Premium Essay

Nt1310 Unit 5 Architecture Analysis

Submitted By
Words 1090
Pages 5
ANS1. : ARCHITECTURE OF 8085:

8085 is 8 bit clock driven device which is used to perform computing functions with the help of instructions specified in memeory,

providing timing signals to yhe peripherals.

It is based on VLSI technique.

Is has 16 address lines hence it is capable of addressing 64k memory.

And 8085 has 8 bit data lines.

It operates on 3.14 Mhz frequency

And power supply of +5v required.

8085 architecture includes following:

1.Accumulator: It is 8 bit register.It is helpful in performing logical and arithmatical operation.

All the data is stored in accumulator and result of the data is also stored in accumulator.

2.Flip Flop register:

It is 8 bit register.

But it uses only 5 flags for the status of the program …show more content…
2005 ADD B // This instruction will add the data

2006 STA 2053 // Store the data in given location

2009 HLT // Terminate the program.

ANS1. : ARCHITECTURE OF 8085:

8085 is 8 bit clock driven device which is used to perform computing functions with the help of instructions specified in memeory,

providing timing signals to yhe peripherals.

It is based on VLSI technique.

Is has 16 address lines hence it is capable of addressing 64k memory.

And 8085 has 8 bit data lines.

It operates on 3.14 Mhz frequency

And power supply of +5v

Similar Documents

Premium Essay

Test

...ITT Technical Institute IS3340 Windows Security Onsite Course SYLLABUS Credit hours: 4.5 Contact/Instructional hours: 60 (30 Theory Hours, 30 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisite: NT2580 Introduction to Information Security or equivalent Course Description: This course examines security implementations for a variety of Windows platforms and applications. Areas of study include analysis of the security architecture of Windows systems. Students will identify and examine security risks and apply tools and methods to address security issues in the Windows environment. Windows Security Syllabus Where Does This Course Belong? This course is required for the Bachelor of Science in Information Systems Security program. This program covers the following core areas:    Foundational Courses Technical Courses BSISS Project The following diagram demonstrates how this course fits in the program:    IS4799 NT2799 IS4670 ISC Capstone Project Capstone ProjectCybercrime Forensics NSA    NT2580 NT2670  Introduction to  Information Security IS4680 IS4560 NT2580 NT2670 Email and Web Services Hacking and Introduction to  Security Auditing for Compliance Countermeasures Information Security Email and Web Services      NT1230 NT1330 Client-Server Client-Server  Networking I Networking II  IS3230 IS3350 NT1230 NT1330  Issues Client-Server Client-Server  SecurityContext in Legal Access Security Networking I Networking II   NT1110...

Words: 2305 - Pages: 10

Premium Essay

Nt1230 Syllabus

...to Networking or equivalent Course Description: This course introduces operating principles for the client-server based networking systems. Students will examine processes and procedures involving the installation, configuration, maintanence, troublshooting and routine adminstrative tasks of popular desktop operating system(s) for standalone and network client computers, and related aspects of typical network server functions. Client-Server Networking I Syllabus Where Does This Course Belong? 1st QTR GS1140 NT1110 GS1145 Problem Solving Theory Computer Structure and Logic Strategies for the Technical Professional 2nd QTR NT1210 Introduction to Networking NT1230 Client-Server Networking I MA1210 College Mathematics I 3rd QTR NT1310 NT1330 MA1310 4th QTR PT1420 NT1430 EN1320 5th QTR PT2520 NT2580 EN1420 6th QTR NT2640 NT2670 CO2520 7th QTR NT2799 SP2750 Physical Networking Client-Server Networking II College Mathematics II Introduction to Programming Linux Networking Composition I Database Concepts Introduction to Information Security Composition II IP Networking Email and Web Services Communications Network Systems Administration Capstone Project Group Theory The follow diagram indicates how this course relates to other courses in the NSA program: 1 Date: 8/31/2012 Client-Server Networking I Syllabus NT2799 NSA Capstone Project NT2580 Introduction to Information Security NT2670 Email and Web Services NT2640 IP Networking PT2520 Database...

Words: 1834 - Pages: 8