0% found this document useful (0 votes)
6 views4 pages

MIC 2M 4M Important QA Sheet

The document provides important questions and answers related to the 8086 microprocessor, covering topics such as signal definitions, bit manipulation instructions, procedures, addressing modes, and assembly language tools. It includes examples and explanations for various instructions and concepts like CALL, RET, and physical address calculation. Additionally, it discusses advantages of pipelining and provides assembly language programs for specific tasks.

Uploaded by

swarupholkar4
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
6 views4 pages

MIC 2M 4M Important QA Sheet

The document provides important questions and answers related to the 8086 microprocessor, covering topics such as signal definitions, bit manipulation instructions, procedures, addressing modes, and assembly language tools. It includes examples and explanations for various instructions and concepts like CALL, RET, and physical address calculation. Additionally, it discusses advantages of pipelining and provides assembly language programs for specific tasks.

Uploaded by

swarupholkar4
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

MIC (Microprocessor) - 2M & 4M Important Questions with Answers

1. Define MN/MX and TEST signals of 8086. (2M)

MN/MX:

- Indicates mode of operation.

- MN/MX=1: Minimum mode (single processor system)

- MN/MX=0: Maximum mode (multiprocessor system)

TEST:

- Used by WAIT instruction.

- If TEST is LOW, CPU continues execution.

2. List any four bit manipulation instructions of 8086. (2M)

- NOT: Inverts each bit

- AND: Logical AND operation

- OR: Logical OR operation

- XOR: Exclusive OR operation

3. What is the use of AAM instruction with example? (2M)

- Used to adjust ASCII result after multiplication of BCD values.

Example:

MOV AL, 5

MOV BL, 7

MUL BL => AX = 35

AAM => AL = 5, AH = 3 (BCD: 35)

4. Give any two advantages of pipelining in 8086. (2M)

- Increased instruction throughput

- Better utilization of Execution Unit (EU)


5. Draw flag register format of 8086. (2M)

[Diagram: 16-bit flag register with CF, PF, AF, ZF, SF, TF, IF, DF, OF]

6. Define Procedure and write syntax. (2M)

Procedure: A reusable block of code.

Syntax:

PROC_NAME PROC

...

PROC_NAME ENDP

7. Difference between NEAR and FAR procedures. (2M)

- NEAR: Same code segment

- FAR: Different code segment

- NEAR stores only IP, FAR stores IP and CS

8. Write any two addressing modes with example. (4M)

- Immediate: MOV AL, 05H

- Register: MOV AX, BX

- Direct: MOV AX, [1234H]

- Indirect: MOV AX, [BX]

9. Explain CALL and RET instructions. (4M)

CALL: Transfers control to procedure, saves return address on stack.

RET: Returns control to calling program using address from stack.

10. ALP to find largest number in array of 5 elements. (4M)

MOV CX, 4

MOV SI, OFFSET ARRAY

MOV AL, [SI]

UP: INC SI
CMP AL, [SI]

JNC NEXT

MOV AL, [SI]

NEXT: DEC CX

JNZ UP

MOV LARGEST, AL

11. Physical Address Calculation. (4M)

Given CS=348AH, IP=4214H

PA = CS * 10H + IP = 348A0H + 4214H = 38AB4H

12. Define Logical and Effective Address. (4M)

Logical: Segment:Offset format used by CPU

Effective: 16-bit offset within the segment

13. Assembly language tools. (2M)

- Editor, Assembler, Linker, Debugger

14. Assembler Directives: DB, SEGMENT, DUP, EQU (4M)

- DB: Define Byte

- SEGMENT: Start a segment

- DUP: Declare multiple values

- EQU: Assign constant value

15. Count 1's in 8-bit number ALP (4M)

MOV CL,08

MOV AL,number

AGAIN: ROR AL,1

JNC SKIP

INC COUNT
SKIP: LOOP AGAIN

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy