which are of these examples of Intel 8086 opcodes:

a. MOV
b. ADD
c. SUB
d. All of these

1 Answer

Answer :

d. All of these

Related questions

Description : Ingiven lines of code MOV AX,BL have different type of operands according to assembler for 8086 architecture these identifiers must be of. a. Different type only in byte b. Same type either in word or byte c. Botha &b d. None of these

Last Answer : b. Same type either in word or byte

Description : In length instruction other programs on the other hand, want a small and fixed-size instruction set that contains only a limited number of opcodes, as in case of a. RISC b CISC c. Both d. None

Last Answer : a. RISC

Description : The instruction set can have variable-length instruction format primarily due to: a. Varying number of operands b. Varying length of opcodes in some CPU ce. Both d. None

Last Answer : ce. Both

Description : One of use of microprogramming to implement _ ____ of processor in Intel 80x86 and Motorola 680x0 processors whose instruction set are evolved from 360 original. a. Control structure b. Without control c. Control unit d. Only control

Last Answer : c. Control unit

Description : How can I convert a AVCHD (.MTS) file to a MOV file on a non-Intel PowerMac G5 or Windows XP pc? FREE?

Last Answer : http://www.moviesmac.com/video-converter-mac/, this may solve the problem.

Description : Who was introduce the 80286 microprocessor updated on 8086,in 1983: a. Intel b. Motorola c. Fairchild d. None of these

Last Answer : a. Intel

Description : Intel used HMOS technology to recreate_____: a. 8084 A b. 8086 A c. 8085 A d. 8088 A

Last Answer : c. 8085 A

Description : The intel 8086 microprocessor is a _______ processor A. 8 bit B. 16 bit C. 32 bit D. 4 bit

Last Answer : The intel 8086 microprocessor is a 16 bit processor 

Description : Which is a method of decomposing a sequential process into sub operations: a. Pipeline b. CISC c. RISC d. Database

Last Answer : a. Pipeline

Description : How many algorithm based on add/subtract and shift category: a. 2 b 64 ec. 8 d 6

Last Answer : ec. 8

Description : Which are the algorithm based on add/subtract and shift category: a. Restoring division b. Non-restoring division c. SRT division d. Allofthese

Last Answer : d. Allofthese

Description : EA stands for. a. Effective add b. Effective absolute c. Effective address d. End address

Last Answer : c. Effective address

Description : What is the output of the following code AL=00110101 BL= 39H M. Krishna Kumar/IISc. Bangalore M2/V1/June 04/1 Microprocessors and Microcontrollers/Assembly language of 8086 Multiple Choice Questions SUB AL, BL AAS ... , CF=1 b) BL=00000100, CF=0 c) AL=11111100 CF=1 d) BL= 00000100, CF=1

Last Answer : b) BL=00000100, CF=0

Description : Explain the following instructions. SWAP A ADD C MUL AB CJNE A, add, radd MOV A, R0 MOVX A, @ A + DPTR.

Last Answer : SWAP A Description: This instruction exchanges bits 0-3 of the Accumulator with bits 4-7 of the Accumulator. This instruction is identical to executing "RR A" or "RL A four times ... referred to as the base address and the accumulator value is referred to as the index address.

Description : Identify direct addressing instructions from following instructions : (i) MOV RO, R5 (ii) MOV RO, 80 H (iii) MOV RO, #75H (iv) ADD A, 45 H

Last Answer : Instructions ii) and iv) are direct addressing as 80H and 45H are direct addresses

Description : emaphore provides mutual exclusion for accesses to the buffer pool and is initialized to the value: a. Mutex b. Mutual Cc. Memory d. __ Allof these

Last Answer : Mutex

Description : Which section is basically a sequence of instruction with a clear indication of beginning and end for updating shared variables. a. Racing section b. Critical section c. d. Both None of thes

Last Answer : . Critical sectio

Description : In which section only one process is allowed to access the shared variable and all other have to wait. a. Critical section b. Racing section Cc. Entry section d. Remainder section

Last Answer : . Critical section

Description : hich section is the remaining part of a process’s code: a. Racing section b. Critical section Cc. Entry section d. Reminder secti

Last Answer : b. Entry section

Description : Which are the characteristics of deadlocks. a. Mutual exclusion b. Hold and wait Cc. No pre-emption d. = Circular wait e. Allof these

Last Answer : e. Allof these

Description : How many events concerning RAG can occur in a system: a. 1 b 2 c. 3 d 4

Last Answer : c. 3

Description : Which are the events concerning RAG can occur in a system: a. Request for a resource b. Allocation of a resource c. Release of resource d. Allof these

