) RST 0 - 7 b) RST 5.5 - 7.5 c) INTR, TRAP 8. Which stack is
used in 8085? a) FIFO b) LIFO c) FILO 9. Why 8085 processor is called an 8 bit processor? SAMPLE QUESTION PAPERS RRB-
JE Classroom Online & Postal Coaching Call : 9990657855 a) Because 8085 processor has 8 bit ALU. b) Because 8085
processor has 8 bit data bus. c) a & b. 10. What is SIM? a) Select Interrupt Mask b) Sorting Interrupt Mask c) Set Interrupt
Mask. 11. RIM is used to check whether, ______ a) The write operation is done or not b) The interrupt is Masked or not
c) a & b 12. What is meant by Maskable interrupts? a) An interrupt which can never be turned off. b) An interrupt that
can be turned off by the programmer. c) none 13. In 8086, Example for Non maskable interrupts are a) Trapb) RST6.5 c)
INTR 14. What does microprocessor speed depends on? a) Clock b) Data bus width c) Address bus width 15. Can ROM be
used as stack? a) Yes b) No c) sometimes yes, sometimes no 16. Which processor structure is pipelined? a) all x80
processors b) all x85 processors c) all x86 processors 17. Address line for RST3 is? a) 0020H b) 0028H c) 0018H 18. In 8086
the overflow flag is set when a) The sum is more than 16 bits b) Signed numbers go out of their range after an arithmetic
operation c) Carry and sign flags are set d) During subtraction 19. The advantage of memory mapped I/O over I/O mapped
Allenhouse Institute of Technology (UPTU Code : 505)
I/O is, a) Faster b) Many instructions supporting memory mapped I/O c) Require a bigger address decoder d) All the above
Rooma,
20. BHE of 8086 microprocessor signal is used to interface theKanpur – 208
a) Even 008memory b) Odd bank memory c) I/O d) DMA
bank
21. In 8086 microprocessor the following has the highest priority among all type interrupts. a) NMI b) DIV 0 c) TYPE 255
d) OVER FLOW 22. In 8086 microprocessor one of the following statements is not true. a) Coprocessor is interfaced in
MAX mode b) Coprocessor is interfaced in MIN mode c) I/O can be interfaced in MAX / MIN mode d) Supports pipelining
23. 8088 microprocessor differs with 8086 microprocessor in SAMPLE QUESTION PAPERS RRB-JE Classroom Online &
Postal Coaching Call : 9990657855 a) Data width on the output b) Address capability c) Support of coprocessor d) Support
of MAX / MIN mode Answer Key: 1 C 2 C 3 C 4 B 5 B 6 B 7 A 8 B 9 A 10 C 11 B 12 B 13 A 14 C 15 B 16 C 17 C 18 B 19 D 20
B 21 A 22 B 23 A
a. 1 ,3 and 4
b. 2 ,3 and 4
c. 1, 2 and 3
d. 1, 2 and 4
2. In 8085 microprocessor system with memory mapped I/O, which of the following is true?
c. There can be maximum of 256 input devices and 256 output devices
d. Arithmetic and logic operations can be directly performed with the I/O data
Answer: (d).Arithmetic and logic operations can be directly performed with the I/O data
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
a. To indicate to user that the microprocessor is working and is ready for use.
b. To provide proper WAIT states when the microprocessor is communicating with a slow peripheral device.
Answer: (b).To provide proper WAIT states when the microprocessor is communicating with a slow peripheral
device.
a. (I) only
a. (I) only
b. (II) only
Answer: (d).Accumulator, temporary register, arithmetic, logic circuits and five flags
Answer: (a).Enable the data bus to be used as low order address bus
a. Program Counter (PC) specifies the address of the instruction last executed
9. Processor status word of 8085 microprocessor has five flags. They are
a. S, Z, AC, P, CY
b. S, OV, AC, P, CY
c. S, Z, OV, P, CY
d. S, Z, AC, P, OV
a. Clock cycle
b. Memory cycle
c. Machine cycle
d. Instruction cycle
HOME /
ALL CATEGORIES /
MICROPROCESSOR /
INTEL 8085 MICROPROCESSOR /
a. 40
b. 27
Allenhouse Institute of Technology (UPTU Code : 505)
c. 21 Rooma, Kanpur – 208 008
d. 19
Answer: (a).40
a. stack pointer
b. program counter
c. both A and B
d. none of these
a. POP PSW
b. POP B
c. POP D
d. POP 30 H
Answer: (d).POP 30 H
Allenhouse Institute of Technology (UPTU Code : 505)
15. How many T-states are required for executionRooma,
of OUT 80H–instruction?
Kanpur 208 008
a. 10
b. 13
c. 16
d. 7
Answer: (a).10
16. Which instruction is required to rotate the content of accumulator one bit right along with carry?
a. RLC
b. RAL
c. RRC
d. RAR
Answer: (d).RAR
17. The frequency of the driving network connected between pins 1 and 2 of 8085 microprocessor is
18. READY signal in 8085 is useful when the CPU communicates with
c. a DMA chip
d. a PPI
a. B and C
b. D and E
c. H and L
d. W and Z
a. B and C
b. D and E
c. H and L
d. W and Z
21. A sequence of two registers that multiplies the content of DE register pair
by two and stores the result in HL register pair (in 8085 assembly
language) is
a. 8 bit
b. 16 bit
c. 32 bit
d. 4 bit
Allenhouse Institute of Technology (UPTU Code : 505)
View Answer Report Discuss Too Difficult!
Rooma, Kanpur – 208 008
a. AH & AL
b. BH & BL
c. CH & CL
d. DH & DL
b. 1979
c. 1977
d. 1981
Answer: (a).1978
a. 1979
b. 1988
c. 1999
d. 2000
Answer: (a).1979
a. INTR
b. TRAP
c. RST6.5
d. RST6.6
a. RST5.5
b. RST4.5
c. RST4
d. RST3
Answer: (b).RST4.5
a. RST 6.5
Allenhouse Institute of Technology (UPTU Code : 505)
b. RST 7.5 Rooma, Kanpur – 208 008
c. RST 5.5
d. RST 4.5
a. RST 0-7
c. INTR, TRAP
a. FIFO
b. LIFO
c. FILO
d. LILO
Answer: (b).LIFO
Allenhouse Institute of Technology (UPTU Code : 505)
33. Why 8085 processor is called an 8 bit processor?
Rooma, Kanpur – 208 008
a. trap
b. rst6.5
c. intr
d. rst6.6
Answer: (a).trap
a. 0020H
b. 0028H
c. 0018H
d. 0019H
Answer: (c).0018H
Allenhouse Institute of Technology (UPTU Code : 505)
38. In 8086 the overflow flag is set when _____________.
Rooma, Kanpur – 208 008
d. subtraction
39. In 8086 microprocessor the following has the highest priority among all type interrupts?
a. NMI
b. DIV 0
c. TYPE 255
d. OVER FLOW
Answer: (a).NMI
b. address capability
c. support of coprocessor
a. 0023H
b. 0024H
c. 0033H
d. 0099H
Answer: (b).0024H
b. 1976
c. 1972
d. 1978
Answer: (b).1976
a. multiplexed
b. demultiplexed
c. decoded
d. encoded
Answer: (a).multiplexed
a. Stack pointer
b. Program counter
c. Both a and b
d. None of these
a. FIFO
b. LIFO
c. FILO
d. None of these
Answer: (b).LIFO
c. a&b
d. None of these
49. By what factor does the 8284A clock generator divide the crystal oscillator’s output
frequency?
a. One
b. Two
c. Three
d. Four
Answer: (c).Three
a.Register section
c.Control unit
d.All of these
Answer:D
c.memory
d.None of
these
Answer:A
a.Intel 8085
b.Motorola 6809
of these
Answer:C
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
a.data
b.memory addresses
c.result
d.all of these
Answer:D
b.dedicated register
of these
Answer:C
a.PC
b.IR
c.S
d.All of these
Answer:D
c.Both a&b
d.none of
these
Answer:A
8) Which is used to store critical pieces of data during subroutines and interrupts:a.Stack
b.Queue
c.Accumulat
ord.Data
register
Answer:A
a.Pushing data
b.Pushed
c.Pulling
d.None of
these
Answer:A
10) The external system bus architecture is created using from architecture:
a.Pascal
b.Dennis Ritchie
c.Charles
Babbaged.Von
Allenhouse Institute of Technology (UPTU Code : 505)
Neumann
Rooma, Kanpur – 208 008
Answer:D
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
11) The processor 80386/80486 and the Pentium processor uses bits address bus:
a.16
b.32
c.3
d.6
Answer:B
a.READ
b.WRITE
c.RESE
d.None of these
Answer:C
Answer:A
Answer:A
a.Address
b.Contents
c.Both A and
B d.None of
these
Answer:C
a.Processor memory
b.Primary memory
c.Secondary
memoryd.All of
these Answer:D
b.Compiler
c.Operating
Allenhouse Institute of Technology (UPTU Code : 505)
system
Rooma, Kanpur – 208 008
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
d.All of these
Answer:D
a.Auxiliary
b.Backup
store c.Both A
and B d.None
of these
Answer:C
a.Mask ROM
b.Flash
ROM
c.EPROM
d.None of these
Answer:A
a.Dynamic RAM
b.Static RAM
c.Permanent
RAMd.DDR
Allenhouse Institute of Technology (UPTU Code : 505)
RAM
Rooma, Kanpur – 208 008
Answer:B
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
a.Dynamic RAM
b.Static RAM
c.Permanent
RAMd.SD RAM
Answer:A
a.Dynamic RAM
b.Static RAM
c.Permanent
RAMd.SD RAM
Answer:A
a.Control memory
b.Cache
memory c.Main
memory
d.Virtual
memory
Answer:C
24) The lower red curvy arrow show that CPU places the address extracted from the
memory
Allenhouse Institute of Technology (UPTU Code : 505)
location on the :
Rooma, Kanpur – 208 008
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
a.Address bus
b.System
bus
c.Control
bus d.Data
bus
Answer:A
25) The CPU sends out a signal to indicate that valid data is available on the data bus:
a.Read
b.Write
c.Both A and B
d.None of
these
Answer:B
26) The CPU removes the signal to complete the memory write operation:
a.Read
b.Write
c.Both A and B
d.None of
these
Answer:A
c.A and B
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
d.None of these
Answer:A
a.Execution unit
b.Execute unit
c.Exchange unit
d.None of
these
Answer:A
b.Pointer or index
registersc.Segment
registers d.Other
register
e.All of these
Answer:E
b.Pointer or index
registersc.Segment
registers d.Other
Allenhouse Institute of Technology (UPTU Code : 505)
register
Rooma, Kanpur – 208 008
Answer:A
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
a.Arithmetic operation
b.Multipulation operation
c.Subtraction
operation d.All of
these
Answer:A
a.Instruction pointer
b.Instruction purpose
c.Instruction paints
d.None of these
Answer:A
a.Code segment
b.Coot segment
c.Cost segment
d.Counter segment
Answer:A
a.Data segment
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
b.Direct segment
c.Declare
segment
d.Divide
segment
Answer:A
d. ES:extra segment
e.All of these
Answer:D
a.AX
b.AH
c.AL
d.D
Answer:A
a.16 bit
Allenhouse Institute of Technology (UPTU Code : 505)
b.32 bit
Rooma, Kanpur – 208 008
c.64 bit
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
d.128 bit
Answer:A
a.Logical address
b.Physical
addressc.Both A
and B d.None of
these Answer:C
a.64 kb
b.24 kb
c.50 kb
d.16kb
Answer:
40) The address of a memory is a 20 bit address for the 8086 microprocessor:
a.Physical
b.Logical
c.Both
d.None of these
Allenhouse Institute of Technology (UPTU Code : 505)
Answer:A
Rooma, Kanpur – 208 008
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
a.40 pin
b.50 pin
c.30 pin
d.20 pin
Answer:
Answer:B
a.Effective address
b.Electrical address
c.Effect address
d.None of these
Answer:A
a.Bit pointer
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
b.Base pointer
c.Bus
pointer
d.Byte
pointer
Answer:B
a.Destination index
b.Defect index
c.Definition index
d.Delete index
Answer:A
a.Stand index
b.Source index
c.Segment index
d.Simple index
Answer:B
Answer:A
b.Non mistake
interrupt c.Both
d.None of these
Answer:A
49) is the most important segment and it contains the actual assembly language
a.Data segment
b.Code
segment
c.Stack
segment
d.Extra
segment
Answer:B
a.000H to FFFH
b.0000H to FFFFH
c.00H to FFH
Allenhouse Institute of Technology (UPTU Code : 505)
d.00000H to
Rooma, Kanpur – 208 008
FFFFFH
Answer:B
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
d.All of these
Answer:D
a.Cache memory
b.Data memory
c.Main
memoryd.All
of these
Answer:A
53) Which is the small amount of high- speed memory used to work directly with the
microprocessor:
a.Cache
b.Case
c.Cost
d.Coos
Answer:
A
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
54) The cache usually gets its data from the whenever the instruction or data is
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
a.Main memory
b.Case
memory
c.Cache
memoryd.All
of these
Answer:A
55) Microprocessor reference that are available in the cache are called :
a.Cache hits
b.Cache line
c.Cache
memoryd.All
of these
Answer:A
56) Microprocessor reference that are not available in the cache are called :
a.Cache hits
b.Cache line
c.Cache misses
d.Cache
memory
Answer:C
Allenhouse Institute of Technology (UPTU Code : 505)
57) Which causes the microprocessor toRooma, Kanpur –terminate
immediately 208 008 its present activity:
a.RESET signal
b.INTERUPT signal
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
c.Both
d.None of these
Answer:A
58) Which is responsible for all the outside world communication by the microprocessor:a.BIU
b.PIU
c.TI
d.LI
Answer:A
a. INTRRUPT REQUEST
b. INTRRUPT RIGHT
c. INTRRUPT RONGH
d. INTRRUPT RESET
Answer:A
60) Which of the following are the two main components of the CPU?
