Home Blog Page 7

0

501 Which 2 commands shows the Cisco IOS filename?
A.) show IOS
B.) show ver
C.) show flash
D.) show mem
E.) show NVRAM
Ans B C
502 Identify the command to copy a configuration file from a TFTP server to a routers
active configuration?
A.) Router# copy running-config tftp
B.) Router# copy tftp running-config
C.) Router# copy tftp 172.16.0.1 running-config
D.) Router(config)# copy tftp running-config
Ans D
503 Identify the command mode necessary to enter the extended ping command?
A.) Router#
B.) Router>
C.) Router(config)#
D.) Router(ext-ping)#
Ans A
504 Identify the command to configure the router for IGRP autonomous system 100?
A.) Router(config)# router igrp 100
B.) Router> router igrp 100
C.) Router# router igrp 100
D.) Router(config)# router igrp
Ans A
505 Identify the command that forces the router to load into ROM mode upon a reload?
A.) boot system rom
B.) rom boot
C.) boot system flash rom
D.) boot router rom
Ans A
506 Identify the command that specifies Serial 0 in slot 1?
A.) Router(config)# interface serial1/1
B.) Router(config)# interface serial1/0
C.) Router(config)# interface serial0.1
D.) Router(config)# interface serial0/1
Ans B 507 Identify the command to configure the configuration-register?
A.) Router# config-register 0x2102
B.) Router(config)# config-register 0x2102
C.) Router(config-reg)# 0x2102
D.) Router> config-register 0x2102
Ans B
508 Identify the command to disable CDP on an interface?
A.) Router(config-if)# no cdp enable
B.) Router(config-if)# no cdp run
C.) Router# no cdp enable
D.) Router(config-if)# no cdp
Ans A
509 Identify the command that will display the RIP routes entering and leaving the router?
A.) Router(config)# debug ip rip
B.) Route# debug ip rip
C.) Router>debug ip rip
D.) Router# debug rip routes
Ans B
510Identify the prompt displayed if in privileged exec mode?
A.) Router(config)#
B.) Router#
C.) Router>
D.) Router(priv)#
Ans B
CCNA Interview Questions Page 51
<<Previous Next>>
511 ‘Show cdp neighbors detail’ show the following 3 pieces of information?
A.) Hardware platform
B.) Software version
C.) Same as ‘show version’ command
D.) Up to 1 address for each protocol
E.) Non-direct connected routers
Ans A B D
512 Identify the command mode necessary to enter the standard ping command?
A.) Router(config)#
B.) Router>
C.) Router(std-ping)#
D.) Router(config-if)# Ans B
513 Identify the command to run ‘setup’?
A.) Router(config)#setup
B.) Router?setup
C.) Router#setup
D.) Router>setup
Ans C
514 Identify the command that configures serial0 for PPP encapsulation?
A.) Router(config)# encapsulation ppp
B.) Router(config-if)# encapsulation serial ppp
C.) Router(config-if)# encapsulation ppp
D.) Router# encapsulation ppp
Ans C
515 Identify the command to display the status of the Frame Relay virtual circuit?
A.) Router# show frame-relay virtual-circuit
B.) Router(config)# show frame-relay pvc
C.) Router# show frame-relay pvc
D.) Router# show virtual
Ans C
516 Identify the command that disables name-to-address translation?
A.) Router(config-dns)# no ip domain-lookup
B.) Router(config)# no address translation
C.) Router(config)# no ip domain-lookup
D.) Router(config)# ip domain-lookup
Ans C
517 What command will not display the status of to1?
A.) show int to1
B.) show to1
C.) show interface to1
D.) show interface
Ans B
518 Identify the 2 commands to copy a configuration from a TFTP server to RAM?
A.) configure network
B.) configure overwrite
C.) copy backup-config running-config
D.) copy tftp running-config
Ans A D 519 Identify the following command to configure a secret password to ‘cisco’?
