1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
strojnjashka [21]
3 years ago
9

In total, how many 8-bit registers are there in the Intel 80x86 CPU design presented in class? Name one of these 8-bit registers

.
Computers and Technology
1 answer:
RSB [31]3 years ago
7 0

Answer:

In general the number of  bit registers in Intel 80x86 CPU design when combined together forms a 16 - bit register

An example of the  -bit registers are AH, AL, BH, BL, CH, CL, DH, and DL

Explanation:

Solution

The 8086 CPU design has a total of eight 8-bit registers and these register can be integrated together to make 16- bit register as well.

The 16-bit data is stored by breaking the data into a low-order byte and high order byte.

The name of the 8 bit registers is shown below:

AH, AL, BH, BL, CH, CL, DH, and DL

You might be interested in
Will mark brainliest! What does this code do? What kind of code is this called?
gavmur [86]

Answer:

lol u can barly call this a code

Explanation:

its just a type error code i think

3 0
3 years ago
22. A<br> allows one computer to input data into another computer.
Katen [24]

Answer:

input device

Explanation:

any hardware device that allows users to enter programs, data, and commands into a computer system

7 0
3 years ago
One advantage of using a security management firm for security monitoring is that it has a high level of expertise.
mote1985 [20]

Answer: True

Explanation: Security management firm is the organization that provides protection to the system, functions,data, people etc of any particular business organization.They are highly capable of the problem avoidance, management of risk and other such issues.

The monitoring of the security done by the people and devices of the security management firm are more reliable and assured due to the expert skill they persist in the security field. Thus, the given statement is true.

8 0
3 years ago
Read 2 more answers
Whats the answer to 9? i really need help with this in the next 20 minutes. ty if u help me!
gayaneshka [121]

Answer:

A very precise number B

Explanation:

Hope you pass

3 0
3 years ago
) Consider the array called myArray declared below that contains and negative integers. Write number of positive integers in the
grigory [225]

Answer:

#include <iostream>

using namespace std;

int main()

{

 

  int arr[]={3,-9,9,33,-4,-5, 100,4,-23};

  int pos;

  int n=sizeof(arr)/sizeof(arr[0]);

  for(int i=0;i<n;i++){

      if(arr[i]>=0){

          pos++;

      }

  }

  cout<<"Number of positive integers is "<<pos<<endl;

  return 0;

}

Explanation:

create the main function in the c++ programming and declare the array with the element. Then, store the size of array by using the formula:

int n=sizeof(arr)/sizeof(arr[0]);

after that, take a for loop for traversing the array and then check condition for positive element using if statement,

condition is array element greater than or equal to zero.

if condition true then increment the count by 1.

this process happen until the condition true

and finally print the count.

6 0
3 years ago
Other questions:
  • Which type of object is used to organize and store data in Microsoft access 2013
    5·2 answers
  • PLEASE HELP!!!!
    7·1 answer
  • Which are characteristics of an effective solution? Choose all that apply. solves the problem in anticipated ways each time resu
    5·1 answer
  • Use HTML to create a web page
    10·1 answer
  • Green field country is planning to conduct a cricket match between two teams A and B. a large crowd is expected in the stadium a
    6·1 answer
  • If all the data in a database is not physically located in one place, it would be a(n _______ database.
    5·1 answer
  • What software maintain and increase the efficiency of a computer system?
    12·1 answer
  • What will happen when you run this program?
    13·1 answer
  • ¿por que hay peligros en internet?
    11·1 answer
  • Which network device sends data to every device that is connected to it?.
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!