ALU
61) Different components n the motherboard of a PC unit are linked together by sets of parallel
a.Conductors
b.Buses
c.Connectors
d.Consecutiv
esAnswer:B
62) The language that the computer can understand and execute is called
a.Machine language
b.Application software
c.System program
Answer:A
a.Magnetic drum
b.PROM
c.Floppy disk
d.All of
these
Answer:B
a.SRAM
b.DRAM
c.ROM
d.All of above
Answer:B
a.PROM
b.RAM
c.PROM
d.EPRO
Answer:A
66) Which of the following memory medium is not used as main memory system?
a.Magnetic core
b.Semiconductor
c.Magnetic
tape d.Both a
and b
Answer:C
Allenhouse Institute of Technology (UPTU Code : 505)
67) Registers, which are partially visibleRooma, Kanpur
to users – 208 to
and used 008hold conditional, are known as
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
a.PC
b.Memory address
registersc.General
Answer:C
68) One of the main feature that distinguish microprocessors from micro-computers is
69) The first microprocessor built by the Intel Corporation was calleda.8008
b.8080
c.400
d.880
Answer:C
b.An integrating
Allenhouse Institute of Technology (UPTU Code : 505)
device
Rooma, Kanpur – 208 008
c.Much costlier than a single transistor
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
chipAnswer:D
c.Reduced cost
d.Low powers
consumptionAnswer:B
b.CD-ROMs
c.Tape devices
d.All of the
above
Answer:D
73) The Width of a processor’s data path is measured in bits. Which of the following are
common
data paths?
a.8 bits
b.12 bits
c.16 bits
d.32 bits
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
Answer:A
74) Which is the type of memory for information that does not change on your computer?a.RAM
b.ROM
c.ERAM
d.RW /
RAM
Answer:B
75) What type of memory is not directly addressable by the CPU and requires special softw3arecalled
a. Extended
b.Expanded
c.Base
d.Conventional
Answer:B
a.Formatted
b.Reformatted
c.Addressed
Answer:A
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
a.Motorola
b. IBM
c. Intel
d.AMD
Answer:C
78) A typical personal computer used for business purposes would have… of RAM.
a.4 KB
b.16 K
c.64 K
d.256 K
Answer:
a.Bytes
b.Millimeters
c.Meters
d.Bits
Answer:D
79) What are the three decisions making operations performed by the ALU of a computer?
a.Grater than
b.Less than
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
c.Equal to
Answer:D
80) Which part of the computer is used for calculating and comparing?a.Disk
unit
b.Control unit
c.ALU
d.Modem
Answer:
81) Can you tell what passes into and out from the computer via its ports?a.Data
b.Bytes
c.Graphi
cs
d.Picture
Answer:
82) What is the responsibility of the logical unit in the CPU of a computer?a.To
produce result
informationd.To do math’s
works
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
Answer:B
83) The secondary storage devices can only store data but they cannot perform
a.Arithmetic Operation
b.Logic operation
c.Fetch operations
d.Either of the
above Answer:D
84) Which of the following memories allows simultaneous read and write operations?a.ROM
b.RAM
c.EPRO
d.None of above
Answer:B
85) Which of the following memories has the shortest access times?
a.Cache memory
c.Magnetic core
memory d.RAM
Answer:A
a.2 byte
b.32 byte
c.4 byte
d.8 byte
Answer:
a.Chip
b.Bug
c.CP
d.Storage device
Answer:B
88) The silicon chips used for data processing are called
a.RAM chips
b. ROM chips
c. Micro processors
d. PROM chips
Answer:D
89) The metal disks, which are permanently housed in, sealed and contamination free
containers
are called
a.Hard
Allenhouse Institute of Technology (UPTU Code : 505)
disks
Rooma, Kanpur – 208 008
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
b.Floppy disk
c.Winchester
diskd.Flexible
disk Answer:C
b.A memory
Answer:D
b.CD-Rom
d.All of above
Answer:C
92) The ALU of a computer normally contains a number of high speed storage element called
a.Semiconductor memory
b.Registers
c.Hard disks
d.Magnetic
disk
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
Answer:B
93) The first digital computer built with IC chips was known as
a.IBM 7090
b.Apple – 1
d.VAX-10
Answer:C
94) Which of the following terms is the most closely related to main memory?a.Non
volatile
b.Permanent
c.Control
unit
d.Temporar
y Answer:D
a.Control bus
b.Control unit
c.Parity unit
d.Semiconduct
orAnswer:D
a.Field
b.Feed
c.Databas
ed.Fetch
Answer:
b.Memory
c.Buffer
d.ALU
Answer:B
a.1024 bytes
b.1024 kilobytes
c.1024
megabytes
d.1024 gigabyte
Answer:C
99) A/n …. Device is any device that provides information, which is sent to the CPUa.Input
b.Output
c.CPU
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
d.Memory
Answer:
a.9 or 32
b.30 or 70
c.28 or 72
d.30 or 72
Answer:
D
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
8086 Microprocessor
58. The of the memory chip will identify and select the register for the EPROM
A. internal decoder B. external decoder C. address decoder D. data
decoderANSWER: A
59. Microprocessor provides signal like to indicate the read operatio
A. LOW B. MCMW C. MCMR D. MCMWR
ANSWER: C
60. To interface memory with the microprocessor, connect register the lines of the address
busmust be added to address lines of the chip.
A. single B. memory C. multiple D. triple
ANSWER: B
61. The remaining address line of bus is decoded to generate chip select signal
A. data B. address C. control bus D. both (a) and (b)
ANSWER: B
62. signal is generated by combining RD and WR signals with IO/M
A. control B. memory C. register D. system
ANSWER: A
63. Memory is an integral part of a system
A. supercomputer B. microcomputer
C. mini computer D. mainframe computer
ANSWER: B
64. has certain signal requirements write into and read from its registers
A. memory B. register C. both (a) and (b) D. control
ANSWER: A
65. An is used to fetch one address
A. internal decoder B. external decoder C. encoder D. register
ANSWER: A
66. The primary function of the is to accept data from I/P devices
A. multiprocessor B. microprocessor C. peripherals D. interfaces
ANSWER: B
67. signal prevent the microprocessor from reading the same data more than one
A. pipelining B. handshaking C. controlling D. signaling
ANSWER: B
68. Bits in IRR interrupt are
A. reset B. set C. stop D. start
ANSWER: B
69. generate interrupt signal to microprocessor and receive acknowledge
A. priority resolver B. control logic
C. interrupt request register D. interrupt register
ANSWER: B
70. The pin is used to select direct command word
A. A0 B. D7-D6 C. A12 D. AD7-AD6
ANSWER: A
71. The is used to connect more microprocessor
A. peripheral device B. cascade C. I/O devices D. control unit
ANSWER: B
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
8255
Question 1: How many pins does the 8255 PPI IC contains?
a. 24
b. 20
c. 32
d. 40
Answer: d. 40
Question 2: In which mode do all the Ports of the 8255 PPI work as Input-Output
units for data transfer?
a. BSR mode
b. Mode 0 of I/O mode
c. Mode 1 of I/O mode
d. Mode 2 of I/O mode
Question 3: Which of the following pins are responsible for handling the on the
Read Write control logic unit of the 8255 PPI?
a. CS'
b. RD'
c. WR'
d. ALL of the above
Question 4: In which of the following modes is the 8255 PPI capable of transferring
data while handshaking with the interfaced device?
a. BSR mode
b. Mode 0 of I/O mode
c. Mode 1 of I/O mode
d. Mode 2 of I/O mode
a. 16 bits
b. 12 bits
c. 8 bits
d. None of the above
Answer: c. 8 bits
Question 6: Which port of the 8255 PPI is capable of performing the handshaking
function with the interfaced devices?
a. Port A
b. Port B
c. Port C
d. All of the above
Answer: c. Port C
Question 7: In which of the following modes of the 8255 PPI, only port C is taken
into consideration?
a. BSR mode
b. Mode 0 of I/O mode
c. Mode 1 of I/O mode
d. Mode 2 of I/O mode
Question 8: In mode 2 of I/O mode, which of the following ports are capable of
transferring the data in both the directions?
a. Port A
b. Port B
c. Port C
d. All of the above
Answer: a. Port A
Question 9: In which of the following modes we do not consider the D6, D5 and D4
bits of the control word?
a. BSR mode
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
Question 10: How many data lines in total are there in the 8255 PPI IC?
a. 8 data lines
b. 32 data lines
c. 24 data lines
d. None of the above
Question 11: PPI 8255 is a general purpose programmable I/O device designed to
interface the CPU with its outside world such as ADC, DAC, keyboard etc.
a. True
b. False
Answer: a. True
Explanation:
PPI 8255 is a general purpose programmable I/O device which is specifically designed to
interface the CPU with its outside world such as ADC, DAC, keyboard etc.
Question 12: During process a data bus buffer has controlled using,
Explanation:
During process a data bus buffer has controlled using read/write control logic.
The 8255 ports work in the I/O mode as programmable I/O ports.
Question 14: PPI 8255 consists of three 8-bit bidirectional I/O ports,
a. PORT A,
b. PORT B
c. PORT C
d. All of these
Explanation:
PPI 8255 consists of three 8-bit bidirectional I/O ports as PORT A, PORT B, and PORT C.
Question 15: PPI 8255 consists of 40 pins and operates in ... regulated power
supply,
a. +5V
b. +15V
c. +5V
d. None of these
Answer: a. +5V
Explanation:
PPI 8255 consists of 40 pins and operates in +5V regulated power supply.
a. Mode 0
b. Mode 1
c. Mode 2
d. None of these
Answer: b. Mode 1
Explanation:
In this mode, the input or output operation of the specified port is controlled by
handshaking signals.
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
c. Mode 2
d. None of these
Answer: b. Mode 1
Explanation:
In this mode, the handshaking signals control the input or output action of the specified
port.
Question 18: The pulse width of the INIT signal at the receiving terminal must be
greater than ... that of the receiving terminal –
a. 10 microseconds
b. 50 microseconds
c. 40 microseconds
d. 20 microseconds
Answer: b. 50 microseconds
Explanation:
The pulse width of a signal at the receiving terminal must be more than 50
microseconds.
Explanation:
Question 20: The port which is used in mode 1 or mode 2 for the generation of
handshake lines is,
a. Port A
b. Port B
c. Port C Upper
Allenhouse Institute of Technology (UPTU Code : 505)
d. Port C Lower Rooma, Kanpur – 208 008
Explanation:
The upper Port C is used for the generation of mode 1 or mode 2 handshake lines.
Question 21: The pin that clears the control word register of 8255 when enabled is,
a. RESET
b. SET
c. CLEAR
d. CLK
Answer: a. RESET
Explanation:
If the reset pin is allowed, then the register of control words is cleared.
Question 22: The signals that are provided to maintain proper data flow and
synchronization between the data transmitter and receiver are –
a. Handshaking signals
b. Control signals
c. Input signals
d. None of these
Explanation:
a. Pins of port A
b. Pins of port B
c. Pins of port C
d. None of these
Explanation:
Allenhouse Institute of Technology (UPTU Code : 505)
There are 24 input/output pins for the Rooma,
8255. Kanpur
These–are
208 008
split into three ports that are 8-bit(A,
B, C). It is possible to use Port A and Port B as 8-bit input/output ports. Pins of port A
consist pins from pin PA0 – PA7.Port C can be used either as an 8-bit input/output port
or as two 4-bit input/output ports or for ports A and B to create handshake signals.
Question 24: In the pin diagram of PIP 8255, CS stands for Chip select,
a. True
b. False
Answer: a. True
Explanation:
In the pin diagram of PIP 8255, CS stands for Chip select. Chip selection (CS) or slave
selection (SS) is the name of a digital electronics control line used to select one (or a set)
of integrated circuits (commonly referred to as 'chips') out of many connected to the
same device bus, typically using three-state logic.
Question 25: If MSB of control word (D7) is 0, PPI works in BSR mode.
a. True
b. False
Answer: a. True
Explanation:
ANSWER: b
ANSWER: c
4. The three counters available in 8253 are independent of each other in operation,but
they are to each other in organisation.
a) Similar
b) Opposite
c) Identical
d) Common
ANSWER: c
5. The speciality of the 8253 counters is that they can be easily read on line
without disturbing the _ input to the counter.
a) GATE
b) CLK
c) OUT
d) WR
ANSWER: b
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
ANSWER: c
7. When GATE goes low counting is terminated and the current count is
till the GATE again goes high.
a) Disturb
b) Latched
c) Decrease
d) Increase
ANSWER: b
8. If N is loaded as the count value, then, after N pulses, the output becomes lowonly
for clock cycle.
a) One
b) Zero
c) N
d) (N-1)
ANSWER: a
ANSWER: b
11. If the count loaded is odd the first clock cycle pulse decrement by
resulting in an even count value.
a) 0
b) 1
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
c) -1
d) None of these
ANSWER: b
ANSWER: b
13. The predecessor 8259 was designed to operate only with bit processors
like 8085.
a) 4
b) 8
c) 16
d) 20
ANSWER: b
14. A modified version, was later introduced that is compatible with 8-bit aswell
as 16-bit.
a) 8259
b) 8359
c) 8259A
d) 8359A
ANSWER: c
15. stores all the interrupt requests in it in order to serve them one by one onthe
priority basis.
a) IRR
b) ISR
c) IMR
d) NMI
ANSWER: a
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
ANSWER: b
ANSWER: c
ANSWER: b
19. In Cascade Buffer/Comparator the same pins act as inputs when the 8259A is in
a) Master
b) Slave
c) Master-Slave
d) All of these
ANSWER: b
ANSWER: a
ANSWER: a
22. In an based system , A₁₅-A₈ of the interrupt vector address are the
respective bits of ICW₂.
a) 8008
b) 8080
c) 8085
d) 8086
ANSWER: c
23. In an 8086/88 based system of the interrupt vector address are insertedin
place of T₇ -T₃ respectively.
a) A₁₅-A₁₁
b) A₁₅-A₈
c) A₁₅-A₁₃
d) A₁₅-A₅
ANSWER: a
ANSWER: c
ANSWER: a
ANSWER: d
a) Edge
b) Level
c) Both a & b
d) None of these
ANSWER: a
a) High
b) Low
c) Very high
d) Very low
ANSWER: b
29. RD‾‾/WR‾‾ input pins enable the data buffers to receive or send data over the
bus.
a) Address
b) Data
c) Both a & b
d) None of these
ANSWER: b
30. are used to scan the key board matrix and display digits.
a) SL₀-SL₃
b) RL₀-RL₃
c) CL₀-CL₃
d) All of these
ANSWER: a
31. O/P pin is used to blank the display during digit switching or by a
blanking command.
a) BD
b) BS
c) BD‾‾
d) BS‾‾
ANSWER: c
b) 4*8,8*8
c) 4*4,8*8
d) 8*4,4*8
ANSWER: a
33. Scanned Keyboard Special Error Mode is valid only under the key rollover
Mode.
a) 1
b) 50
c) N-1
d) N
ANSWER: d
34. The 8-byte FIFO RAM now acts as bit memory matrix.
a) 4*4
b) 4*8
c) 8*8
d) 8*4
ANSWER: c
35. In the left entry mode, the data is entered from the side of display unit.
a) Left
b) Right
c) Front
d) Back
ANSWER: a
36. In the right entry mode, the data is entered from the side of display unit.
a) Left
b) Right
c) Front
d) Back
ANSWER: b
ANSWER: a
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
38. input pins, together with RD‾‾ and WR‾‾ inputs, informs the 8251Athat
the word on the data bus is either a data or control word/status information.
a) C/D-control Word/Data
b) C/D‾-control Word/Data
c) C‾/D-control Word
d) C‾/D‾-control Word/Data
ANSWER: b
ANSWER: c
ANSWER: b
ANSWER: d
42. may be used as a general purpose one bit inverting input port.
a) DSR‾‾‾
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
b) DTR‾‾‾
c) RTS‾‾‾
d) CTS‾‾‾
ANSWER: a
43. may be used as a general purpose one bit inverting output port.
a) DSR‾‾‾
b) DTR‾‾‾
c) RTS‾‾‾
d) CTS‾‾‾
ANSWER: b
ANSWER: a
45. When a data character is sent to 8251A by the CPU, it adds start bits prior to the serial
data bits , followed by optional parity bit and stop bits using the
mode instruction control word format.
a) Synchronous
b) Asynchronous
c) Both a & b
d) None of the above
ANSWER: b
ANSWER: a
47. Once the mode instruction has been written into 8251A and SYNC characters are
inserted internally by 8251A, all the further control words written with
will load command instruction.
a) C/D=0
b) C/D=1
c) C‾/D=1
d) C/D‾=1
ANSWER: d
48. O/P also may be used as a general purpose one bit inverting O/P portthat
can be programmed low to indicate the modem.
a) RTS‾‾‾
b) DTR‾‾‾
c) CTS‾‾‾
d) All of the above
ANSWER: a
49. is used to generate internal device timings and normally connected toclock
generator.
a) CLK
b) CLK reset
c) CLK set
d) None
ANSWER: a
50. is active low input to 8251A is used to inform it that the CPU is readingeither
data or status information from its internal register.
a) RD
b) BD
c) CS
d) WR
ANSWER: a
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
Allenhouse Institute of Technology (UPTU Code : 505)
https://www.youtube.com/playlist?list=PLqisrLSFbMDIToRo6KCX2RARjofFGJ4B
P
Rooma, Kanpur – 208 008
theseANSWER: c
ANSWER: c
5. The speciality of the 8253 counters is that they can be easily read on
line without disturbing the input to the counter.
a) GATE
Allenhouse
b) CLK Institute of Technology (UPTU Code : 505)
c) OUT Rooma, Kanpur – 208 008
Allenhouse Institute of Technology (UPTU Code : 505)
https://www.youtube.com/playlist?list=PLqisrLSFbMDIToRo6KCX2RARjofFGJ4B
P
Rooma, Kanpur – 208 008
d) WR
ANSWER: b
ANSWER: c
7. When GATE goes low counting is terminated and the current count is
till the GATE again goes high.
a) Disturb
b) Latched
c) Decrease
d) Increase
ANSWER: b
ANSWER: a
c) Even-even
d) Odd-odd
ANSWER: b
11. If the count loaded is odd the first clock cycle pulse decrement by
resulting in an even count value.
a) 0
b) 1
c) -1
d) None of
theseANSWER:
ANSWER: b
ANSWER: b
Allenhouse
14.A Institute ofwas
modified version, Technology
later introduced(UPTU
that isCode
compatible
: 505)
with 8-bit as well as 16-bit.
Rooma, Kanpur – 208 008
a) 8259
Allenhouse Institute of Technology (UPTU Code : 505)
https://www.youtube.com/playlist?list=PLqisrLSFbMDIToRo6KCX2RARjofFGJ4B
P
Rooma, Kanpur – 208 008
b) 8359
c) 8259A
d) 8359A
ANSWER: c
ANSWER: a
ANSWER: b
ANSWER: c
theseANSWER:
b
19.Allenhouse Institute ofthe
In Cascade Buffer/Comparator Technology
same pins act as inputs
(UPTU when
Code : 505)
the8259A is in Rooma, Kanpur – 208 008
a) Master
Allenhouse Institute of Technology (UPTU Code : 505)
https://www.youtube.com/playlist?list=PLqisrLSFbMDIToRo6KCX2RARjofFGJ4B
P
Rooma, Kanpur – 208 008
b) Slave
c) Master-Slave
d) All of these
ANSWER: b
ANSWER: a
ANSWER: a
ANSWER: c
a) 0
b) -1
c) 1
d) None
ANSWER: c
ANSWER: a
ANSWER: d
theseANSWER: a
ANSWER: b
29. RD‾‾/WR‾‾ input pins enable the data buffers to receive or send data
overthe bus.
a) Address
b) Data
c) Both a & b
d) None of
these
ANSWER: b
30. are used to scan the key board matrix and display digits.
a) SL₀-SL₃
b) RL₀-RL₃
c) CL₀-CL₃
d) All of these
ANSWER: a
31. O/P pin is used to blank the display during digit switching or
by a blanking command.
a) BD
b) BS
c) BD‾‾
d) BS‾‾
ANSWER: c
ANSWER: a
33. Scanned Keyboard Special Error Mode is valid only under the
key rollover Mode.
