0% found this document useful (0 votes)
21 views24 pages

Computer Organisation

Uploaded by

vinothrao2003
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
21 views24 pages

Computer Organisation

Uploaded by

vinothrao2003
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 24

QUESTIONS AND ANSWERS

PART-A (2 MARKS)
MWhat are data types?
Data are numbers and other binary coded information tho
operated on to achieve required computational results.
The data types found in the registers of digitalcomputers are class
into three categories
Numbers used in arithmetic computations,
A. Letters of the alphabet used in data processing.
n. Other disrete symbols used for spccific
purposes
ADistinguish betweeri Nibble" and Byte".
Innumber systemn group of four bits is
eight bits is known as Byte. known as Nibble and grour

AName various
Number systems? Give examples.
(A number system is a set of
from a common base. or
symbols used to represent values deri.
following categories radixyNumber systems can be classified
i Decimal
number system - 320
i. Binary number
system - 100000,
Ai. Octal number
iK.
systen 40,
Hexadecimal number system 20,,
Why do digital computers use
operation? binary numbers for their
(Computers use voltages and since no
specific voltage is set
number the decimal system. For this
in for e
reason, binary is
state system i.e. on or
ofAlso, to keep calculations measured as atw
binary online, computers use the binary simple and conve
number systen1.
sState the two rules followedin 2's
In 2's complement notation, the complement negation.
negaion of an integer can be forme
with the following rules:
Data Representation 1.27
Take the Boolcan complement of each bit of the intepef (including
the sign bit)/That is, set each Ito Oand each 0to )
4 Treating the result as an unsigned binary integer,add .
67Convert the decimal number 61.3 to binary.
2 61
30
0.3 *2 =0.6
2 1S 0.62- 2 1

2 7-1 0.2*2 = 0,4


0.4 * 2 - 0.8
3 -1 0.8*2 =l.6 1

Ans: 111101.01001

1 Convert binary 10010, to gray code. A


(10010), ’ (101|),
8. What is a self complementing code?Give example.
Self-complementing codes providc the 9's complement ofa decimal
number, just by interchanging 1's and 0's in its equivalent code (2421,
Excess 3.) representation.
Example:
2421 as selfcomplementing code :
Let us consider the decimal number 7. The 9's complement of 7 is 2
(ie. 9-7 =2).
In2421, decimal 7is represented as 0111.By interchanging l's and 0's
we get 1000which represents 2 in 2421 code, which is nothing but the 9's
complement of the decimal number 7. Thus 2421 is a self complementing
code.

M. What are fixed point and floating point nunbers?


Floating-point numbers are expressed as a numbr (signiisant)
muliplied by aconstant (base) raised l0 soeinteget power exponent).
Floating point numbers can be useddto represent very largead very snall
numbers."
1.28 Computer OrganizG.
A. AVhat is BCD?
(Each decimal digit (0-9) is represented in 4 bits called Binary
Decimal.)
(123),, - (0001 0010 0011)pco
DESCRIPTIVE QUESTIONS
PART - B (5MARKS)
I. Explain integer arithmetic operations.
2. Explain how negative numbers are represented in a computer
system.
ACWrite notes on Non- weighted codes.
PART - C (10 MARKS)
Explain fixed and floating point representation.
Discuss on the various binary codes.
operations
Register Transter and Micro 2.19
QUESTIONS AND ANSWERS
PART - A (2 MARKS)

Define Micro operation.


The micro-operatios(also known as mjcro-ops) are the functional
clementary operatiom
oratonic, operations of aprocessor in CPUMt is an registers
performcdon theinfoton-sed in oncor more

List the commonly used registers in micro operation.


Accumulator This is the most common register used in arithrnetic
and logical opcraion.)
i General Purpose Registers: (This is used to store intermediate
data during program exccution) It can be accessed vía asscrnbly
programming.
Special Purpose Registers:/Users do not access these registers.
These registers arc uscd by the computer systern.

a. MAR: Memory Address Register arc those registcrs that holds


the address for memory unit.
b. MBR: Memory Buffer Register storcs instructíon and data
received from thc imemory or sent fromthe memory.
C PC: Program Counter points to the next instruction to be
executed.
d. IR: Instruction Register holds the instruction to be executed.