A.) Router(config)#enable password cisco secret
B.) Router(config)#enable secret cisco
C.) Router(config)#enable secret password cisco
D.) Router(config)#set secret = cisco
Ans B
520Identify the effect of Ctrl-Z?
A.) Exits back to privileged exec mode
B.) Disconnect from the router
C.) Abort the ping operation
D.) Exits privileged exec mode
Ans A
CCNA Interview Questions Page 52
<<Previous Next>>
521 Given an IPX network with redundant paths, what command will configure load
balancing?
A.) ipx load-balance
B.) ip maximum-paths 2
C.) ipx maximum-paths 2
D.) ipx load-share
Ans C
522 Identify the correct IGRP configuration?
A.) Router# router igrp 100
Router# network 10.0.0.0
B.) Router(config)# router igrp 100
Router(config-router)# network 10.0.0.0
C.) Router(config)# router igrp
Router(config-router)# network 10.0.0.0
Ans B
523 Identify the components in the following command ‘interface serial0/1/1’
A.) Serial interface, port number 0, slot 1, port adapter 1
B.) Serial interface, slot 1, port number 1, port adapter 0
C.) Serial interface, slot 0, port adapter 1, port number 1
Ans C
524 Identify the command to view the configuration-register value?
A.) show register
B.) display config-register
C.) show config D.) show version
Ans D
525 Identify the 2 commands that save the running-config to a TFTP server?
A.) write running tftp
B.) copy running network
C.) copy running tftp
D.) write network
Ans C D
526 Identify the mode reflected by the following prompt ‘Router<boot>’?
A.) Setup
B.) RXBoot
C.) Boot mode
D.) Privileged exec mode
Ans B
527 How do you disable CDP on the entire Router?
A.) Router#no cdp run
B.) Router(config-if)# no cdp enable
C.) Router(config)# no cdp enable
D.) Router(config)# no cdp run
Ans D
528 What command can be used to test IPX connectivity?
A.) Ping 2e.000.0045.8923
B.) Ping 192.168.100.1
C.) Ping ipx 2e.0000.0045.8923
D.) Ipx ping 2e.0000.0045.8923
Ans D
529 Identify the 2 commands that display the clock rate configured on the serial0
interface?
A.) show serial0
B.) show interface serial0
C.) Show clock rate serial 0
D.) show controllers serial 0
E.) show running-config
Ans B D
530 What is the command to copy the IOS image to a TFTP server?
A.) copy flash tftp
B.) copy running-config tftp
C.) copy ios tftp D.) copy startup-config tftp
Ans A
CCNA Interview Questions Page 53
<<Previous Next>>
531 Identify the command that configures the bandwidth to 56K?
A.) Router(config-if)# bandwidth 56000
B.) Router(config-if)# bandwidth 56k
C.) Router(config)# bandwidth 56
D.) Router(config-if)# bandwidth 56
Ans D
532 Identify the command to configure DLCI 100 on an interface e0?
A.) Router(config)# frame-relay local-dlci 100
B.) Router(config)# frame-relay local-dlci 100 int e0
C.) Router(config-if)# frame-relay local-dlci 100
D.) Router(config-if)# frame-relay local-dlci 100 int e0
Ans C
533 Identify the command to configure the router to boot from an alternate IOS located in
flash?
A.) boot system flash IOS.exe
B.) boot system tftp IOS.exe 172.16.5.1
C.) boot system alternate IOS.exe
D.) boot system rom IOS.exe
Ans A
534 Identify the command to configure a description on an interface?
A.) Router> description Finance department
B.) Router(config)# description Finance department
C.) Router(config-if)# description Finance department
D.) Router# description Finance department
Ans C
535 Identify the 2 commands that will display the status and information about interface E0
only?
A.) show interface ethernet E0
B.) show interface E0
C.) show E0
D.) show int E0
E.) show interface
Ans B D 536 In order to configure a Frame Relay subinterface with IP identify the 2 commands that
must be configured on the physical interface?