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
a) 1
b) 50
Allenhouse Institute of Technology (UPTU Code : 505)
https://www.youtube.com/playlist?list=PLqisrLSFbMDIToRo6KCX2RARjofFGJ4B
P
Rooma, Kanpur – 208 008
c) N-1
d) N
ANSWER: d
34. The 8-byte FIFO RAM now acts as bit memory matrix.
a) 4*4
b) 4*8
c) 8*8
d) 8*4
ANSWER: c
35. In the left entry mode, the data is entered from the side of display
unit.
a) Left
b) Right
c) Front
d) Back
ANSWER: a
36. In the right entry mode, the data is entered from the side of
display unit.
a) Left
b) Right
c) Front
d) Back
ANSWER: b
ANSWER: a
Allenhouse Institute of Technology (UPTU Code : 505)
https://www.youtube.com/playlist?list=PLqisrLSFbMDIToRo6KCX2RARjofFGJ4B
P
Rooma, Kanpur – 208 008
Word/DataANSWER: b
ANSWER: c
ANSWER: b
ANSWER: d
42. may be used as a general purpose one bit inverting input
port.
a) DSR‾‾‾
b) DTR‾‾‾
c) RTS‾‾‾
d) CTS‾‾‾
ANSWER: a
a) DSR‾‾‾
b) DTR‾‾‾
c) RTS‾‾‾
d) CTS‾‾‾
ANSWER: b
ANSWER: a
45. When a data character is sent to 8251A by the CPU, it adds start bits
priorto the serial data bits , followed by optional parity bit and stop bits
using the mode instruction control word format.
a) Synchronous
b) Asynchronous
c) Both a & b
d) None of the
aboveANSWER: b
Allenhouse Institute of Technology (UPTU Code : 505)
https://www.youtube.com/playlist?list=PLqisrLSFbMDIToRo6KCX2RARjofFGJ4B
P
Rooma, Kanpur – 208 008
aboveANSWER: a
47. Once the mode instruction has been written into 8251A and SYNC
characters are inserted internally by 8251A, all the further control
wordswritten with will load command instruction.
a) C/D=0
b) C/D=1
c) C‾/D=1
d) C/D‾=1
ANSWER: d
ANSWER: a
50. is active low input to 8251A is used to inform it that the CPU is
reading either data or status information from its internal register.
a) RD
b) BD
c) CS
d) WR
ANSWER: a
Allenhouse Institute of Technology (UPTU Code : 505)
8237
Rooma, Kanpur – 208 008
c. 8”
d. 64
9. Command register is programmed by and cleared by .
a. CPU , reset”
b. ALU
c. BIU
d. None of the above
10. In mode register bits and determine which of the 4 channels mode register are to be written
a. 0 and 1”
b. 2 and 3
c. 1 and 0
d. None of the above
11. Bits and indicate the type of DMA transfer
a. 0 and 1
b. 2 and 3”
c. 1 and 0
d. None of the above
12. Bit indicates whether address incremented or address decremented mode is selected
a. 0
b. 5”
c. 3
d. 2
13. register is nonmaskable and subject to prioritization by the priority resolving network of 8237
a. Request register”
b. Command register
c. Mode register
d. Both b and c
14. register holds data during memory –memory data transfer
a. Temporary register”
b. Command register
c. Mode register
d. None of the above
15. register keeps the track of all DMA channel pending requests and the status of terminal counts
a. Temporary register
b. Command register
c. Mode register
d. Status register”
16. bits are set if channels request services
a. D4-D7”
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
b. D0-D3
c. None of the above
17. signal is required for deriving the internal timings requiredfpr circuit operations
a. GND
b. CLK”
c. READY
d. RESET
18. High on this input line clears the command, status, request and temporary register
a. RESET”
b. CLK
c. READY
d. none
19. this active- high input is used to match the read or write speed of 8237 with slow memories or i/odevices
a. READY”
b. RESET
c. CLK
d. None
20. Signal used to indicate that cpu has relinquished the control of the bus, as a response to bus request
a. HLDA”
b. READY
c. RESET
d. CLK
21. DREQo has priority
a. Highest”
b. Lowest
c. None of these
22. DREQ3 has priority
a. Lowest”
b. Highest
c. None
23. Data bus is lines used to transfer data to /from I/O or memory
a. Unidirectional
b. Bidirectional”
c. None
24. An output pin used to request te control of the system bus from cpu
a. HRQ”
b. HOLD
c. HLDA
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
d. CLK
25. An active low bidirectional pin used to indicate the completion of DMA operation
a. HRQ
b. HOLD
c. EOP”
d. CLK
26. 8237 operates in 2 cycles
a. Idle, passive
b. Idle, active
c. Passive, active
d. Both b and c”
27. are actual working states of DMA operation in which the actual data transfer is carried outa.
S0,S1,S2,S3
b. S1,S2,S3,S4”
c. S0,S1
d. S2,S3
28. pin is used to disable other bus drivers during DMA transfer
a. AEN”
b. HRQ
c. HLDA
d. HOLD
29. This output line is used to strobe the upper address byte generated by 8237, in master mode into ,an
external latch
a. ADSTB”
b. AEN
c. READY
d. HLDA
30. In single transfer mode the device transfers only byte per second
a. 1”
b. 2
c. 4
d. 8
31. In this mode, 8237 is activated by DEREQ to continue the transfer until a block of data istransferred
a. Demand mode
b. Block transfer mode”
c. Cascade mode
d. None
32. In this mode more than one 8237 can be connected together.
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
c. Ready
d. None
48. In transfers, the 8237 works in the same way as read or write transfer but does not
generateany control signal
a. Read transfer
b. Write transfer
c. Both
d. Verify”
49. In transfer the 8237 reads from an I/O device and writes to the memory
a. Read transfer
b. Write transfer”
c. Both
d. Verify
50. In transfer the 8237 reads from the memory and writes to an I/O device
a. Read transfer”
b. Write transfer
c. Both
d. Verify
e.
8) Which is used to store critical pieces of data during subroutines and interrupts: a.Stack
b.Queue c.Accumulator d.Data register Answer:A
10) The external system bus architecture is created using from architecture:
a.Pascal
b.Dennis Ritchie c.Charles Babbage d.Von Neumann Answer:D
11) The processor 80386/80486 and the Pentium processor uses bits address bus:
a.16
b.32 c.36 d.64
Answer:B
13) PROM stands for: a.Programmable read-only memory b.Programmable read write
memory c.Programmer read and write memory d.None of these
Answer:A
20) The RAM which is created using bipolar transistors is called: a.Dynamic RAM
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
24) The lower red curvy arrow show that CPU places the address extracted from the
memory
location on the :
25) The CPU sends out a signal to indicate that valid data is available on the data
bus: a.Read
b.Write
26) The CPU removes the signal to complete the memory write operation: a.Read
b.Write
27) BIU STAND FOR: a.Bus interface unit b.Bess interface unit
c.A and B
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
29) Which are the four categories of registers: a.General- purpose register
b.Pointer or index registers c.Segment registers d.Other register
e.All of these Answer:E
30) Eight of the register are known as: a.General- purpose register
b.Pointer or index registers c.Segment registers d.Other register
Answer:A
31) The four index register can be used for: a.Arithmetic operation
b.Multipulation operation c.Subtraction operation d.All of these
Answer:A
32) IP Stand for: a.Instruction pointer b.Instruction purpose c.Instruction paints d.None of
these Answer:A
33) CS Stand for: a.Code segment b.Coot segment c.Cost segment d.Counter segment
Answer:A
a.16 bit
b.32 bit
c.64 bit
Answer:A
a.64 kb
b.24 kb
40) The address of a memory is a 20 bit address for the 8086 microprocessor:
a.Physical
b.Logical c.Both
d.None of these Answer:A
a.40 pin
b.50 pin
c.30 pin
42) DIP stand for: a.Deal inline package b.Dual inline package c.Direct inline package
d.Digital inline package Answer:B
43) EA stand for: a.Effective address b.Electrical address c.Effect address d.None of
these Answer:A
45) DI stand for: a.Destination index b.Defect index c.Definition index d.Delete index
Answer:A
46) SI stand for: a.Stand index b.Source index c.Segment index d.Simple index Answer:B
47) ALE stand for: a.Address latch enable b.Address light enable c.Address lower enable
d.Address last enable
49) is the most important segment and it contains the actual assembly language
instruction to be executed by the microprocessor:
a.Data segment b.Code segment c.Stack segment d.Extra segment Answer:B
52) is usually the first level of memory access by the microprocessor: a.Cache
memory
b.Data memory c.Main memory d.All of these Answer:A
53) Which is the small amount of high- speed memory used to work directly with the
microprocessor:
a.Cache b.Case c.Cost d.Coos Answer:A
54) The cache usually gets its data from the whenever the instruction or data is
55) Microprocessor reference that are available in the cache are called : a.Cache hits
b.Cache line c.Cache memory d.All of these Answer:A
56) Microprocessor reference that are not available in the cache are called : a.Cache hits
b.Cache line c.Cache misses d.Cache memory Answer:C
57) Which causes the microprocessor to immediately terminate its present activity:
a.RESET signal
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
b.INTERUPT signal
58) Which is responsible for all the outside world communication by the microprocessor:
a.BIU
b.PIU c.TIU d.LIU
Answer:A
a. INTRRUPT REQUEST
b. INTRRUPT RIGHT
c. INTRRUPT RONGH
d. INTRRUPT RESET
Answer:A
60) Which of the following are the two main components of the CPU? a.Control Unit and
Registers
b.Registers and Main Memory c.Control unit and ALU
d.ALU and bus Answer:C
61) Different components n the motherboard of a PC unit are linked together by sets of
parallel electrical conducting lines. What are these lines called?
a.Conductors b.Buses c.Connectors d.Consecutives Answer:B
62) The language that the computer can understand and execute is called a.Machine
language
b.Application software c.System program d.All of the above Answer:A
63) Which of the following is used as a primary storage device? a.Magnetic drum
b.PROM
b.DRAM c.ROM
d.All of above Answer:B
66) Which of the following memory medium is not used as main memory system?
a.Magnetic core
b.Semiconductor c.Magnetic tape d.Both a and b Answer:C
67) Registers, which are partially visible to users and used to hold conditional, are known
as
68) One of the main feature that distinguish microprocessors from micro-computers is
a.Words are usually larger in microprocessors
b.Words are shorter in microprocessors c.Microprocessor does not contain I/O devices
d.Exactly the same as the machine cycle time Answer:C
69) The first microprocessor built by the Intel Corporation was called a.8008
b.8080 c.4004 d.8800
Answer:C
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
71) Most important advantage of an IC is its a.Easy replacement in case of circuit failure
b.Extremely high reliability
c.Reduced cost
72) Which of the following items are examples of storage devices? a.Floppy / hard disks
b.CD-ROMs
73) The Width of a processor’s data path is measured in bits. Which of the following are
common
data paths?
a.8 bits
b.12 bits
c.16 bits
d.32 bits
74) Which is the type of memory for information that does not change on your computer?
a.RAM
b.ROM c.ERAM d.RW / RAM
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
Answer:B
75) What type of memory is not directly addressable by the CPU and requires special
softw3are called EMS (expanded memory specification)?
a. Extended b.Expanded c.Base d.Conventional Answer:B
76) Before a disk can be used to store data. It must be……. a.Formatted
b.Reformatted c.Addressed
d.None of the above Answer:A
77) Which company is the biggest player in the microprocessor industry? a.Motorola
b. IBM
c. Intel d.AMD
Answer:C
78) A typical personal computer used for business purposes would have… of RAM.
a.4 KB
b.16 K
c.64 K
d.256 K Answer:D
79) What are the three decisions making operations performed by the ALU of a computer?
a.Grater than
b.Less than
80) Which part of the computer is used for calculating and comparing? a.Disk unit
b.Control unit c.ALU
d.Modem Answer:C
81) Can you tell what passes into and out from the computer via its ports? a.Data
b.Bytes c.Graphics d.Pictures Answer:A
82) What is the responsibility of the logical unit in the CPU of a computer? a.To produce
result
b.To compare numbers
83) The secondary storage devices can only store data but they cannot perform
a.Arithmetic Operation
b.Logic operation c.Fetch operations d.Either of the above Answer:D
84) Which of the following memories allows simultaneous read and write operations?
a.ROM
b.RAM c.EPROM
d.None of above Answer:B
85) Which of the following memories has the shortest access times? a.Cache memory
b.Magnetic bubble memory c.Magnetic core memory d.RAM
Answer:A
b.32 byte
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
c.4 byte
88) The silicon chips used for data processing are called a.RAM chips
b. ROM chips
c. Micro processors
89) The metal disks, which are permanently housed in, sealed and contamination free
containers
are called a.Hard disks
b.A memory
91) The instructions for starting the computer are house on a.Random access memory
b.CD-Rom
92) The ALU of a computer normally contains a number of high speed storage element
called a.Semiconductor memory
b.Registers c.Hard disks d.Magnetic disk
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
93) The first digital computer built with IC chips was known as a.IBM 7090
b.Apple – 1
94) Which of the following terms is the most closely related to main memory? a.Non
volatile
b.Permanent c.Control unit d.Temporary Answer:D
95) Which of the following is used for manufacturing chips? a.Control bus
b.Control unit c.Parity unit d.Semiconductor Answer:D
99) A/n …. Device is any device that provides information, which is sent to the CPU a.Input
b.Output c.CPU
d.Memory Answer:A
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
a.9 or 32
b.30 or 70
c.28 or 72
d.30 or 72 Answer:D
8086 Microprocessor
54. Primary function of memory interfacing is that the should be able to read from and
write into register
A. multiprocessor B. microprocessor C. dual Processor D. coprocessor
ANSWER: B
55. To perform any operations, the Mp should identify the
A. register B. memory C. interface D. system ANSWER: A
56. The Microprocessor places address on the address bus
A. 4 bit B. 8 bitC. 16 bit D. 32 bit ANSWER: C
57. The Microprocessor places 16 bit address on the add lines from that address by
register should be selected
A. address B. one C. two D. three ANSWER: B
58. The of the memory chip will identify and select the register for the EPROM
A. internal decoder B. external decoder C. address decoder D. data decoder
ANSWER: A
59. Microprocessor provides signal like to indicate the read operatio
A. LOW B. MCMW C. MCMR D. MCMWR ANSWER: C
60. To interface memory with the microprocessor, connect register the lines of the address
bus must be added to address lines of the chip.
A. single B. memory C. multiple D. triple ANSWER: B
61. The remaining address line of bus is decoded to generate chip select signal
A. data B. address C. control bus D. both (a) and (b) ANSWER: B
62. signal is generated by combining RD and WR signals with IO/M
A. control B. memory C. register D. system ANSWER: A
63. Memory is an integral part of a system
A. supercomputer B. microcomputer
C. mini computer D. mainframe computer ANSWER: B
64. has certain signal requirements write into and read from its registers
A. memory B. register C. both (a) and (b) D. control ANSWER: A
65. An is used to fetch one address
A. internal decoder B. external decoder C. encoder D. register ANSWER: A
66. The primary function of the is to accept data from I/P devices
A. multiprocessor B. microprocessor C. peripherals D. interfaces ANSWER: B
67. signal prevent the microprocessor from reading the same data more than one
A. pipelining B. handshaking C. controlling D. signaling ANSWER: B
68. Bits in IRR interrupt are
A. reset B. set C. stop D. start ANSWER: B
69. generate interrupt signal to microprocessor and receive acknowledge
A. priority resolver B. control logic
C. interrupt request register D. interrupt register ANSWER: B
70. The pin is used to select direct command word
A. A0 B. D7-D6 C. A12 D. AD7-AD6 ANSWER: A
71. The is used to connect more microprocessor
A. peripheral device B. cascade C. I/O devices D. control unit ANSWER: B
8255
Question 1: How many pins does the 8255 PPI IC contains?
a. 24
b. 20
c. 32
d. 40
Answer: d. 40
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
Question 2: In which mode do all the Ports of the 8255 PPI work as Input-Output units for
data transfer?
a. BSR mode
b. Mode 0 of I/O mode
c. Mode 1 of I/O mode
d. Mode 2 of I/O mode
Question 3: Which of the following pins are responsible for handling the on the Read Write
control logic unit of the 8255 PPI?
a. CS'
b. RD'
c. WR'
d. ALL of the above
Question 4: In which of the following modes is the 8255 PPI capable of transferring data while
handshaking with the interfaced device?
a. BSR mode
b. Mode 0 of I/O mode
c. Mode 1 of I/O mode
d. Mode 2 of I/O mode
Question 5: How many bits of data can be transferred between the 8255 PPI and the
interfaced device at a time? or What is the size of internal bus of the 8255 PPI?
a. 16 bits
b. 12 bits
c. 8 bits
d. None of the above
Answer: c. 8 bits
Question 6: Which port of the 8255 PPI is capable of performing the handshaking function
with the interfaced devices?
a. Port A
b. Port B
c. Port C
d. All of the above
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
Answer: c. Port C
Question 7: In which of the following modes of the 8255 PPI, only port C is taken into
consideration?
a. BSR mode
b. Mode 0 of I/O mode
c. Mode 1 of I/O mode
d. Mode 2 of I/O mode
Question 8: In mode 2 of I/O mode, which of the following ports are capable of transferring
the data in both the directions?
a. Port A
b. Port B
c. Port C
d. All of the above
Answer: a. Port A
Question 9: In which of the following modes we do not consider the D6, D5 and D4 bits of the
control word?
a. BSR mode
Question 10: How many data lines in total are there in the 8255 PPI IC?
a. 8 data lines
b. 32 data lines
c. 24 data lines
d. None of the above
Question 11: PPI 8255 is a general purpose programmable I/O device designed to interface
the CPU with its outside world such as ADC, DAC, keyboard etc.
a. True
b. False Answer: a. True Explanation:
PPI 8255 is a general purpose programmable I/O device which is specifically designed to
interface the CPU with its outside world such as ADC, DAC, keyboard etc.
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
Question 12: During process a data bus buffer has controlled using,
The 8255 ports work in the I/O mode as programmable I/O ports.
Question 14: PPI 8255 consists of three 8-bit bidirectional I/O ports,
a. PORT A,
b. PORT B
c. PORT C
d. All of these Answer: d. All of these Explanation:
PPI 8255 consists of three 8-bit bidirectional I/O ports as PORT A, PORT B, and PORT C.
Question 15: PPI 8255 consists of 40 pins and operates in ... regulated power supply,
a. +5V
b. +15V
c. +5V
d. None of these Answer: a. +5V Explanation:
PPI 8255 consists of 40 pins and operates in +5V regulated power supply.
a. Mode 0
b. Mode 1
c. Mode 2
d. None of these Answer: b. Mode 1 Explanation:
In this mode, the input or output operation of the specified port is controlled by handshaking
signals.
c. Mode 2
d. None of these Answer: b. Mode 1 Explanation:
In this mode, the handshaking signals control the input or output action of the specified port.
Question 18: The pulse width of the INIT signal at the receiving terminal must be greater than
... that of the receiving terminal –
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
a. 10 microseconds
b. 50 microseconds
c. 40 microseconds
d. 20 microseconds Answer: b. 50 microseconds Explanation:
The pulse width of a signal at the receiving terminal must be more than 50 microseconds.
Question 20: The port which is used in mode 1 or mode 2 for the generation of handshake
lines is,
a. Port A
b. Port B
c. Port C Upper
Question 21: The pin that clears the control word register of 8255 when enabled is,
a. RESET
b. SET
c. CLEAR
d. CLK Answer: a. RESET Explanation:
If the reset pin is allowed, then the register of control words is cleared.
Question 22: The signals that are provided to maintain proper data flow and synchronization
between the data transmitter and receiver are –
a. Handshaking signals
b. Control signals
c. Input signals
d. None of these
a. Pins of port A
b. Pins of port B
c. Pins of port C
d. None of these Answer: a. Pins of port A Explanation:
There are 24 input/output pins for the 8255. These are split into three ports that are 8-bit (A,
B, C). It is possible to use Port A and Port B as 8-bit input/output ports. Pins of port A consist
pins from pin PA0 – PA7.Port C can be used either as an 8-bit input/output port or as two 4-
bit input/output ports or for ports A and B to create handshake signals.
Question 24: In the pin diagram of PIP 8255, CS stands for Chip select,
a. True
b. False Answer: a. True Explanation:
In the pin diagram of PIP 8255, CS stands for Chip select. Chip selection (CS) or slave
selection (SS) is the name of a digital electronics control line used to select one (or a set) of
integrated circuits (commonly referred to as 'chips') out of many connected to the same device
bus, typically using three-state logic.
Question 25: If MSB of control word (D7) is 0, PPI works in BSR mode.
a. True
b. False Answer: a. True Explanation:
If MSB of control word (D7) is 0, PPI works in BSR mode.
Intel’s programmable device (8253) facilitates the generation of accurate time delays.
a) counter
b) timer
c) both a & b
d) none of these
ANSWER: c
2. The programmable timer device (8253) contains three independent bit counters.
a) 8
b) 16
c) 20
d) 32
ANSWER: b
3. The 8-bit data buffer interfaces internal circuit of 8253 to microprocessor systems
bus.
a) Unidirectional
b) Single
c) Bidirectional
d) None of these
ANSWER: c
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
4. The three counters available in 8253 are independent of each other in operation, but
they are to each other in organisation.
a) Similar
b) Opposite
c) Identical
d) Common
ANSWER: c
5. The speciality of the 8253 counters is that they can be easily read on line
without disturbing the _ input to the counter.
a) GATE
b) CLK
c) OUT
d) WR
ANSWER: b
b) Even
c) Even-even
d) Odd-odd
ANSWER: b
11. If the count loaded is odd the first clock cycle pulse decrement by resulting in
an even count value.
a) 0
b) 1
c) -1
d) None of these
ANSWER: b
ANSWER: a
a) Master
b) Slave
c) Master-Slave
d) All of these
ANSWER: b
ANSWER: a
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
22. In an based system , A₁₅-A₈ of the interrupt vector address are the respective bits of
ICW₂.
a) 8008
b) 8080
c) 8085
d) 8086
ANSWER: c
23. In an 8086/88 based system of the interrupt vector address are inserted in
place of T₇ -T₃ respectively.
a) A₁₅-A₁₁
b) A₁₅-A₈
c) A₁₅-A₁₃
d) A₁₅-A₅
ANSWER: a
24. Special fully nested mode is selected, if SFNM= .
a) 0
b) -1
c) 1
d) None
ANSWER: c
25. If AEOI= , the automatic end of interrupt mode is selected.
a) 1
b) 0
c) -1
d) None
ANSWER: a
26. is the default mode of operation of 8259A.
a) Real mode
b) AEOI (automatic end of interrupt mode)
c) EOI(end of interrupt mode)
d) Fully Nested mode
ANSWER: d
a) Edge
b) Level
c) Both a & b
d) None of these
ANSWER: a
b) Low
c) Very high
d) Very low
ANSWER: b
29. RD‾‾/WR‾‾ input pins enable the data buffers to receive or send data over the
bus.
a) Address
b) Data
c) Both a & b
d) None of these
ANSWER: b
30. are used to scan the key board matrix and display digits.
a) SL₀-SL₃
b) RL₀-RL₃
c) CL₀-CL₃
d) All of these
ANSWER: a
31. O/P pin is used to blank the display during digit switching or by a
blanking command.