3. Define RTL.
The symbolic notation used to describe the micro-operation trenster
amang registers iscalled Register Transfer Language (RTL). )
g. What is a Register?
Registers are the memory units. They store, accept and transfer data
and instruction that are being used immediately.
5. Define control function. Give example
(Control function is a boolean variable that is equal to 0or
control function is included in the statement as
P: R2 + RI
2.20
Computer Organizol.
Control function is terminated by a colon) It shows that the tr
operation can be executed by the hardware only if P-1.
6.What are internal and external bus?
Internal Bus:t connects all the internal computer components tr
CPUand main memory. It is also callcd as system Bus) System bus r.
to the following:
Data Bus The data bus is used to transfer the data from CP
memory, or memory to CPU. It is bidirectional.
Address Bus/ This is used by CPU to transfer information t
specific location. It is unidirectional.)
iëControl bus:(This bus is used to transmit the information which
necessary to control and coordinate the operation of the compu
Example :read, write, interrupt, etc.
External Bus It connects the external devices with the
system. compu:
I What is a tri-state bus buffer?
A bus system can be
constructed with three-state gates instead
multiplexers. three-state gate isa digital circuit that exhibits three state:
A
Two of the states are signals
conventional gate and the third state equivalent
to logic 1 and 0 as in
is a high-impedance state.
8) List the types of Micro operations.
A Register Transfer
Micro-operations
Transfer binary information from one register to
another.
H Arithmetic Micro-operations
Perform arithmetic operation on numeric data stored in
registers.
H. Logical Micro-operations
Perform bit manipulation operations on non-numeric data storedit
registers.
j Shift Micro-operations
Perform shift operations on data stored in registers.
Register Transfer and Micro operations 2.21

Defne Mask logic micro operation.


The bits of A are cleared only where there are corresponding O's
the
in B.The mask operation is an AND micro operation as seen frorn
following numerical example:
Example:
1110 1011 A before
I110000 B (mask)

1l10 0000 A After

. AVhat is shift micro operation?


Shift micro-operations are used for serial transfer of information.
These are alsoused in conjunction with arithmetic micro-operation, logic
micro-operation, and other data-processing operations. The contents of the
register can be shifted to the left or to the right.

DESCRIPTIVE QUESTIONS
PART- B (5 MARKS)
1. Define and explain following terms. RTL and Micro-operation
2. Discuss on the block diagram of a Register.
3. Explain three state bus buffer with a diagram.
4. Write a note on Memory transfer.
5 Explain arithmetic micro operations with example.
PART - C (10 MARKS)
1. Design Bus system for Four-bit register using 4x1 Mux.
2. List outthe Register transfer notations for Arithmetic Micro
Operations.
3. Explain the logical micro operations which manipulates individual
bits of word in register with examples.
4.
Explain the shift micro operations with examples.
ESTIONS AND ANSWERS
PART - A (2 MARKS)
1. Defne CPU.
The main part of the performs the bulk of dat:
processing operations is calledcomputer that processing unit and is referr
the central
to as the CPU.
2. What are the
components of CPU?
CPU consists of three main components namely Arithmetic Log
Unit (ALU). Control Unit and
3.
Registers.
What is an ALU?
ALU performs the required micro operations for executing
arithmetic and logical instructions.
4. What is the function of the
control unit?
The function of the control unit is to fetch the instruction store:
RAM (Random ACcess Memory), identify the operations and
device involved in it and accordingly generate control signal.
The control unit supervises the transfer of
information among
registers and instructs the ALUas to which operation to perfor
5. Define Stack
A stack is a storage device that stores
that the item stored last is the first item information in such a m
retrieved.
6. What are the operations of stack?
The twooperations that are performed on stack are the
and Pop(deletion).
Push (inse
7. What is Reverse Polish notation?
Give example.
The postfix notation is referred to as Reverse Polish
The operator is placed after the operands.
notation (N
Example: atb is written in postfix form as ab+.
8. What are the common fields found in the Instruction forma
An operation code: Itspecifies the operation to be perform
Cental Processing Unit 3.37

It designates a memory address or a processor


register.
it A mode field: It specifies the way the operand or the effective address
is determined.

9, Why addressing mode techniques are essential in computers?


i To give programming versatility to the user by providing such
indexing
facilities as pointers to memory, counters for loop control,
of data, and program relocation.
i. Toreduce the number of bits in the addressing field of the instruction.
10. Defne implicit addressing
In this mode the operands are specified implicitly in the definition of
the instruction.