Last Answer : d. Allof these

Description : How many methods for handling deadlocks: a. 1 b 2 c. 3 d 4

Last Answer : c. 3

Description : Which are the method for handling deadlocks. a. Deadlock prevention b. Deadlock avoidance c. Deadlock detection d. Allof these

Last Answer : d. Allof these

Description : How many condition that should be met in order to produce a deadlock. a. 2 b 4 Cc. 6 d 8

Last Answer : b 4

Description : Which are the condition that should be met in order to produce a deadlock. a. Mutual exclusion b. Hold and Wait Cc. No preemption d. Circular wait e. Allofthese

Last Answer : e. Allofthese

Description : In protocol each process can make a request onlyinan a. Increasing order b. Decreasing order c. Botha &b d. None of these

Last Answer : a. Increasing order

Description : Which state refers to a state that is not safe not necessarily a deadlocked state. a. Safe state b. Unsafe state c. Botha &b d. None of these

Last Answer : b. Unsafe state

Description : a direct arrow is drawn from the process to the resource rectangle to represent each pending resource request: a. TS b. SP Cc. CCR d. RAG

Last Answer : d. RAG

Description : The attributes of a file are. a. Name b. Identifier c. Types d. Location e. Size f. Protection g. Time, date and user identification h. Allof these

Last Answer : h. Allof these

Description : The various file operation are: a. Crating a file b. Writing a file c. Reading a file d. Repositioning within a file e. Deleting a file truncating a file f. All of these

Last Answer : f. All of these

Description : Which operations are to be performed on a directory are: a. Search for a file b. Create a file c. Delete a file d. List a directory e. Rename a file f. Traverse the file system g. Allof these

Last Answer : g. Allof these

Description : Which memory is assembled between main memory and CPU: a. Primary memory b. Cache memory Cc. Botha & b d. None of these

Last Answer : b. Cache memory

Description : Which is one of the important I/O devices and is most commonly used as permanent storage device in any processor: a. Soft disk b. Hard disk c. Botha &b d. None of these

Last Answer : b. Hard disk

Description : can read any printed character by comparing the pattern that is stored in the computer: a. SP b. CCR Cc. RAG d. OCR

Last Answer : d. OCR

Description : Which system is a typical example of the readers and writers problem: a. Airline reservation system b. Airport reservation system c. Both d. None of these

Last Answer : a. Airline reservation system

Description : Which lock can arise when two processes wait for phone calls from one another. a. Spine lock b. Dead lock c. Both d. None of these

Last Answer : b. Dead lock

Description : Which lock is more serious than indefinite postponement or starvation because it affect more than one job: a. Deadlock b. Spinelock c. Both d. None of these

Last Answer : a. Deadlock

Description : Anumber system that uses only two digits, O and 1 is calledthe_ a. Octal number system b. Binary number system c. Decimal number system d. Hexadecimal number system

Last Answer : b. Binary number system

Description : In which computers, the binary number are represented by a set of binary storage device such as flip flop: a. Microcomputer b. Personal computer c. Digital computer

Last Answer : c. Digital computer

Description : Abinary number canbeconvertedinto a. Binary number b. Octal number co. Decimal number d. Hexadecimal number

Last Answer : co. Decimal number

Description : Which system is used to refer amount of things. a. Number system b. Number words c. Number symbols d. — Allof these

Last Answer : a. Number system

Description : _are made with some part of body, usually the hands. a. Number words b. Number symbols c. Number gestures d. __ Allof these

Last Answer : c. Number gestures

Description : ____are marked or written down: a. Number system b. Number words © Number symbols d. Number gestures

Last Answer : © Number symbols

Description : Anumber symboliscalleda_ a. Arabic numerals b. Numerals c. Both d. None of these

Last Answer : b. Numerals

Description : 0,1,2 ,3 ,4,5,6 ,7,8 and 9 numerals are called: a. Arabic numerals b. String numerals c. Digit numerals d. None of these

Last Answer : a. Arabic numerals

Description : How many system of arithmetic, which are often used in digital system. a. 5 b. 6 Cc. 3 d 4

Last Answer : d 4

Description : Which are the system of arithmetic, which are often used in digital system: a. Binary digit b. Decimal digit c. Hexadecimal digit d. Octal digit e. Allof these

Last Answer : e. Allof these

Description : In which numeral every position has a value 2 times the value f the position to its right: a. Decimal b. Octal c. Hexadecimal d. Binary

Last Answer : d. Binary

Description : Abinary number with 4 bitsiscalleda_ a. Bit b. Bytes ce. Nibble d. None of these

Last Answer : ce. Nibble