a) BD
b) BS
c) BD‾‾
d) BS‾‾
ANSWER: c
32. Scanned Keyboard Mode in encoded scan keyboard or in decode scan a
Keyboard can be interfaced. a) 8*8,4*8
b) 4*8,8*8
c) 4*4,8*8
d) 8*4,4*8
ANSWER: a
33. Scanned Keyboard Special Error Mode is valid only under the key rollover Mode.
a) 1
b) 50
c) N-1
d) N
ANSWER: d
34. The 8-byte FIFO RAM now acts as bit memory matrix.
a) 4*4
b) 4*8
c) 8*8
d) 8*4
ANSWER: c
35. In the left entry mode, the data is entered from the side of display unit.
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
a) Left
b) Right
c) Front
d) Back
ANSWER: a
36. In the right entry mode, the data is entered from the side of display unit.
a) Left
b) Right
c) Front
d) Back
ANSWER: b
37. In mode, data is transmitted only in one direction over a single communication
channel.
a) Simplex
b) Duplex
c) Half duplex
d) Half simplex
ANSWER: a
38. input pins, together with RD‾‾ and WR‾‾ inputs, informs the 8251A that the word
on the data bus is either a data or control word/status information.
a) C/D-control Word/Data
b) C/D‾-control Word/Data
c) C‾/D-control Word
d) C‾/D‾-control Word/Data
ANSWER: b
39. A high on RESET input forces the 8251A into an state
a) Wait
b) Ready‾‾‾‾‾
c) Idle
d) Hold
ANSWER: c
40. input controls the rate at which the character is to be transmitted.
a) System clock
b) Transmitter clock
c) Bus system clock
d) Receiver clock
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
ANSWER: b
41. input controls the rate at which the character is to be received.
a) System clock
b) Transmitter clock
c) Bus system clock
d) Receiver clock
ANSWER: d
42. may be used as a general purpose one bit inverting input port.
a) DSR‾‾‾
b) DTR‾‾‾
c) RTS‾‾‾
d) CTS‾‾‾
ANSWER: a
43. may be used as a general purpose one bit inverting output port.
a) DSR‾‾‾
b) DTR‾‾‾
c) RTS‾‾‾
d) CTS‾‾‾
ANSWER: b
44. pin of 8251A receives a composite stream of the data to be received by 8251A
a) RXD
b) RXC
c) RXRDY
d) RD
ANSWER: a
45. When a data character is sent to 8251A by the CPU, it adds start bits prior to the serial
data bits , followed by optional parity bit and stop bits using the mode instruction
control word format.
a) Synchronous
b) Asynchronous
c) Both a & b
d) None of the above
ANSWER: b
c) Both a & b
d) None of the above
ANSWER: a
47. Once the mode instruction has been written into 8251A and SYNC characters are
inserted internally by 8251A, all the further control words written with
will load command instruction.
a) C/D=0
b) C/D=1
c) C‾/D=1
d) C/D‾=1
ANSWER: d
48. O/P also may be used as a general purpose one bit inverting O/P port that can
be programmed low to indicate the modem.
a) RTS‾‾‾
b) DTR‾‾‾
c) CTS‾‾‾
d) All of the above
ANSWER: a
49. is used to generate internal device timings and normally connected to clock
generator.
a) CLK
b) CLK reset
c) CLK set
d) None
ANSWER: a
50. is active low input to 8251A is used to inform it that the CPU is reading either
data or status information from its internal register.
a) RD
b) BD
c) CS
d) WR
ANSWER: a
https://www.youtube.com/playlist?list=PLqisrLSFbMDIToRo6KCX2RARjofFGJ4BP
1. Intel’s programmable device (8253) facilitates the generation of accurate time delays.
a) counter
b) timer
c) both a & b
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
3. The 8-bit data buffer interfaces internal circuit of 8253 to microprocessor systems
bus.
a) Unidirectional
b) Single
c) Bidirectional
d) None of these ANSWER: c
4. The three counters available in 8253 are independent of each other in operation, but
they are to each other in organisation.
a) Similar
b) Opposite
c) Identical
d) Common ANSWER: c
5. The speciality of the 8253 counters is that they can be easily read on line
without disturbing the input to the counter.
a) GATE
b) CLK
c) OUT
https://www.youtube.com/playlist?list=PLqisrLSFbMDIToRo6KCX2RARjofFGJ4BP
d) WR ANSWER: b
6. The GATE signal is and should be for normal counting.
a) Active Low, Low
b) Normal, Normal
c) Active High, High
d) None of the Above ANSWER: c
7. When GATE goes low counting is terminated and the current count is
till the GATE again goes high.
a) Disturb
b) Latched
c) Decrease
d) Increase ANSWER: b
8. If N is loaded as the count value, then, after N pulses, the output becomes low only
for clock cycle.
a) One
b) Zero
c) N
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
d) (N-1) ANSWER: a
9. In this mode, the 8253 can be used as a wave rate generator.
a) Sine wave
b) Cosine wave
c) Square wave
d) All of these
e) ANSWER: c
10. When count is N loaded in , then for half of the count, the output remains high and
for remaining half it remain low.
a) Odd
b) Even
https://www.youtube.com/playlist?list=PLqisrLSFbMDIToRo6KCX2RARjofFGJ4BP
c) Even-even
d) Odd-odd ANSWER: b
11. If the count loaded is odd the first clock cycle pulse decrement by
resulting in an even count value.
a) 0
b) 1
c) -1
d) None of these ANSWER: b
https://www.youtube.com/playlist?list=PLqisrLSFbMDIToRo6KCX2RARjofFGJ4BP
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
b) 8359
c) 8259A
d) 8359A ANSWER: c
15. stores all the interrupt requests in it in order to serve them one by one on the
priority basis.
a) IRR
b) ISR
c) IMR
d) NMI ANSWER: a
16. keeps a track of the requests being served.
a) IRR
b) ISR
c) IMR
d) NMI ANSWER: b
17. stores the bits required to mask the interrupt input.
a) IRR
b) ISR
c) IMR
d) NMI ANSWER: c
18. pin is an active low write enable input to 8259A
a) WR
b) WR‾‾
c) Both a & b
d) None of these ANSWER: b
19. In Cascade Buffer/Comparator the same pins act as inputs when the 8259A is in
a) Master
https://www.youtube.com/playlist?list=PLqisrLSFbMDIToRo6KCX2RARjofFGJ4BP
b) Slave
c) Master-Slave
d) All of these ANSWER: b
20. goes high whenever a valid interrupt request is asserted.
a) INT pin
b) NMI pin
c) IRR pin
d) ISR pin ANSWER: a
21. as inputs to accept interrupt requests to the CPU.
a) IR₀-IR₇
b) CR₀-CR₇
c) DR₀-DR₇
d) TS₀-TS₇ ANSWER: a
22. In an based system , A₁₅-A₈ of the interrupt vector address are the respective bits of
ICW₂.
a) 8008
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
b) 8080
c) 8085
d) 8086 ANSWER: c
23. In an 8086/88 based system of the interrupt vector address are inserted in
place of T₇ -T₃ respectively.
a) A₁₅-A₁₁
b) A₁₅-A₈
c) A₁₅-A₁₃
d) A₁₅-A₅ ANSWER: a
24. Special fully nested mode is selected, if SFNM= .
https://www.youtube.com/playlist?list=PLqisrLSFbMDIToRo6KCX2RARjofFGJ4BP
a) 0
b) -1
c) 1
d) None ANSWER: c
25. If AEOI= , the automatic end of interrupt mode is selected.
a) 1
b) 0
c) -1
d) None ANSWER: a
26. is the default mode of operation of 8259A.
a) Real mode
b) AEOI (automatic end of interrupt mode)
c) EOI(end of interrupt mode)
d) Fully Nested mode ANSWER: d
https://www.youtube.com/playlist?list=PLqisrLSFbMDIToRo6KCX2RARjofFGJ4BP
ANSWER: b
29. RD‾‾/WR‾‾ input pins enable the data buffers to receive or send data over the bus.
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
a) Address
b) Data
c) Both a & b
d) None of these ANSWER: b
30.
a) SL₀-SL₃
are used to scan the key board matrix and display digits.
b) RL₀-RL₃
c) CL₀-CL₃
d) All of these ANSWER: a
31. O/P pin is used to blank the display during digit switching or
by a blanking command.
a) BD
b) BS
c) BD‾‾
d) BS‾‾ ANSWER: c
32. Scanned Keyboard Mode in encoded scan keyboard or in decode scan a
Keyboard can be interfaced. a) 8*8,4*8
b) 4*8,8*8
c) 4*4,8*8
d) 8*4,4*8 ANSWER: a
33. Scanned Keyboard Special Error Mode is valid only under the key rollover
Mode.
a) 1
b) 50
https://www.youtube.com/playlist?list=PLqisrLSFbMDIToRo6KCX2RARjofFGJ4BP
c) N-1
d) N ANSWER: d
34. The 8-byte FIFO RAM now acts as bit memory matrix.
a) 4*4
b) 4*8
c) 8*8
d) 8*4 ANSWER: c
35. In the left entry mode, the data is entered from the side of display unit.
a) Left
b) Right
c) Front
d) Back ANSWER: a
36. In the right entry mode, the data is entered from the side of display unit.
a) Left
b) Right
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
c) Front
d) Back ANSWER: b
37. In mode, data is transmitted only in one direction over a single communication
channel.
a) Simplex
b) Duplex
c) Half duplex
d) Half simplex ANSWER: a
https://www.youtube.com/playlist?list=PLqisrLSFbMDIToRo6KCX2RARjofFGJ4BP
38. input pins, together with RD‾‾ and WR‾‾ inputs, informs the 8251A that the
word on the data bus is either a data or control word/status information.
a) C/D-control Word/Data
b) C/D‾-control Word/Data
c) C‾/D-control Word
d) C‾/D‾-control Word/Data ANSWER: b
39.A high on RESET input forces the 8251A into an state
a) Wait
b) Ready‾‾‾‾‾
c) Idle
d) Hold ANSWER: c
40. input controls the rate at which the character is to be transmitted.
a) System clock
b) Transmitter clock
c) Bus system clock
d) Receiver clock ANSWER: b
41. input controls the rate at which the character is to be received.
a) System clock
b) Transmitter clock
c) Bus system clock
d) Receiver clock
https://www.youtube.com/playlist?list=PLqisrLSFbMDIToRo6KCX2RARjofFGJ4BP
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
ANSWER: d
42.
port.
a) DSR‾‾‾
b) DTR‾‾‾
c) RTS‾‾‾
d) CTS‾‾‾ ANSWER: a
43.
port.
a) DSR‾‾‾
b) DTR‾‾‾
c) RTS‾‾‾
d) CTS‾‾‾ ANSWER: b
44. pin of 8251A receives a composite stream of the data to be received by 8251A
a) RXD
b) RXC
c) RXRDY
d) RD ANSWER: a
45. When a data character is sent to 8251A by the CPU, it adds start bits prior to the serial
data bits , followed by optional parity bit and stop bits using the mode instruction control
word format.
a) Synchronous
b) Asynchronous
c) Both a & b
d) None of the above ANSWER: b
https://www.youtube.com/playlist?list=PLqisrLSFbMDIToRo6KCX2RARjofFGJ4BP
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
49. is used to generate internal device timings and normally connected to clock
generator.
a) CLK
b) CLK reset
c) CLK set
d) None ANSWER: a
https://www.youtube.com/playlist?list=PLqisrLSFbMDIToRo6KCX2RARjofFGJ4BP
50. is active low input to 8251A is used to inform it that the CPU is reading either
data or status information from its internal register.
