1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
valina [46]
2 years ago
15

Explain in detail why intel 8086 segments are 64 KB in size?

Computers and Technology
1 answer:
gtnhenbr [62]2 years ago
8 0

Answer:

Explanation:

phân đoạn bộ nhớ x86 đề cập đến việc thực hiện phân đoạn bộ nhớ trong Intel x86 máy vi tính bản hướng dẫn kiến ​​trúc. Phân đoạn đã được giới thiệu trên Intel 8086 vào năm 1978 như một cách cho phép các chương trình có địa chỉ hơn 64 KB (65,536byte) của bộ nhớ. Các Intel 80286 đã giới thiệu phiên bản thứ hai của phân đoạn vào năm 1982 bổ sung hỗ trợ cho bộ nhớ ảo và bảo vệ bộ nhớ. Tại thời điểm này, mô hình ban đầu đã được đổi tên chế độ thựcvà phiên bản mới được đặt tên chế độ bảo vệ. Các x86-64 kiến trúc, được giới thiệu vào năm 2003, phần lớn đã bỏ hỗ trợ phân đoạn ở chế độ 64-bit.

Ở cả chế độ thực và chế độ được bảo vệ, hệ thống sử dụng 16-bit đăng ký phân đoạn để lấy địa chỉ bộ nhớ thực. Ở chế độ thực, các thanh ghi CS, DS, SS và ES trỏ đến chương trình đang được sử dụng đoạn mã (CS), hiện tại phân đoạn dữ liệu (DS), hiện tại phân đoạn ngăn xếp (SS) và một thêm phân đoạn do người lập trình xác định (ES). Các Intel 80386, được giới thiệu vào năm 1985, bổ sung thêm hai thanh ghi phân đoạn, FS và GS, không có mục đích sử dụng cụ thể nào được xác định bởi phần cứng. Cách thức sử dụng các thanh ghi phân đoạn khác nhau giữa hai chế độ.[1]

Việc lựa chọn phân đoạn thường được bộ xử lý mặc định theo chức năng đang được thực thi. Các hướng dẫn luôn được tìm nạp từ đoạn mã. Mọi lần đẩy hoặc bật ngăn xếp hoặc bất kỳ tham chiếu dữ liệu nào tham chiếu đến ngăn xếp đều sử dụng phân đoạn ngăn xếp. Tất cả các tham chiếu khác đến dữ liệu đều sử dụng phân đoạn dữ liệu. Phân đoạn bổ sung là đích mặc định cho các hoạt động chuỗi (ví dụ: MOVS hoặc CMPS). FS và GS không có mục đích sử dụng do phần cứng chỉ định. Định dạng hướng dẫn cho phép một tùy chọn tiền tố phân đoạn byte có thể được sử dụng để ghi đè phân đoạn mặc định cho các hướng dẫn đã chọn nếu muốn

You might be interested in
Which of the following shows the correct order of inventions that helped the first computers make calculations?
castortr0y [4]

Answer:

1st - Mechanical Relays, 2nd - Vacuum tubes, 3rd - Transistors

Explanation:

<em>From Tubes...</em>

<em />

The three main components of a basic triode vacuum tube.

The type of tube used in early computers was called a triode and was invented by Lee De Forest in 1906. It consists of a cathode and a plate, separated by a control grid, suspended in a glass vacuum tube. The cathode is heated by a red-hot electric filament, which causes it to emit electrons that are attracted to the plate. The control grid in the middle can control this flow of electrons. By making it negative, you cause the electrons to be repelled back to the cathode; by making it positive, you cause them to be attracted toward the plate. Thus, by controlling the grid current, you can control the on/off output of the plate.

Unfortunately, the tube was inefficient as a switch. It consumed a great deal of electrical power and gave off enormous heat—a significant problem in the earlier systems. Primarily because of the heat they generated, tubes were notoriously unreliable—in larger systems, one failed every couple of hours or so.

<em>...To Transistors</em>

<em />

The invention of the transistor was one of the most important developments leading to the personal computer revolution.The transistor was invented in 1947 and announced in 1948 by Bell Laboratory engineers John Bardeen and Walter Brattain. Bell associate William Shockley invented the junction transistor a few months later, and all three jointly shared the Nobel Prize in Physics in 1956 for inventing the transistor. The transistor, which essentially functions as a solid-state electronic switch, replaced the less-suitable vacuum tube. Because the transistor was so much smaller and consumed significantly less power, a computer system built with transistors was also much smaller, faster, and more efficient than a computer system built with vacuum tubes.

