Total marks: --
Total time: --
INSTRUCTIONS
(1) Assume appropriate data and state your reasons
(2) Marks are given to the right of every question
(3) Draw neat diagrams wherever necessary


1 (a) (i) What happens with pre-fetch queue when jump or call instruction is received by EU? Why?
4 M
1 (a) (ii) Why does 8086 take two machine cycles if 16 bit word starts from odd location in memory?
3 M
1 (b) (i) State the difference between procedure, macro and ISR with example.
3 M
1 (b) (ii) Differentiate between intrasegment call and intersegment call.
4 M

2 (a) Write an 8086 program to search a given number in an array of N (<10) numbers. Store the position of number in AL register if found otherwise store -1 in AL register.
7 M
2 (b) Briefly explain various methods of passing parameters to and from procedure with their merits and demerits. Define the term re-entrant and explain how you must pass parameters to a procedure so that it is re-entrant procedure.
7 M
2 (c) Explain the instruction template (format) with an example giving purpose and meaning of each field.
7 M

3 (a) (i) Justify "Segment and offset addressing scheme allows relocation in Memory system in 8086."
4 M
3 (a) (ii) What are program visible and program invisible registers.
3 M
3 (b) (i) What three housekeeping chores are provided by the 8284A clock generator?
4 M
3 (b) (ii) Explain the difference between exceptions and interrupt.
3 M
3 (c) (i) What conditions do the QS1 and QS0 pins indicate about the 8086? Also Explain the function of LOCK pin in 8086.
4 M
3 (c) (ii) Why buffers are often require in an 8086 based system? Explain.
3 M
3 (d) Write an 8086 program to add only even numbers from the block of ten 16-bit numbers defined as DATA_BLOCK. Store your answer in DS as ANSWER.
7 M

4 (a) (i) Compare the register set of the 80386 with the 80486 Microprocessor.
4 M
4 (a) (ii) What is the function of debug registers and control registers in 80386.
3 M
4 (b) How are tasks in an 80386 system protected from each other? How can operating system kernel procedures and data be protected from access by application programs in an 80386 system?
7 M
4 (c) Explain virtual 8086 mode in 80386.
7 M
4 (d) (i) Describe the difference between the 80386DX and the 80386SX.
3 M
4 (d) (ii) Explain how the 80386 can address a virtual memory space of 64T bytes when the physical memory contains only 4G bytes of memory.
4 M

5 (a) Compare Pentium pro, Pentium II, Pentium III and Pentium IV.
7 M
5 (b) Describe three major improvements that the 80486 processor has over 80386 processor and three major improvements that the Pentium processor has over 80486 processor.
7 M
5 (c) List three major advances that 80386 microprocessor has over the 80286.Describe how the real mode operation of an 80286 is different from protected mode operation.
7 M
5 (d) Explain following instructions of 80286:
CLTS, LAR, LSL, APRL, VERR, VERW, SLDT
7 M



More question papers from Advanced Microprocessor
SPONSORED ADVERTISEMENTS