Professional Documents
Culture Documents
MM Question Bank 1
MM Question Bank 1
18. Explain data types and definition WITH EXAMPLES ( ORG, DB, DUP, EQY, DW, DD, DQ, DT) in X86.
19. IDENTIFY THE ADDRESSING MODES AND CALCULATE THE PHYSICAL ADDRESS OF THE
MEMORY LOCATION BEING ACCESSED BY THE INSTRUCTION. Assume DS=2300h, SS=3597h,
SI=1393H, BX=2345H, BP=ABC2H, SP=2ADEH
MOV CX, [BX+23H], SUB DX, [BP], ADD [2323H], BL ADC [BP][SI], DL, MOV AX, [BX+DI+345H], SUB
[SI], BX
20. Explain the Program control transfer instructions .
21. What is a PROCEDURE? How procedure is invoked. Explain CALL and RET instructions with examples.
22. Write the difference between MACRO and a PROCEDURE.
Identify memory addressing mode in the following instructions and calculate effective offset
address 1. MOV AX, 1000H MOV CX, [1000H] 3. MOV AL, [SI+05H]
4. ADD AX, BX
23. Give the state of all the status flags bits after the addition of 30a2h with f01ch.
a. AND the data stored in memory location addressed by SI with DX store the result in DX.
b. Set the right most 5 bits of DI without changing remaining bits
c. Where product is stored in MUL BX
d. Where remainder is stored in DIV CL
e. Select an instruction that adds AX, BX an also adds the content of carry flag
47. Write a short sequence of instructions that divides the number in BL by number in CL and then
multiplies the quotient by 2 store the result in DX
48. MOV AL, 0CH
AAM
MOV BL,AH
MOV BH, AL .what is the content of BX ?
52.Calculate physical address of memory to access opcode and stack IP = C846H, CS = SS = C800H, SP =
8480H, FFFFH
53.Write an ALP using 8086 instructions to search a number placed in location NUM,in
an array of ten numbers placed at location ARRAY.
55.Write an ALP using 8086 instructions to generate and add the first 10 even numbers
and save the numbers and result in memory location Num and Sum.
56.Write an ALP using 8086 instructions to count the numbers of zeros in a given 8 bit
number and store the result in memory location 'Res'.
Module 3
49. Explain the concept of signed numbers in computers.
50. Explain signed byte operand and write the range of positive and negative numbers.
51. Explain signed word operand and write the range of positive and negative numbers.
52. Show how the computer would represent byte operand -5.
53. Show how the computer would represent byte operand -36h.
54. Show how the computer would represent byte operand – 126.
55. Explain , when the overflow flag is set in 8-bit operations,
56. Show the status of Overflow flag(OF) after the execution of following instructions.
ALL NUMBERS ARE SIGNED NUMBERS
I) MOV DL, -126 II) MOV AL, -8 III) MOV DH, +8
MOV CH, -6 MOV CL,-6 MOV BH, +29
ADD DL, CH ADD CL, AL MOV BH, DH
57. Explain , when the overflow flag is set in 8-bit operations,
58. Explain the sign extension of 8 bit and 16 bit operands ( CBW and CWD).
59. Explain the signed number division (IDIV) and multiplication( IMUL) instructions with examples.
60. Explain the string instructions with examples( MOVS, LODS, STOS, CMPS, SCAS)
61. Explain the instructions to process table( XLAT)/ Bring out the importance of XLAT instruction using
a suitable program.
62. EXPLAN THE USE OF REP, REPE/REPZ AND REPNE/REPNZ WITH EXAMPLES.
63. Write a program that uses STOS to store byte ABH in 200 memory locations. Use LODS to test the
contents of each location to see if ABH is there. If the test fails, the system should display message
“ bad memory”
64. Assuming that there is a spelling of Europe” in an electronic dictionary and user types in “ Euorope”, r
Write a program that compares these two and diaplays the following message depending on
the result: i) Tf they are equal, “display “ the spelling is correct”
ii) If they are not equal, display “ wrong spelling”
65. Write a program using string instructions that scans the name “ “ Mr. Gones” and replaces the “G”
with the letter “J”
66. Write a program that scans the initials “IbM” and replaces the lower case “b” with uppercase”B”
67. Find the Address range of the following memory design. ( Refer text book 1: question 17 in section
10.2)
68. Using nand gates and inverters, design decoding circuitry for the address range C000H to C0fffh.
69. Find the address range for Y0, Y3 AND Y6 OF THE 74138 FOR THE FOLLOWING DESIGN ( Refer text
book 1: question 19 in section 10.2)
70. Using 74138, design a MEMORY DECODING CIRCUITRY IN WHICH THE MEMORY BLOCK CONTROLLED
BY Y0 IS IN THE RANGE 00000H to 03FFFh . Indicate the size of memory block controlled by each
block. Also find the address range for Y3, Y6 and Y7.
Module 4
97. Explain the difference between microprocessor and microcontrollers
98. Explain the difference between CISC and RISC architectures.
99. Explain the design rules on which RISC philosophy is implemented.
100. Explain the ARM design philosophy( Physical features that have driven ARM processor design.)
104. Explain embedded system software( Initialization code, operating system and applications)
105. Explain with a neat diagram, ARM core data flow model.
106. Explain the seven basic operating modes of ARM core.
107. Explain with a neat diagram, register file of ARM.
108. Explain with a diagram, CPSR of ARM/Explain Conditional code flags of ARM
109. Explain with a neat diagram, register Bank of ARM.
110. Explain the pipeline execution of ARM instructions with an example.
111. Draw and explain the Interrupt vector table of ARM core and also explain the steps taken by the ARM
core when an exception/Interrupt occurs.
112. Explain the core extensions of ARM with diagrams.
Module 5
113. Explain MOV instruction with examples.
114. Explain barrel shifter in ARM instructions with an example.
115. Assume r5 = 5 , r7 = 8
Show the contents of registers r5 and r7 after the execution of MOV r7, r5, LSL #2