Preview

railway system project in dbms

Good Essays
Open Document
Open Document
3241 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
railway system project in dbms
8085 INSTRUCTION SET
INSTRUCTION DETAILS
DATA TRANSFER INSTRUCTIONS
Opcode

Operand

Copy from source to destination
MOV
Rd, Rs
M, Rs
Rd, M

Move immediate 8-bit
MVI
Rd, data
M, data

Load accumulator
LDA
16-bit address

Load accumulator indirect
LDAX
B/D Reg. pair

Load register pair immediate
LXI
Reg. pair, 16-bit data

Load H and L registers direct
LHLD
16-bit address

8085 Instruction Set

Description
This instruction copies the contents of the source register into the destination register; the contents of the source register are not altered. If one of the operands is a memory location, its location is specified by the contents of the HL registers.
Example: MOV B, C or MOV B, M
The 8-bit data is stored in the destination register or memory. If the operand is a memory location, its location is specified by the contents of the HL registers.
Example: MVI B, 57 or MVI M, 57
The contents of a memory location, specified by a
16-bit address in the operand, are copied to the accumulator.
The contents of the source are not altered.
Example: LDA 2034 or LDA XYZ
The contents of the designated register pair point to a memory location. This instruction copies the contents of that memory location into the accumulator. The contents of either the register pair or the memory location are not altered.
Example: LDAX B
The instruction loads 16-bit data in the register pair designated in the operand.
Example: LXI H, 2034
The instruction copies the contents of the memory location pointed out by the 16-bit address into register L and copies the contents of the next memory location into register H. The contents of source memory locations are not altered.
Example: LHLD 2040

Page 1

Store accumulator direct
STA
16-bit address

Store accumulator indirect
STAX
Reg. pair

Store H and L registers direct
SHLD
16-bit address

Exchange H and L with D and E
XCHG
none

The contents of the accumulator are copied

You May Also Find These Documents Helpful

  • Satisfactory Essays

    SD1230 Lab 1

    • 239 Words
    • 2 Pages

    2. What type of instruction is used to execute different code based on a condition? -Jumps…

    • 239 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    A. the CPU tells the RAM which address holds the data that the CPU wants to read…

    • 957 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Nt1210 Chapter 1 Review

    • 1315 Words
    • 6 Pages

    A.The CPU tells the RAM which address holds data that the CPU wants to read.…

    • 1315 Words
    • 6 Pages
    Good Essays
  • Satisfactory Essays

    Cis 207 Week 2/3 Quiz

    • 383 Words
    • 2 Pages

    Registers are used to store data in RAM, the control unit, and the arithmetic logic unit. True…

    • 383 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    CS305 Final Exam Questions

    • 1044 Words
    • 6 Pages

    a. It decrements the stack pointer (by 2 or 4) and copies the operand into the stack at the location pointed to by the stack pointer.…

    • 1044 Words
    • 6 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Sheet01

    • 1045 Words
    • 5 Pages

    4. What is the result of the following code and where is it kept? LDAA #$15 ADDA #$13 5. Which of the following instructions is (are) illegal? a- LDAA #500 b- LDAA #50 c- LDAA #00 d- LDAA #$255 e- LDAA #$25 f- LDAA #$F5 g- ADDA mybyte , #$25 6. Which of the following instructions is (are) illegal? a- ADDA #$300 b- ADDA #$50 c- ADDA #$500 d- ADDA #$255 e- ADDA #12 f- ADDA#$F5 g- ADDA #$25 7. 8. 9. 10. Show a simple code to load values 30H and 97H into locations 805H and 806H, respectively. Show a simple code to load value 55H into locations 300H and 308H. Show a simple code to load value 5FH into Port B. Which of the following is an invalid use of the immediate addressing mode? a- LDDA #$24 b- LDAA $30 c- LDAA #$60…

    • 1045 Words
    • 5 Pages
    Satisfactory Essays
  • Powerful Essays

    As an accountant, it is critical to say that many of the possible complications that arise in this case are due to feeble project management and monitoring issues. After analyzing your transcript it became visible that an apparent organizational structure ceases to exist. Examining the relationship with your business partner and the staff reaction to this matter, it is recommended that authority should be centralized and responsibilities should be delegated with accountability. Furthermore, direct reporting approach should be taken to ensure decisive information is available in an orderly manner. To take it a step further, it is advisable that formal code of conduct and policy and procedure manual is present to explain proper business practices…

    • 1287 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    Homework CH 1 Java