A.) Router(config-if)# encapsulation frame-relay
B.) Router(config-if)# no ip address
C.) Router(config-if)#encapsulation subinterface frame-relay
D.) Router(config)# subinterface s0 encapsulation frame-relay
Ans A B
537 Identify the command to determine if an IP access-list is grouped on interface e0?
A.) Router(config)# show ip interface e0
B.) Router> show ip interface e0
C.) Router# show interface e0
D.) Router# show ip interface e0
Ans C
538 Identify the keystroke to position the cursor to the beginning of a command line?
A.) Ctrl-A
B.) Ctrl-Ins
C.) Ctrl-B
D.) Ctrl-Z
Ans A
539 Identify the following components of the IPX address 2e.0000.0065.ed43
A.) Not a valid IPX address
B.) Network = 2e, Subnet = 0000, Node = 0065.ed43
C.) Network = 2e.0000, Node = 0065.ed43
D.) Network = 2e, Node = 0000.0065.ed43
Ans D
540 What is the syntax to add a banner to the Cisco router?
A.) motd banner #
B.) banner
C.) banner motd #
D.) banner #
Ans C
CCNA Interview Questions Page 54
<<Previous Next>>
541 What is the command to allow you to type Tokyo instead of the IP address 172.16.30.1
to access a router named Tokyo?
A.) config t, ip host Tokyo 172.16.30.1
B.) config t, ip hostname Tokyo 172.16.30.1
C.) config t, hostname Tokyo 172.16.30.1 D.) config t, ip hostname 172.16.30.1 Tokyo
Ans A
542 How do you disable advanced editing?
A.) terminal editing
B.) terminal no editing
C.) disable editing
D.) no terminal editing
Ans B
543 Which of the following will show an extended access list 150?
A.) sh access-list 150
B.) sh ip int
C.) sh ip access-list
D.) sh access-list 150 extended
Ans A C
544 You have a Class B network address divided into 30 subnets. You will add 25 new
subnets within the next year. You need 600 host IDs for each subnet. Which subnet mask
should you use?
A.) 255.254.0.0
B.) 255.192.0.0
C.) 255.255.252.0
D.) 255.255.248 0
Ans C
545What is the syntax to use to configure the port on a Catalyst 5000 switch?
A.) slot port/type
B.) type slot/port
C.) port slot/type
D.) port type/slot
546 What 3 sources can configuration commands be placed into RAM?
A.) HP Openview
B.) Console
C.) Vterminal
D.) TFTP server
E.) NVRAM
Ans B D E

547 Identify the true statements about the following access list:
Access-list 101 deny tcp 192.10.172.0 0.0.0.255 any eq 23
Access-list 101 permit ip any any
A.) This access list prevents the host 192.10.172.0 from telneting
B.) This access list prevents any telnet traffic from subnet 192.10.172.0/24 C.) This access list filters some telnet access
D.) This access list denies any telnet traffic to subnet 192.10.172.0/24
E.) This access list is invalid
F.) The netmask on the this access list is reversed
Ans B C
548 Given the IPX address 4a.0002.1111.a999, what is the network ID and what is the node
ID?
A.) net 4a host 0002.1111.a999
B.) net a999 node 0002.1111
C.) net 0002.1111.a999 node 4a
D.) net 0002.1111 node a999
Ans A
549 What command do you use to disable domain lookup?
A.) no domain-lookup
B.) domain no-lookup
C.) lookup no-domain
D.) no ip domain-lookup
Ans D
550 Which of the following are valid Cisco encapsulation type names?
A.) arpa = IPX Ethernet
B.) novell-ether = IPX Ethernet_802.3
C.) snap = IEEE 802.2 SNAP on Ethernet, FDDI, and Token Ring
D.) novell-fddi = IPX Fddi_Raw
E.) sap = IEEE 802.2 on Ethernet, FDDI, and Token Ring
F.) hdlc = HDLC on serial interfaces
Ans B C E F

0

402 What is a characteristic of Store and Forward switches?
A.) They work at wire speed.
B.) They are the same as Cut-Through switching in ‘prune’ mode.