a) RD
b) BD
c) CS
d) WR ANSWER: a
c. 8”
d. 64
9. Command register is programmed by and cleared by .
a. CPU , reset”
b. ALU
c. BIU
d. None of the above
10. In mode register bits and determine which of the 4 channels mode register are to
be written
a. 0 and 1”
b. 2 and 3
c. 1 and 0
d. None of the above
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
b. D0-D3
c. None of the above
17. signal is required for deriving the internal timings requiredfpr circuit operations
a. GND
b. CLK”
c. READY
d. RESET
18. High on this input line clears the command, status, request and temporary register
a. RESET”
b. CLK
c. READY
d. none
19. this active- high input is used to match the read or write speed of 8237 with slow
memories or i/o devices
a. READY”
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
b. RESET
c. CLK
d. None
20. Signal used to indicate that cpu has relinquished the control of the bus, as a response
to bus request
a. HLDA”
b. READY
c. RESET
d. CLK
21. DREQo has priority
a. Highest”
b. Lowest
c. None of these
22. DREQ3 has priority
a. Lowest”
b. Highest
c. None
23. Data bus is lines used to transfer data to /from I/O or memory
a. Unidirectional
b. Bidirectional”
c. None
24. An output pin used to request te control of the system bus from cpu
a. HRQ”
b. HOLD
c. HLDA
d. CLK
25. An active low bidirectional pin used to indicate the completion of DMA operation
a. HRQ
b. HOLD
c. EOP”
d. CLK
26. 8237 operates in 2 cycles
a. Idle, passive
b. Idle, active
c. Passive, active
d. Both b and c”
27. are actual working states of DMA operation in which the actual data transfer is
carried out a. S0,S1,S2,S3
b. S1,S2,S3,S4”
c. S0,S1
d. S2,S3
28. pin is used to disable other bus drivers during DMA transfer
a. AEN”
b. HRQ
c. HLDA
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
d. HOLD
29. This output line is used to strobe the upper address byte generated by 8237, in master
mode into , an external latch
a. ADSTB”
b. AEN
c. READY
d. HLDA
30. In single transfer mode the device transfers only byte per second
a. 1”
b. 2
c. 4
d. 8
31. In this mode, 8237 is activated by DEREQ to continue the transfer until a block of data
is transferred
a. Demand mode
b. Block transfer mode”
c. Cascade mode
d. None
32. In this mode more than one 8237 can be connected together.
b. Read transfer
c. Verify transfer
d. All of the above”
38. There exists an flip-flop in 8237 also which is called first/last flip flop
a. External
b. Internal”
c. Slave
d. None
39. Output of these flip flop decides whether the byte of selected 16-bit register will be
read or written
a. First/last flip-flop”
b. Internal
c. External
d. None
a. Reset
b. Set”
c. Enabled
d. None
47. DMA controller disables all the DMA channels and enters an cycle
a. Idle”
b. Wait
c. Ready
d. None
48. In transfers, the 8237 works in the same way as read or write transfer but
does not generate any control signal
a. Read transfer
b. Write transfer
c. Both
d. Verify”
49. In transfer the 8237 reads from an I/O device and writes to the memory
a. Read transfer
b. Write transfer”
c. Both
d. Verify
50. In transfer the 8237 reads from the memory and writes to an I/O device
a. Read transfer”
b. Write transfer
c. Both
d. Verify
Tracks
Sign in
Search
Search for:
View Course Path
Contents
Quiz result
Attempt again:
Detailed solutions of the questions
Quiz result
Total Questions: 40
Attempted Questions: 0
Unattempted Questions: 40
Correct Answers: 0
Incorrect Answers: 0
Final Score: 0 / 43
Detailed performance analysis and comparison with other test takers are only available to signed-
up users. Please sign up. It’s free.
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
Attempt again:
2 bits
4 bitscorrect
8 bits
16 bits
True
Falsecorrect
Truecorrect
False
Truecorrect
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
False
Magnetic Tape
RAMcorrect
Hard Disk
Diskette
1 μs
0.333 μs
0.2 μs correct
2 μs
Logical instructions
Data transfer instructions
Branch instructionscorrect
Arithmetic instructions
True
Falsecorrect
Truecorrect
False
1. MOV
2. ADD
3. LXI
4. ADI
1 and 2 only
2 and 3 only
1, 2 and 3 only
1, 2, 3 and 4correct
1. MOV
2. ADD
3. LXI
4. ADI
Asynchronous transfercorrect
Synchronous transfer
Interrupt driver transfer
Both (a) and (c)
INR r
correct
SEE M
ACI data
using a coprocessor
none of these
Address Buscorrect
DMA bus
Memory Buscorrect
Control Buscorrect
0, 1correct
1, 0
0, 0
1, 1
MOV L, A
MOV H, L
INX H
DAD H
0000H
0001H
0011H
0002Hcorrect
It’s used to provide WAIT states when the 8085 is communicating with a slow peripheral
devicecorrect
It indicates that the 8085 is ready to receive inputs
It indicates that the 8085 is ready to provide Direct Memory Access
It indicates that the 8085 is ready to send outputs
hardware interrupts
logical interrupts
software interrupts
correct
conditional interrupts
PC gets incremented
control goes directly to the next instruction after the calling instruction without any
operation
control goes directly to the next instruction after the calling instruction without any
operation and also PC will get incremented
top of the stack will get popped and get assigned to the PCcorrect
1 byte instructioncorrect
2 byte instruction
3 byte instruction
4 byte instruction
PUSH PSWcorrect
PUSH A
POP PSW
PUSH SP
Absolutecorrect
Immediate
Indirect
Implicit
RAM
ROM
either RAM/ROM
Microprocessorcorrect
irrelevant
all bits reset (i.e. 00H)
all bits set (i.e. FFH)
same as the content of A7-A0correct
Registers
Decoders
Buffers
Accumulatorcorrect
39. What will be the value in the memory location 7101H after the execution of the following code?
The data at memory location 7100 is A7H.
LXI H,7100H
MOV A, M
CMA
INR A
STA 7101H
HLT
59Hcorrect
58H
5AH
none of these
91. If the accumulator of an Intel 8085A microprocessor contains 37 H and the previous operation
has set the carry flag, the instruction ACI 56 H will result in
a.8E H
b.94H
c.7E H
d.84 H
Answer. a
92. Examine the following instruction to be executed by a 8085 microprocessor. The input port has
an address of 01 h and has a data 05 h to input:
IN 01 H
ANI 80 H
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
After the execution of the two instructions the following flag portions may occur:
a.1 and 3
b.2, 3 and 4
c.1, 3 and 4
d.1, 2 and 4
Answer. c
93. For 8085 microprocessor, the instruction RST 6 restarts subroutine at address
a. 00 H
b. 03 H
c. 30 H
d. 33 H
Answer. c
94. Which one of the following function is performed by the 8085 instruction MOV H, C?
Answer. b
LXI H, 01FF H
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
SHLD 2050H
After execution, the contents of memory locations 2050H and 2051 H and the registers H and L, will
be
Answer. c
a. the top of the stack will be popped out and assigned to the PC
b. without any operation, the calling program would resume from instruction immediately
following the call instruction
d. without any operation, the calling program would resume from instruction immediately following
t the call instruction, and also the PC will be incremented after the execution of the instruction
Answer. a
97. An 8085 microprocessor-based system uses a 4 K x 8-bit RAM whose starting address is AA00
H. The address of the last byte in this RAM is
a. 0FFF H
b. 1000 H
c. B9FF H
d. BA00 H
Answer. c
98. The address bus of Intel 8085 is 16-bit wide and hence the memory which can be accessed by
this address bus is
a. 2 k bytes
b. 4 k bytes
c. 16 k bytes
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
d. 64 k bytes
Answer. d
a. RLC
b. STA
c. RRC
d. CMA
Answer. b
a. 16 k
b. 32 k
c. 64 k
d. 128 k
Answer. c
a.ADD B
b.SBB B
c.INR B
d.ORA B
Answer. c
72. The contents of the Program Counter (PC), when the microprocessor is reading from 2FFF H
memory location, will be
a.2FFE H
b.2FFF H
c.3000 H
d.3001 H
Answer. c
a.the microprocessor is disconnected from the system bus till the RESET is pressed.
b.the microprocessor halts the execution of the program and returns to the monitor.
c.the microprocessor enters into a HALT state and the buses are tri-stated.
d.the microprocessor reloads the program counter from the locations 0024 H and 0025 H.
Answer. c
1.PUSH PSW
2.XTHL
3.PUSH D
4.JMP EC75 H
At the end of the execution of the above instructions, what would be the content of the stack pointer?
a.ABCB H
b.ABCA H
c.ABC9 H
d.ABC8 H
Answer. c
75. In an Intel 8085 A, what is the content of the Instruction Register (IR)?
Answer. a
76. The content of the Program Counter of an intel 8085A microprocessor specifies which one of the
following?
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
Answer. c
77. Which one of the following statement does not describe property/characteristic of a stack pointer
register in 8085 microprocessor?
Answer. c
a.MVI A
b.LDAX B
c.JMP 2050 H
d.MOV A,M
Answer. c
Answer. c
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
Answer. a
LXI B, 0010 H
LOOP: DCX B
MOV A, B
ORA C
JNZ LOOP
a.10
b.100
c.16
d.15
Answer. c
MVI A, 91H
XRI 91 H
a.Content of accumulator is 00 H. Carry, Auxiliary Carry and Zero flag set to 0, 1 and 0, respectively.
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
b.Content of accumulator is 91 H. Carry, Auxiliary Carry and Zero flag set to 0, 0 and 1, respectively.
c.Content of accumulator is 00 H. Carry, Auxiliary Carry and Zero flag set to 0, 0 and 1, respectively.
d.Content of accumulator is 91 H. Carry, Auxiliary Carry and Zero flag set to 0, 1 and 0, respectively.
Answer. c
3. Fewer machine instructions can be used with I/O mapped I/O addressing as compared to memory
mapped I/O addressing
4. With an 8085 microprocessor, one can access at the most 512 devices with unique addresses
using I/O mapped I/O addressing
a.1, 2 and 3
b.2 and 4
c.3 and 4
d.1 and 3
Answer. d
84. The contents of memory locations 2000 H, 2001 H and 2002 H are AAH, BBH and CCH
respectively. What are the contents of H and L registers after executing the following instructions in
sequence?
LXI H, 2001 H
LHLD 2001 H
Answer. d
1006 POPH
What are the contents of the stack pointer (SP) and the HL register pair on completion of execution
of these instructions?
Answer. c
86. INR instruction of 8085 does not affect carry flag. Which of the following is correct about INR
instruction?
c.If a programme requires overflow to be detected, ADD instruction should be used instead of INR
Answer. c
a.1, 2, 3 and 4
b.2 only
c.1, 2 and 4
d.1,3 and 4
Answer. d
88. Consider the program given below, which transfer a block of data from one place in memory to
another:
MVI C, 0B H
LXI H, 2400 H
LXI D, 3400 H
L1: MOV A, M
STAX D
INR L
INR E
DCR C
JNZ L1
What is the total number of memory accesses (including instruction fetches) carried out?
a.118
b.140
c.98
d.108
Answer. a
a.1, 3 and 4
b.1, 2 and 4
c.2,3 and 4
d.1,2 and 3
Answer. b
90. Which one of the following 8085 assembly language instructions does not affect the contents of
the accumulator?
a.CMA
b.CMP B
c.DAA
d.ADD B
Answer. b
********************************************************************************
Answer. a
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
52. Find the content of the accumulator after the execution of the following
program:
MVI A, F0 H
ORI FF H
XRI F0 H
a. 00 H
b. F0 H
c. 0F H
d. FF H
Answer.c
LXI H, 0701 H
MVI A, 20 H
SUB M
a.20 H
b.02 H
c.00 H
d. FF H
Answer. c
b.RST n uses direct addressing while PCHL uses register indirect addressing.