Example :
Complement accumulator (CMA) is an implied-mode instruction
because the operand in the accumulator register is implied in the
definition of the instruction.

o Allregister reference instructions that use an accumulator are implied


mode instructions.
Zero address in a stack organization computer is implied mode
instructions.

11. What is meant by direct addressing?


Inthis addressing mode address is given directly in the instruction.
Exomple:
LDA 2050 Load the content of memory location 2050 to Register A.
" The operand resides in memory and its address is given directly by
the address field of the instruction.
9 In a branch-type instruction the address field specifies the actual
branch address.
12. Define Index Register.
An index register is a special CPU register that contains an index
value.
Index value = Beginning address - Address of operand
3.38 Computer Organizatio
i3. What are data transfer instruction?
Data transfer instructions move data from one place in the comn
to another without changing the data content.
14. Distinguish arithmetic and logical shift.
The arithmetic shift operation treats the data as a signed integer and
does not shift the sign bit. In arithmetic right shift, the sign bit is shiftcd t
the right together with the rest of the number, but the sign bit itself remain
unchanged. The arithmetic shift-left instruction inserts 0 to the end position
and is identical to the logical shift-instruction.
* Logical shift inserts zero to the end bit position.
" The end position is the leftmost bit for shift right and the rightmost
bit for shift left.

15. Give examples for program control instructions.


i. Jump (branch) BR

ii. Jump Conditional JC

iii. Jump to Subroutine JMP

16. What are status bits?


The Arithmetic Logic Unit circuit in the CPU has status register for
storing the status bit conditions. Status bits are also called condition-code
bits or flag bits.
The four status bits are symbolized by C, S, Z, and V. The bits are se
or cleared as a result of an operation performed in the ALU.
17. Define subroutine.
A subroutine is a block of instruction which perform a spec
and well defined task. Subroutines are written and stored separately.
other words a subroutine is a self contained sequence of instructions
performs agiven computational task.
18. List the types of interrupts.
1. Internal interrupt
ii. External interrupt
ii. Software interrupt.
Central Processing Unit 3.39

19, Define Opcode' and 'operand'.


The opcode is the instruction that is executed by the CPU and the
operand is the data or memory location used to execute that instruction.
20. Define RISC.

Computers use fewer instructions with simple constructs so they can


beexecuted much faster within the CPUwithout having to use memory
as often. This type of computer is called as a Reduced Instruction Set
Computer or RISC.

DESCRIPTIVE QUESTIONS
PART - B (5 MARKS)
1 Explain Instruction Format.
2 Explain thc composition of a CPU with a diagram.

3 What are the different addressing modes available in 8085


microprocessor? Explain with examples.
4 Define stack. Explain stack is used in evaluating an arithmetic
Cxpression.
Write a note on General Register organization.
6. Explain CPUorganization on the basis of number of address fields.
7. Write notes on RISC.

PART -C (10MARKS)
1. Explain stack organization in detail.
2. Explain the various Instruction formats.
3. Elaborate on the different types ofAddressing modes.
4. Explain the Data manipulation instructions.
D. Explain Program Control instructions.
Computer Organization
QUESTIONS AND ANswERS
PART -A(2 MARKS)
1. Defne
Parallel processing
Parallel
that are used toprocessing is aterm used to denote alarge class of
technique,
of increasing theprovide simultaneous data-processing tasks for the purpoc
2. List the Flynn's
computational speedof a computer system.
i. Single classification of computers
ii. Single
instruction stream, single data stream (SISD)
instruction stream, multiple data stream (SlMD)
i. Multiple instruction
stream, single data stream (MISD)
iv. Multiple instruction stream,
3. Define Pipelining.
multiple data stream (MIMD)
Pipelining is a
technique decomposing a sequential process int
of
sub operations, with cach sub process being exccuted in a
segment that operates concurrently special dedicatc:
with all other segments.
4. Define
Arithmetic pipeline.
An arithmetic pipeline divides an arithmetic
operations for execution in the pipeline segments. operation into su
5. Define
Instruction pipeline.
An instruction pipeline
operates on a
overlapping fetch,decode and execute phases ofstream of instructions
the instruction cycle.
6. What are the four
stages of instruction pipeline?
i. FISegment 1that fetches the
ii. DA: Segment 2 that
instruction.
decode the instruction and calculate the efle
address.
ii. FO: Segment 3 that fetches the
operands.
iv. EX: Segment 4 that execute the
Instruction
7. What are the three major
difficulties caused in Instruction
pipeline?
i. Data dependency conflicts arise when an
instruction depends
result ofa previous instruction, but this result is not yet available
Pipelining and Vector Processing 4.29

