1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Masja [62]
3 years ago
13

What is an 8086 microprocessor used for

Computers and Technology
1 answer:
Liula [17]3 years ago
7 0
A sixteen bit microprocessor chip used in early IBM PCs. The Intel 8088 was a version with an eight-bit externaldata bus.

The Intel 8086 was based on the design of the Intel 8080 <span>and </span>Intel 8085 (it was source compatible with the 8080)with a similar register set, but was expanded to 16 bits. The Bus Interface Unit fed the instruction stream to theExecution Unit through a 6 byte prefetch queue, so fetch and execution were concurrent - a primitive form ofpipelining (8086 instructions varied from 1 to 4 bytes).

It featured four 16-bit general registers, which could also be accessed as eight 8-bit registers, and four 16-bit indexregisters (including the stack pointer). The data registers were often used implicitly by instructions, complicatingregister allocation for temporary values. It featured 64K 8-bit I/O (or 32K 16 bit) ports and fixed vectored interrupts.There were also four segment registers that could be set from index registers.

The segment registers allowed the CPU to access 1 meg of memory in an odd way. Rather than just supplyingmissing bytes, as most segmented processors, the 8086 actually shifted the segment registers left 4 bits and addedit to the address. As a result, segments overlapped, and it was possible to have two pointers with the same valuepoint to two different memory locations, or two pointers with different values pointing to the same location. Mostpeople consider this a brain damaged design.

Although this was largely acceptable for assembly language, where control of the segments was complete (it couldeven be useful then), in higher level languages it caused constant confusion (e.g. near/far pointers). Even worse, thismade expanding the address space to more than 1 meg difficult. A later version, the Intel 80386, expanded thedesign to 32 bits, and "fixed" the segmentation, but required extra modes (suppressing the new features) forcompatibility, and retains the awkward architecture. In fact, with the right assembler, code written for the 8008 canstill be run on the most <span>recent </span>Intel 486.

The Intel 80386 added new op codes in a kludgy fashion similar to the Zilog Z80 and Zilog Z280. The Intel 486added full pipelines, and clock doubling (like <span>the </span>Zilog Z280).

So why did IBM chose the 8086 series when most of the alternatives were so much better? Apparently IBM's own engineers wanted to use the Motorola 68000, and it was used later in the forgotten IBM Instruments 9000 Laboratory Computer, but IBM already had rights to manufacture the 8086, in exchange for giving Intel the rights to its bubble memory<span> designs.</span> Apparently IBM was using 8086s in the IBM Displaywriter word processor.

Other factors were the 8-bit Intel 8088 version, which could use existing Intel 8085-type components, and allowed the computer to be based on a modified 8085 design. 68000 components were not widely available, though it could useMotorola 6800 components to an <span>extent.
</span>
Hope this helps
You might be interested in
The limit for characters in modern file systems is too small to accommodate keywords in titles
Nata [24]
The limit for file names on modern file systems is usually at least 255 bytes.
3 0
3 years ago
Read 2 more answers
a problem exists when the current condition differs from a desired condition. This idea defines which step in problem-solving?
zhannawk [14.2K]

In algorithm the idea defines a decision box

5 0
3 years ago
Read 2 more answers
A Venn diagram is used to show...?<br> Plz help
11Alexandr11 [23.1K]
Venn diagrams are used to depict set intersections (denoted by an upside-down letter U)......
6 0
3 years ago
Read 2 more answers
Which of the following can technology NOT do?
Gnesinka [82]

make our life problem free

because technology has its negative effects on humanity like Social media and screen time can be bad for mental health

And technology is leading us to sedentary lifestyles

Technology is addictive

Insomnia can be another side effect of digital devices

Instant access to information makes us less self-sufficient

Young people are losing the ability to interact face-to-face

Social media and screen time can be bad for mental health

Young people are losing the ability to interact face-to-face

Relationships can be harmed by too much tech use

4 0
3 years ago
onsider a file system on a disk that has both logical and physical block sizes of 512 bytes. assume that the information about e
anygoal [31]

For three disk allocation strategies (contiguous, linked, and indexed),

in this case, the  physical blocks must be read from the disk are 1,4 and 2 respectively.

In the disk, every block has a sequential number. The majority of disks today do logical I/O in hardware. Physical I/O is seldom ever required of operating systems today.

File access uses virtual I/O. Similar to disk logical I/O is disk virtual I/O. The distinction is that with virtual I/O, as opposed to physical I/O, the blocks that make up a file are

You could want to transfer from virtual block 10 to virtual block 4 in a contiguous allocation. Since the file is contiguous and you are at logical block 10 + Z, block four can be accessed by reading logical block 4 + Z. Without any intermediaries, that can be done directly.

Each block in the linked structure has 511 bytes of data and one byte that serves as an offset to the following block.

Read the first block, determine the offset to the second block, read the second block, determine the offset to the fourth block, and then read the fourth block in order to gain access to the fourth block.

If blocks are numbered from 1 to 10, then then is the "4" correct. The remainder of the solutions, however, make the assumption that block numbering begins at 0, using division to obtain offsets.

Assume there is a contiguous index for the indexed way of allocating files. Once more, it is assumed that each offset in the index is one byte in size.

Let's say that Z serves as the index's origin. Then, the byte at block Z + 3 DIV 512 and the offset at 3 MOD 512 (3 = 4 - 1) make up the entry for block 4 (numbered 1 to 4).

You must read the index and the data block in order to locate the block (2 reads).

To learn more about disk allocation strategies click here:

brainly.com/question/15083707

#SPJ4

4 0
1 year ago
Other questions:
  • Write a program that accepts a phrase of unspecified length on the command line. For example: prompt% letter print Operating Sys
    7·1 answer
  • What contains the computer brain the central processing unit
    8·2 answers
  • What is one advantage of top-down programming design?
    13·2 answers
  • Scientific models can be used for a variety of different purposes. Which of the following statements about scientific models is
    7·2 answers
  • Can anyone help me with getting bash ubuntu on windows setup?
    15·1 answer
  • What do u say to your bf if he says sayy lesssss
    14·2 answers
  • What was the history of technology since the 1980s to now and how is it used in classrooms?.?. PLEASE HELP
    13·1 answer
  • One of the functions of an IDE is to check for: flowchart errors. Syntax errors. memory errors X input and output.​
    12·2 answers
  • Information to develop a project network is collected from the.
    6·1 answer
  • write a recursive bool valued function containsvowel that accepts a string and returns true if the string contains a vowel
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!