1 (a) (i)
What happens with pre-fetch queue when jump or call instruction is
received by EU? Why?
4 M
1 (a) (ii)
Why does 8086 take two machine cycles if 16 bit word starts from
odd location in memory?
3 M
1 (b) (i)
State the difference between procedure, macro and ISR with example.
3 M
1 (b) (ii)
Differentiate between intrasegment call and intersegment call.
4 M
2 (a)
Write an 8086 program to search a given number in an array of N (<10)
numbers. Store the position of number in AL register if found otherwise
store -1 in AL register.
7 M
2 (b)
Briefly explain various methods of passing parameters to and from
procedure with their merits and demerits. Define the term re-entrant and
explain how you must pass parameters to a procedure so that it is
re-entrant procedure.
7 M
2 (c)
Explain the instruction template (format) with an example giving purpose and meaning of each field.
7 M
3 (a) (i)
Justify "Segment and offset addressing scheme allows relocation in
Memory system in 8086."
4 M
3 (a) (ii)
What are program visible and program invisible registers.
3 M
3 (b) (i)
What three housekeeping chores are provided by the 8284A clock
generator?
4 M
3 (b) (ii)
Explain the difference between exceptions and interrupt.
3 M
3 (c) (i)
What conditions do the QS1 and QS0 pins indicate about the 8086?
Also Explain the function of LOCK pin in 8086.
4 M
3 (c) (ii)
Why buffers are often require in an 8086 based system? Explain.
3 M
3 (d)
Write an 8086 program to add only even numbers from the block of ten
16-bit numbers defined as DATA_BLOCK. Store your answer in DS as
ANSWER.
7 M
4 (a) (i)
Compare the register set of the 80386 with the 80486 Microprocessor.
4 M
4 (a) (ii)
What is the function of debug registers and control registers in
80386.
3 M
4 (b)
How are tasks in an 80386 system protected from each other? How can
operating system kernel procedures and data be protected from access
by application programs in an 80386 system?
7 M
4 (c)
Explain virtual 8086 mode in 80386.
7 M
4 (d) (i)
Describe the difference between the 80386DX and the 80386SX.
3 M
4 (d) (ii)
Explain how the 80386 can address a virtual memory space of 64T bytes when the physical memory contains only 4G bytes of memory.
4 M
5 (a)
Compare Pentium pro, Pentium II, Pentium III and Pentium IV.
7 M
5 (b)
Describe three major improvements that the 80486 processor has over
80386 processor and three major improvements that the Pentium
processor has over 80486 processor.
7 M
5 (c)
List three major advances that 80386 microprocessor has over the
80286.Describe how the real mode operation of an 80286 is different
from protected mode operation.
7 M
5 (d)
Explain following instructions of 80286:
CLTS, LAR, LSL, APRL, VERR, VERW, SLDT
CLTS, LAR, LSL, APRL, VERR, VERW, SLDT
7 M
More question papers from Advanced Microprocessor