i. Resource conflicts caused by access to memory by two segments


at the same time. Most of these conflicts can be resolved by using
separate instruction and datamemories.
ii. Branch difficulties arise from branch and other instructions that
change the valuc of PC.
8. List the advantages of RISC pipelining.
o One of the major advantages of RISC is its ability to execute
instructions at the rate of onc per clock cycle
o RISC can achieve pipeline segments, requiring just one clock cycle,
while CISC uses many segments in its pipeline, with the longest
segment requiring twoor more clock cycles.
o Another characteristic of RISC is the support given by the compiler
that translates the high-level language program into machine
language program.
RISC processors rely on the efficiency of the compiler to detect and
minimizc thc delays encountered with data conflicts and branch
penalities.
9. What is interleaving?
In an interleaved memory, different sets of addresses are assigned to
different memory modules called Address interleaving.
10. Define Array processor.
An aray processor is a processor that performs computations on large
arrays of data.
11. Define Attached array processor.
An attached aray process >r is designed as a peripheral for a
conventional host computer, and its purpose is to enhance the performance
of the computer by providing vector processing for complex scientific
applications.
12. Define SIMD Array Processor
An SIMD array processor is acomputer with multiple processing units
operating in parallel. The processing units are synchronized to perform the
Same operation under the control of a common control unit, thus providing
asingle instruction stream, multiple data stream (SIMD) organization.
4.30
Computer Organizatio
DESCRIPTIVE QUESTIONS
PART - B (5 MARKS)
Explain how to measure the performance of apipeline.
2.
Explain instruction Pipclining with an exampl.
3
State the ditlerent types of hazards that can occur in pipeline.
4. Write notes on
Delayed load
ii. Delayed Branch in
5.
RISC pipclining.
Bricf on Vector
opcerations.
PART - C (10MARKS)
1. Write notes on
a. RISC vs CISC
anomaly
b. Array processor
2.
Describe how the performance of the
improved instruction pipeline can be
3.
Explain arithmetic pipelining in detail with an
example.
5.18
QUESTIONS AND ANSsWERS er Organtzation

PART -A(2MARKS)
1. What is a
The microprecessor?
microprocessor is a multipurpose, clock driven, registet based,
digital-integrated circuit which accepts binary data as input. processes
t according to instructions stored in its memory., and
output. provides results as
2. What is a micro
computer?
A digital computer, in which one microprocessor has been provided
to act as CPUis called
microcomputer.
3. What is the function of accumulator in 8085?
The accumulator (register A) is an 8-bit register associated with
ALU.
* It is used to hold one of the operands of an arithmetic or logical
operation.
< It serves as one input to the ALU. The other operand for an arithmeic
or logical operation may be stored either in the memory or in one of
the general purpose registers.
o Final result of an arithmetic or logical operation is placed in the
accumulator.
4. What is an ALU?

> It is the unit of microprocessor where various computing functios


are performed on the data.
o Itperforms arithmetic operations such as addition, subtractionm
logical operations such as OR, AND, and Exclusive-OR.
5. List all the registers of 8085.
Registers are identified by letters such as B, C, D, E, H, and !
6. What is the purpose of stack?
progam
Stack is asequence of memory location set aside by the
to store/retrieve the content of accumulator, fiags, progran o
general purpose registers during the execution of a program
Microprocessor and its Operations 5.19

4 State any four tiags used in 8085 microprocessor.


The five flags of Intel 8085 are:
i. Carry flag (CS) ii. Parity Flag (P)
ii. Auxiliary Carry Flag (AC) iv. Zero Flag (Z)
v. Sign Flag (S)
&. Define stack and stack pointer register.
Stack pointer is a l6-bit special purpose register, initialized by
the programmer at the beginning of aprogram which needs stack
operation.
> Stack is a sequence of memory location set aside by the programmer
to store/retrieve the content of accumulator, flags, program counter
and general purpose registers during the execution of a program.
9. What is the role of program counter in 8085 ?
It is a 16-bit register which keeps in track of the address of the next
instruction to be executed.