Answer. a
55. The content of accumulator are 70 H. Initially all flags are zero. What will
be values of CY and S after executing instruction RLC?
a.CY = 0 and S = 0
b.CY = 1 and S = 1
c.CY = 1 and S = 0
d.CY = 0 and S = 1
Answer.d
a.XTHL
b.SPHL
c.PUSH H
d.POP H
Answer. d
57. The following instruction copies a byte of data from the accumulator into
the memory address given in the instruction
a.STA address
b.LDAX B
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
c.LHLD address
d.LDA address
Answer. a
a.Decremented by one
b.Decremented by two
c.Incremented by one
d.Incremented by two
Answer. b
Answer. c
60. If the status of the control lines SI and SO is LOW, then 8085
microprocessor is performing
a.Reset operation
b.HOLD operation
c.Halt operation
d.Interrupt acknowledge
Answer. c
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
61. The opcode for the instruction “Add Immediately to Accumulator with
carry” in 8085 microprocessor is
a.ADI
b.ACI
c.ADC
d.ADD
Answer. b
62. If the status of the control lines SI and SO is LOW, then 8085
microprocessor is performing
a.Reset operation
b.HOLD operation
c.Halt operation
d.Interrupt acknowledge
Answer: c
Answer: c
64. For which one of the following, the instruction XRA A in 8085
microprocessor can be used?
Answer. b
65. What is the correct 8085 assembly language instruction that stores
the contents of H and L registers into the memory locations 1080 H and
1081 H respectively?
a.SPHL 1080 H
b.SHLD 1080 H
c.STAX 1080 H
d.SPHL 1081 H
Answer. b
66. When the operand requires for instruction is stored inside the
processor, then What this addressing mode is called?
a.Direct
b.Register
c.Implicit
d.Immediate
Answer. b
67. Which one of the following addressing technique is not used in 8085
microprocessor?
a.Register
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
b.Immediate
c.Register indirect
d.Relative
Answer. d
a.One or two
c.One only
d.Two or three
Answer. b
a.LXI H 2050 H
b.MOV A, B
c.LDAX B
d.LDA 2050 H
Answer. c
70. The addressing mode used in the instruction JMP F347 H in case of
an Intel 8085A microprocessor is which one of the following?
a.Direct
b.Register—indirect
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
c.Implicit
d.Immediate
Answer. D
11. Which one of the following statements is correct regarding the instruction CMP A ?
Answer. a
Answer. b
13. Among the given instructions, the one which affects the maximum number of flags is ?
a.RAL
b.POP PSW
c.XRA A
d.DCR A
Answer. c
Answer. c
a.40
b.27
c.21
d.19
Answer. b
a.Stack pointer
b.Accumulator
c.Register B
d.Register C
Answer. a
17. The register which holds the information about the nature of results of arithmetic of logic
operations is called as
a.Accumulator
c.Flag register
Answer. c
c.a short abbreviation for the data word stored at the operand address.
Answer. b
19. In a 8085 microprocessor system with memory-mapped I/O, which of the following is true?
c.There can be maximum of 256 input devices and 256 output devices
d.Arithmetic and logic operations can be directly performed with the I/O data
Answer. d
2. Performs comparisons.
a.1, 2, 3 and 4
Answer. c
Answer. c
22. A bus connected between the CPU and the main memory that permits transfer of information
between main memory and the CPU is known as
a.DMA bus
b.Memory bus
c.Address bus
d.Control bus
Answer. b
23. The operations executed by two or more control units are referred as
a.Micro-operations
b.Macro-operations
c.Multi-operations
d.Bi control-operations
Answer. c
2. B and C registers
3. D and E registers
4. H and L registers
Which of these 8-bit registers of 8085 μP can be paired together to make a 16-bit register?
a.1, 3 and 4
b.2, 3 and 4
c.1, 2 and 3
d.1, 2 and 4
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
Answer. b
25. The first microprocessor to include virtual memory in the Intel microprocessor family is
a.80286
b.80386
c.80486
d.Pentium
Answer. a
d.points the memory address of the current or the next instruction to be executed
Answer. d
27. Assuming LSB is at position 0 and MSB at position 7, which bit positions are not used
(undefined) in Flag Register of an 8085 microprocessor?
a.1, 3, 5
b.2, 3, 5
c.1, 2, 5
d.1, 3, 4
Answer. a
28. At the beginning of a fetch cycle, the contents of the program counter are
a.incremented by one
Answer. c
29. Each instruction in an assembly language program has the following fields
1.Label field
2.Mnemonic field
3.Operand field
4.Comment field
a.1, 2, 3 and 4
b.2, 1, 4 and 3
c.1,3, 2 and 4
d.2, 4, 1 and 3
Answer. a
30. The relation among IC (instruction Cycle), FC (Fetch Cycle) and EC (Execute Cycle) is
a.IC = FC − EC
b.IC = FC+ EC
c.IC= FC + 2EC
d.EC = IC+FC
Answer. B
a. Two
b. Three
c. Four
d. Five
Answer. c
a. FIFO
b. FILO
c. LIFO
d. LILO
Answer. c
3. In the instruction of the 8085 microprocessor, how many bytes are present?
a. One or two
c. One only
d. Two or three
Answer. b
4. Which one of the following addressing technique is not used in 8085 microprocessor?
a. Register
b. Immediate
c. Register indirect
d. Relative
Answer. d
5. Which one of the following register of 8085 microprocessor is not a part of the programming
model?
a. Instruction register
c. Status register
Answer. c
Answer. b
b .Direct transfer of data between memory and I/O devices without the use of microprocessor
Answer. b
Answer. a
a. Stack pointer
b. address latch
c. Program counter
Answer. c
10. The instruction RET executes with the following series of machine cycle
d. Fetch, read
Answer. c
31. When a peripheral is connected to the microprocessor in input/output mode, the data transfer
takes place between
Answer. c
32. While execution of I/O instruction takes place, the 8-bit address of the port is placed on
c.data bus
Answer. d
33. The length of a bus cycle in 8086/8088 is four clock cycles, T1, T2, T3, T4 and an
indeterminate number of wait state clock cycles denoted by TW. The wait states are always
inserted between
a.T1 and T2
b.T2 and T3
c.T3 and T4
d.T4 and T1
Answer. c
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
34. Which one of the following circuits transmits two messages simultaneously in one direction?
a.Duplex
b.Diplex
c.Simplex
d.Quadruplex
Answer. b
Answer. d
Answer. a
37. Which one of the following statements for Intel 8085 is correct?
a.Program counter (PC) specifies the address of the instruction last executed
Answer.c
38. What will be the contents of DE and HL register pairs respectively after the execution of the
following ir:cnstructions?
a.LXIH, 2500 H
b.LXID, 0200 H
c.DAD D
d.XCHG
0200 H, 2500 H
0200 H, 2700 H
2500 H, 0200 H
2700 H, 0200 H
Answer. d
a.0024 H
b.002C H
c.0034 H
d.003C H
Answer. a
40. A ‘DAD H” instruction is the same as shifting each bit by one position to the
a.left
b.right
Answer. c
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
41. When a program is being executed in an 8085 microprocessor, its program counter contains
d.the number of instructions in the current program that have already been executed.
Answer. a
a.Memory to accumulator
b.Accumulator to memory
c.Memory to memory
Answer. c
Answer. b
44. Which of the following instructions is closest match to the instruction POP PC?
a.RET
b.PCHL
c.POP PSW
d.DAD SP
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
Answer. a
a.2
b.3
c.4
d.5
Answer. c
46. Which of the following 8085 instruction will require maximum T-states for execution?
a.XRI byte
b.STA address
c.CALL address
d.JMP address
Answer. c
47. In 8085 microprocessor, which mode of addressing does the instruction CMP M use?
a.Direct addressing
b.Register addressing
c.Indirect addressing
d.Immediate addressing
Answer. c
48. With reference to 8085 microprocessor, which of the following statements are correct?
1 and 2 only
2 and 3 only
1 and 3 only
1, 2 and 3
Answer. d
49. What is content of accumulator of 8085 microprocessor after the execution of XRI F0 H
instruction?
Answer. a
50. The 8085 programming manual says that it takes seven T states to fetch and execute the
MOV instruction. If the system clock has a frequency of 2.5 MHz, how long is an instruction
Cycle?
a.2.8 s
b.2.5ns
c.2.8 ns
d.2.8 μs
Answer. d
Answer – (3)
8. An 8kX8 ROM, having the monitor program of
microprocessor trainer-kit with end-address of
1. 600FH
2. 500FH
3. 1 FFF H
4. 4 FFF H
Answer – (3)
9. The overall I/O space existing in a 8085 if used as
a peripheral mapped mode
1. Sixty four only
2. One hundred twenty eight
3. Two hundred fifty six
4. Five hundred twelve
Answer – (3)
10. The interfacing device utilized with an O/P port
be there
1. Buffer circuit
2. Priority encoder circuit
3. Latch circuit
4. None
Answer – (1)
11. Address lines necessitate for the 64kB memory is
1. 24
2. 36
3. 12
4. 16
Answer – (4)
12. Which one is hardware type interrupt?
1. INTA
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
2. TRAP
3. RST
4. INT
Answer – (2)
13. In 8085 microprocessor, which one is the non-
maskable interrupt?
1. RST 7.5
2. TRAP
3. HOLD
4. INTR
Answer – (2)
14. Machine cycles in the “CALL” instruction of
microprocessor 8085 CPU are
1. six
2. five
3. four
4. two
Answer – (2)
15. In 8085 Microprocessor, the interrupt TRAP is
1. Every time maskable
2. not interrupted by a service subroutine
3. Used for short-term power failure
4. Lowermost priority interrupt
Answer – (3)
16. RST 7.5 interrupt act as
1. Vectored and Maskable type
2. Vectored and non-maskable type
3. Direct and maskable type
4. Direct and non-maskable type
Answer – (1)
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
4. R2
Answer – (1)
25. At any time POP H instruction is performed
1. Data bytes in the HL pairs will be put in storage of the stack’s registers
2. Two data bytes are transferred to the HL pair’s register
3. Two data bytes at the top of the stack are moved to the CPU
Answer – (2)
26. In microprocessor instruction STA 9000H is
1. A data transfer instruction
2. A Logical instruction
3. A I/O and MPU will execute
4. Not an option
Answer – (1)
27. The addressing method in microprocessor used
in the STAX B is
1. A Direct addressing method
2. A Resister addressing method
3. An Immediate addressing method
4. Register indirect addressing method
Answer – (4)
28. When a subroutine is called the address of the
instruction next to CALL is kept in
1. The Stack
2. The Program counter
3. The Stack pointer register
4. Not an option
Answer – (1)
29. Machine cycles for IN instructions in
microprocessor are
1. Eight
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008
2. five
3. four
4. three
Answer – (4)
30. The instruction MOV A, B is kind of
1. the Immediate addressing mode
2. Directing addressing mode
3. Implied addressing mode
4. Register addressing mode
Answer – (4)
31. How many T-states would be required for the
execution of CALL 2000 H instruction?
1. 10
2. 13
3. 18
4. None of these
Answer – (3)
32. The number of I/O lines for 8255 chip is
1. 256
2. 512
3. 1024
4. 2K
Answer – (1)
33. How many flag registers are available in the
8051 chip?
1. 9
2. 8
3. 6
4. 5
5. None
Answer – (5)
Allenhouse Institute of Technology (UPTU Code : 505)
Rooma, Kanpur – 208 008