    • 723 Words
    • 5 Pages

    2. Languages that let you use a vocabulary of descriptive terms, such as read, write, or…

    • 723 Words
    • 5 Pages
    Satisfactory Essays
  • Powerful Essays

    Working with Database Design

    • 2266 Words
    • 10 Pages

    Various other aspects and needed requirements are to be introduced and implemented into Jim and Tim’s new ACCESS™2010® Relational Database Management Systems from concepts, theories, analysis, import/export, referential integrity, primary/foreign/ non keys, data-modeling, and normalization. Needs to assure value, structure, relationship, and integrity are implemented in the relational database management systems (RDBMS) for the explicit users ability to flawless query information/data which allows by logical authentication to request, add, modify, and view correct, understandable intellectual organizational RDBS while using the export and import functions of ACCESS™2010®, EXCEL 2010, and MS SQL SERVER. One issue with almost all software (any type) is because humans write the code for software and on the other hand other humans reverse engineer written software finding weakness, and design script or bot code, which will become a threat agent in a form of a Trojan-horse, viruses, Dos, DDoS, and other forms of illegal hacking to steal intellectual data. A suggestion is using a specific tool called CAPTCHA “(Completely Automated Public Turing Test to tell Computers and Humans apart),” also known as “Gausebeck-Levchin Test.” This is to create anti-fraud detection, which prevents a script or a bot from being able to complete authentication. Although, this tool used in Pay-Pal transactions, its use for on-line of other types of internet web transactions to assure a live human interaction. This tool implementation into the accounting section between customers to RoboBoys and even between Jim, Tim, and vendors, which helps prevent the…

    • 2266 Words
    • 10 Pages
    Powerful Essays
  • Better Essays

    Rodrigue, Dr. Jean-Paul (2014). UPS: Logistics management of distribution networks. The Geography of Transport Systems. Retrieved March 18, 2014 from…

    • 1190 Words
    • 4 Pages
    Better Essays
  • Powerful Essays

    The complexity of natural history collection information and similar information within the scope of biodiversity informatics poses significant challenges for effective long term stewardship of that information in electronic form. This paper discusses the principles of good relational database design, how to apply those principles in the practical implementation of databases, and examines how good database design is essential for long term stewardship of biodiversity information. Good design and implementation principles are illustrated with examples from the realm of biodiversity information, including an examination of the costs and benefits of different ways of storing hierarchical information in relational databases. This paper also discusses typical problems present in legacy data, how they are characteristic of efforts to handle complex information in simple databases, and methods for handling those data during data migration.…

    • 38667 Words
    • 155 Pages
    Powerful Essays
  • Good Essays

    Database Systems

    • 817 Words
    • 4 Pages

    The entity-relationship model (or ER model) is a way of graphically representing the logical relationships of entities (or objects) in order to create a database.…

    • 817 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Database Design and Development | International Institute Of Computer Professionals | Francisco Lezama | Student ID: 00132002 | March 2013 NCC Education - Level 5 Diploma in Business Information Technology School of Accounting and Management, Trinidad, W.I. Table of Contents Task 1 1 Entity Relationship Diagram 1 Normalization 4 Data Dictionary 6 Task 2 10 2.1 Implementation and Data 10 2.2 Inserting data into tables for Members and Countries 16 2.3 Inserting Data for the Organizations; Assign Members to Organizations 18 2.4 Data on Qualification and Topic 20 2.5 Query – Select all the Organizations and Members 23 2.6 Query – Selects all Member’s Qualifications and Topics 24 2.7 Query – Selects all Interest Groups 26 2.8 Query – Show All Countries and The Members That Reside In Those Countries 26 Task 3 27 Derived Data 27 Task 4 29 Evaluation 29 Bibliography 30 Task 1 Entity Relationship Diagram List of Entities 1.…

    • 2564 Words
    • 11 Pages
    Powerful Essays
  • Powerful Essays

    DBMS

    • 3523 Words
    • 15 Pages

    Structural metadata is about the design and specification of data structures and is more properly called "data about the containers of data".…

    • 3523 Words
    • 15 Pages
    Powerful Essays
  • Powerful Essays

    Electronc Voting Machine

    • 13812 Words
    • 56 Pages

    List of Contents Abstract 1 1. Background 2 2. Microcontroller 9 2.1 Introduction 9 2.2 History 9 2.3 Definition of a Microcontroller 11 2.4 Microcontrollers vs Microprocessors 12 2.5 Memory Unit 13 2.6 Central Processing Unit 14 2.7 Bus 15 2.8 Input Output Unit 16 2.9 Serial Communication 16 2.10 Timer Unit 17 2.11 Watch Dog 18 2.12 Analog to Digital Converter 19 3. Introduction to EEPROM 21 3.1 EEPROM 21 3.2 Application/ Operation of EEPROM 21 4.…

    • 13812 Words
    • 56 Pages
    Powerful Essays

Related Topics