10. What are System Bus?


A system bus is a single computer bus that connects the major
components of a computer system. Hence the Address, Data and Control
bus are collectively named as System Bus.
I1. Why data bus is bidirectional?
Data bus is bidirectional as it is used by the Microprocessor to send
or receive data.

12. List the design segment of 8085 MPU.


i. Arithmetic/logic unit (ALU)
ii. Register array and
iii. Control unit
13. What is memory mapped /Otechnique?
In Memory mapped IO the same set of instructions are used for
both memory and I/) devices. Hence we manipulate /O same as memory
and both have same address space, due to which addressing capability of
memory become less because some part is occupicd by the /O. All the
buses are common to both memory and /O.
5.20 Computer Orga
14. List the interrupts and their call locations of 8085.
Location from which the next instruction
Interrupts
is picked up (vectored location)
TRAP 0024

RST S.S 002C

RST 6.5 0034

RST 7.5 003C

DESCRIPTIVE QUESTIONS
PART - B (5 MARKS)
1. Explain the composition of aCPU with a diagram.
2. List the salient features of 8085.
3 Discuss the functions of ALE, IO/M,RD, WR,READY signals of
8085.
4. Explain program counter and stack pointer in 8085.
5. Describe the functions of IO/M, INTR, INTA,HOLD,HLDA signals
of 8085.
6. Discuss the functions of data and address buses.
7. Mention the control and status signals involved in I/O read
operation.
8. Write an 8085-AL program for 8 bit subtraction using conmplements
9. What are vectored interrupts? Explain in detail.
10. Explain the difference between the peripheral V0 and memory
mapped lO.

PART -C(0 MARKS)


1. Describe the functional architecture of 8085.
2. Explain
(a) Flag register
(b) Timing and control unit.
3. Explain the pin out of
8085
Computer Organlza

6.40
QUESTIONS AND ANSWERS
MARKS)
PART- A (2

1. What is an instruction? enteredthrough an input devc


pattern function.
Aninstruction is a binary performthat specific
commandthe microprocessor to instruction set of: 8085
the
operations are therein
2. How many
microprocessor? microprocessor.
operations in the 8085
There are 246
cycle?
3. What is instruction processor has to carry out wa
operations that a Each instruction
The sequence of called instruction cycle.
executing theinstructionis cycles.
consists ofa number of machine
of aprocessor
instruction formats with examples.
4. List the different following formats.
intothe
The instruction set is grouped
-MOV C, A
One byte instruction
i.
-MVIA, 39H
ii. Two byte instruction
-JMP 2345H
iii. Three byte instruction
of the 8085 instructions with exampt
categories
5. List out the five
1. Data transfer group-MØV, MVI, LXI.
ii. Arithmetic group -ADD, SUB, INR.
iii. Logical group-ANA, XRA, CMP.
iv. Branch group-JMP, JNZ, CALL. IN, HLI
PUSH, POP.
V. Stack VO and Machine control group -

6. Why do we use XRA A instruction? contents ofthe:


Aum

The XRAA instruction is used to clear the


and store the value 00H. structu
interrupt
7. List the four instructions which control the
the 8085 mieroprocessor?
DI(Disable Interrupts) EI(Enable Interrupts) KI
Mask) SIM(Set Interrupt Mask).
B085Instruction Set 6.41

Statethe difference betweena JMP instruction and CALL


8. instruction.

AJMP instruction permanently changes the program counter. ACALL


instruction leaves information on the stack so that the original program
Cxecution scqucnce can be resumed.

9. Whatis the purpose of the /O instructions IN andOUT?


The IN instruction is uscd to move data from an VÎ port into
the accumulator. The OUT instruction is used to move data from the
accumulator to an I/O port.
10. What is the difference between the shift and rotate instructions?
Arotate instruction is a closed loop instruction. That is, the data
moved out at one end is put back in at the other end. The shift instruction
loses the data that is moved out of the last bit locations.

11. What is the machine controloperations used in 8085


microprocessor?
HLT: Halt and NOP: No Operation
12. Compare RET and POP instructions.