The conversion from tubes to transistors began the trend toward miniaturization that continues to this day. Today’s small laptop PC (or netbook, if you prefer) and even Tablet PC systems, which run on batteries, have more computing power than many earlier systems that filled rooms and consumed huge amounts of electrical power.

8 0
3 years ago
Hewo everyone look at me I look ugly don't I<br>​
Gwar [14]

Answer:

Na, you look stunning...!!!! UwU

4 0
3 years ago
Read 2 more answers
According to social penetration theory, the __________ dimension concerns the number of topics disclosed whereas the __________
dimulka [17.4K]
I am definitely sure that complete statement looks like this: According to social penetration theory, the breadth dimension concerns the number of topics disclosed whereas the depth dimension concerns the level of detail in topics disclosed. <span>Social penetration theory explains the differences between various levels of </span><span>interpersonal communication</span> in relation to the depth of interpersonal relationships.
7 0
3 years ago
A barcode is a Select one: a. coded instruction needed to control computer hardware. b. confidential computer code required by H
kolezko [41]

A bar code is a  series of bars and spaces representing numbers or letters.

<h3><u>Explanation:</u></h3>

A method that is used for the purpose of representing a data in the form of a picture or image that can be easily understood by the machine. It consists of many lines that has different widths and spaces. They either represent the letter or a number. These are mainly used for the representation of data in the machine understandable format.

For example an UPC-A bar codes has 12 numbers. The numbering system is represented by the first digit. The manufacturer will be represented by the next five digits in it. The product will be represented by the five digits following it. Check digit is represented in the last digit.

5 0
3 years ago
Does a triangle with sides of lengths 1.5 ft, 2.5 ft, and 2 ft form a right triangle? How do you know?
timama [110]

Answer:

Yes, the side lengths of 1.5, 2.5, and 2 ft form a right triangle.

Explanation:

Before we solve this problem, we need to know a couple of things.

In a right triangle, you have two legs and a diagonal line that goes from one leg to the other or from one side to the other. This line is called the hypotenuse. It is the longest side of a right triangle. This length can be calculated by using a special formula that is over a thousand years old.

The formula is called the Pythagorean Theorem.

The formula states that if you square one leg and the other leg and add it up. You get the side of hypotenuse which is squared as well.

Here it is in simple terms: a^{2} +b^{2} =c^{2}.

a and b are your two legs.

C is your hypotenuse.

In this case 1.5 and 2 are your legs and 2.5 is your hypotenuse since it is the longest side.

Before we calculate, there is a converse to the Pythagorean Theorem.

If a^{2} +b^{2} \neq c^{2}, then it is not a right triangle.

Lets make 1.5 for a

and 2 for b.

We know 2.5 is for c.

Here it is.

1.5^{2} +2^{2} =2.5^{2}. The / means it is a fraction.

1.5 squared is 9/4 and 2 squared is 4. Add 4 and 9/4 and you get 25/4 squared. Take the square root of 25/4 and you get 5/2.

5/2 is equal to 2.5, so the Pythagorean Theorem applies to this triangle. Therefore, these side lengths do form a right triangle.

Hope this helps!

3 0
3 years ago
Other questions:
  • What is requirement analysis
    8·1 answer
  • A DSLR camera is made up of two parts. They are
    13·2 answers
  • What are the pros and cons of editorial anonymity in Wikipedia
    10·2 answers
  • Which of these forms of multimedia would most likely contain both music and text:
    14·1 answer
  • In this problem, we explore some of the properties of the CRC. For the generator G (=1001) given in Section 5.2.3, answer the fo
    14·1 answer
  • Which of the following would an interactive media professional most likely need? A.a high school diploma
    15·1 answer
  • Suppose a host has a 1-MB file that is to be sent to another host. The file takes 1 second of CPU time to compress 50%, or 2 sec
    12·1 answer
  • When using the Common Internet File System (CIFS), which security model does not require a password to be set for the file share
    7·1 answer
  • The bubble sort algorithm sorts using what technique?
    14·1 answer
  • ________ technologies are technologies that enable the incremental improvement of products and services.
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!