S.NO RET POP


RET transfers the contents of POP transfers the contents of the
the top two locations of the top two locations of the stack to
stack to the PC. the specified register pair.
2 When RET is executed the SP When POP is executed the SP is
is incremented by two. incremented by two.
Has & conditional RETURN
No conditional POP instructions.
instructions.
13.
S.No
Compare CALL and PUSH instructions.
CALL PUSH
When CALL 0s executed the With PUSH the program uses the
microprocessor
Stores the 16-bitautomatically
address of the
instruction to save the contents

instruction next to CALL on of the register pair on the stack.


the stack.
6.42
Computer Organizatlon
DESCRIPTIVE QUESTIONS
PART - B (5 MARKS)
1. Explain Instruction
Format of 8085.
2. Write short notes on the
instruction set.
logical and branching operation of 8085
3. List down the
4.
various forms of branching type instructions in 808s
How are the
5. instructions of 8085 classified? Explain.
6.
Differentiate the functions of CMP B and SUB B
Explain the L/O instructions of 8085 instructions.
7.
Explain the arithmetic group with examples.
8.
Explain RIM and SIM instructions in 8085
instructions in 8085. microprocessor.
PART - C (10
Data transferMARKS)
1.
Write detailed note on
8085. and
2.
Explain the logical group of Arithmetic instructions in
3.
Explain the Stack group of
What are the five
instruction in 8085
in 8085. microprocessor.
4.
instructions
instructions? Givefunctional
example forcategories of 8085
explain.microprocessor
each and
Programmingin8085
7.47
oUESTIONS AND ANSWERS
PART -A (2 MARKS)
LWhat is the use of DAD instruction?
DAD instruction is used to add two l6 bit
numbers. Here the contents
of the HL register are added with DE or BC pair and the
result is stored in
HL pair.
Example :
DAD D and DAD B
2. Give instructions to clear the accumulator?
XRAA
MVIA 00h
MVIA FFH
> INRA

S. Write the instruction to find the 1's complement of a number.


CMA- complement accumulator.
Write a program to find the 2's complement of anumber.
MVIA 05h
CMA
INRA
J. What are mnemonics?
It is a 3 letter or 4letter word used to specify the operation in 8085
Instruction set.
For example, in 8085 instructiion set
The
?MVI is a mnemonic which stands for move immediate,
specified data in the instruction is moved to a specified register in the
instruction.
o LDAXr is a mnemonic which stands for Load accumulator from
the inemory location specified in the register pair(r,).
7.48 Computer Organizalon
6. How does the microprocessor differentiate between data and
instruetion?
When the first machine code of an instruction is fetched and
decodet
in the instruction register, the microprocessor recognizes the nunmherf
bytes required to fetch the entire instruction. For example MVI B,
Data,
the second byte is always considered as data. Ifthe data byte is omited u
mistake whatever is in that memory location willbe considered as data ant
the byte after the "data" willbe treated as the next instruction.

DESCRIPTIVE QUESTIONS

PART - B (5MARKS)
1. Write an assembly language program to add two &bit numbers.
2. Write an assembly language program to subtract two 8 bit numbers.
3. Write an assembly language program to add two BCD numbers.
4. Write an assembly language program to subtract twoBCD
numbers.
5. Write an assembly language program to add two 16 bit numbers.
6. Write an assembly language program to multiply two 8 bit numbers.
7. Write an assembly language program to divide two 8 bit numbers

PART - C(10 MARKS)


byte
aditon
1. Write an assembly language program to perform multi
2. Write an assembly language program to perform multi byte
subtraction.
3. Write an assembly language programto sort n numbers. snwlke
and
4. Write an assembly language program to find the largest
of n numbers.
5. Write an assembly language
program to
i. Reverse the given set of numbers.
i. To move block of datafrom one locationto another
2.12
Computer Organizaton
QUESTIONS AND ANSWERS
PART - A (2 MARKS)
1. What do you mean by interrupts? When does
the 8085 processor
checks for an interrupt?
Interrupt is the method of creating a temporary halt during
execution and allows peripheral devices to access the program
microprocessor responds to that interrupt with an 1SRmicroprocessor. The
(Interrupt Service
Routine), which is a short program to instruct the
to handle the interrupt. In the second T nicroprocessor on how
-state of the last machine cycle of
every instruction,the 8085 processor checks
is made or not. whether an interrupt request
2. What is interrupt acknowledge cycle?
The interrupt acknowlcdge cycle is a
8085 processor to get the address of the machine cycle executed by
toservice the interrupt device. interrupt seryice routine in-order
3. How the
interruptsare affected by system reset?
Whenever the processor or system is reseted, all the
TRAP are disabled. In order to enable the interrupts except
be executed after á
reset. interrupts, EI instruction has to
4. What is Software
interrupt?
The Software interrupts are
are inserted at desired program instructions. These instructions
locations a program. While running aj program,
software interrupt instruction
in
is encountered then the
interrupt service routine. processor executes an
5. What is
If an
Hardware interrupt?
interrupt is initiated in aprocessor by antappropriate:signalatthe
interrupt pin, then the interrupt is called
6. What is thedifference Hardware interrupt.
between Hardware and Software
interrupt?
TheSoftware
Hardware interrupt isinterrupt is initiated by the the
main program, but
In 8085, the initiated by an external device.
Software interrupt
Hardware interrupt except TRAP can be cannot be disabled or maskedbutthe

disabled or masked.
Interrupts 9.13
vectored and Non- Vectored interrupt?
7. What is
When an interrupt is accepted, if the processor control branches to
specificaddress defined by the manufacturer then the interrupt is called
a
vectored interrupt.
In Non-vectored interrupt there is no specific address for storing the
interrupt service routine. Hence the interrupted device should give the
routine.,
address of the interrupt service
e List the Software and Hardware interrupts of 8085?
i Software interrupts: RST 0, RSTI, RST 2,RST 3, RST 4, RST 5,RST
6and RST 7.
i Hardware interrupts: TRAP, RST 7.5, RST 6.5,RST 5.5 and INTR.
9. What is TRAP?

The TRAP is non-maskable interrupt of 8085. It is not disabled by


processor reset or after re-organizationof interrupt.
10. What is masking and why it is required?
Masking is preventing the interrupt from disturbing the curent
program execution.
When the processor is performing an important job (process) and
1the process should not be interrupted then all the interrupts should be
masked or disabled.
In processor with multiple interrupts, the lower priority interruptcan
G masked so as to prevent it from interrupting, the execution of interrupt
service routine of higher priority
11. When
interrupt.
does the 8085 processor accept hardware interrupt?
The
state of lastproocessor keeps on checking the interrupt pins at the second T
valid Machine cycle of every instruction. If the processor finds a
the iprocessor
nterrupt signal and if the interrupt is unmasked and enabled then
açcepts the interrupt. The acceptance of the interrupt is
acknowkeWhat dged byfunction
12. is the
sending an O0A signal to the interrupted device.
performed by DI instruction?
The function of DI instruction is to enable the disabled interupt
system.
Computer Organization
I3 Whendees the S085 proessor disable the interrupt system?
The interrpts of 8O8S except TRAP are disabled after anyone of the
following operations.
i Executing El instrction.
i. Systemor procesot reset.
iiL After reonganization (acceptance) of an interrupt.
14. What is the function performed by El instruction?
The El instruction can be used to enable the interrupts after disabling.
IS. How the vector address is generated for the INTR interrupt of
sOSs?
For the interrupt INTR, the interrupting device has to place cither
RST opcode or CALL opcode followed by l6-bit address. RST opcode is
placed then the corresponding vector address is generated by the processo.
In case of CALL opcode the given l6-bit address will be the vector addres.
16. What are the 6 pins used in 8085 for interrupts?
There are 6 pins available in 8085 for interrupt: TRAP, RST 7.5, RST
6.5,RST 5.5, INTR and INTA.

DESCRIPTIVE QUESTIONS
PART - B (5 MARKS)
1. Explain the multiple interrupts and priorities of 8085
microprocessor.
2. Explain the Vectored interrupts of 8085 microprocessor.
3. Differentiate between hardware and software interrupts.
4. Explain RIM and SIM instructions,.
PART - C(0 MARKS)
I. Explain the simple polled and interrupt controlled datatranster.
in
8085
2. Whatis an interrupt? List the various interrupts available
and their priorities. What is the use of TRAP in 8085?

You might also like