C.) They forward based on transport layer info.
D.) They forward the frame before it is completely read.
E.) They increase latency.
Ans E
Store and froward will not forward fragments. The longer the packet, the longer the delay
(latency) in the switch. There is no such thing as ‘prune’ mode.
403 The Internet Protocol (IP) occurs at what layer of the seven layer model?
A.) Physical
B.) Presentation
C.) Network
D.) Datalink
E.) Session
F.) Transport
Ans C
IP is a routed protocol that occurs at layer 3. Other layer 3 protocols include IPX, APPLETALK,
and DECNET.
404 In regards to TCP/IP, which class of address allows for the fewest valid Internet hosts?
A.) D
B.) E
C.) Classes are not used in TCP/IP.
D.) B
E.) C
F.) A
Ans E
Class A = 16.7 million hosts
Class B = 65,534 hosts
Class C = 254 hosts
405 For IPX, what is the DEFAULT Cisco Encapsulation on an Ethernet interface?
A.) novell-ether
B.) gns
C.) snap
D.) arpa
E.) sap F.) dix
Ans A
At the time when Cisco first supported IPX, Novell-Ether (Novell proprietary 802.3 ‘raw’) was the
default frame type for NetWare 2.x and 3.x file servers. Now, Novell has changed their default
frame type to 802.2 (which is really IEEE 802.3 Ethernet, with LLC 802.2 headers).
406 Novell NetWare has an Ethernet frame type called Ethernet_II. What is the matching
Cisco command line keyword for this encapsulation method?
A.) dix
B.) sap
C.) arpa
D.) gns
E.) snap
F.) novell-ether
Ans C
Novell 802.2 = sap (contains 802.2 LLC headers)
Novell 802.3 = novell-ether (NetWare proprietary)
Ethernet_II = arpa (the Internet standard)
snap = snap (field type set to ‘AA’)
407 There are 2 types of PPP authentication supported by the Cisco IOS. What are they?
A.) PAP
B.) PREDICTOR
C.) MD5
D.) CHAP
E.) STACKER
F.) MSCHAP
Ans A D
Router(config-if)#ppp authentication ?
chap Challenge Handshake Authentication Protocol (CHAP)
pap Password Authentication Protocol (PAP)
408 Which of the following are examples of the Transport Layer?
A.) Token Ring
B.) UDP
C.) TCP
D.) IP
E.) SQL
F.) LLC
Ans B C
TCP is connection oriented.
UDP is connectionless.
409 Which of the following describe SMTP?
A.) Used for downloading files to the router.
B.) Used for sending e-mail.
C.) Uses TCP.
D.) Uses UDP. E.) Uses port 25.
F.) Used for managing IP devices.
Ans B C E
Send / Simple (depending on literature) Mail Transport Protocol (SMTP) is used for delivering
mail to other mail servers. It uses port 25, and relies on TCP.
POP 3 (Post Office Protocol version 3) is used for retrieving mail from mail servers to clients.
410 What is the standard ISDN term for a native ISDN modem?
A.) ET
B.) LE
C.) TE2
D.) TE3
E.) TA
Ans E
The marketing term ‘ISDN modem’ was created to help sell the ISDN idea to America. There is no
such thing as an analog modulator demodulator for digital ISDN. The Terminal Adapter (TA)
allows you to connect a PC to a digital ISDN line directly. In the real world, ISDN is digital,
modems are analog.
CCNA Interview Questions Page 41
<<Previous Next>>
411Which of the following are Transport layer protocols?
A.) UDP
B.) TCP
C.) NBP
D.) IP
E.) SPX
Ans A B C E
TCP (Transmission Control Protocol) and UDP are used by TCP/IP.
SPX (Sequenced Packet Exchange) is used with IPX.
NBP (Name Binding Protocol) is used with Appletalk.
412 When determining whether or not to route a LAN segment, which rule of thumb do you
use?
A.) 60/40
B.) 50/50
C.) 80/20
D.) 90/10
E.) 70/30
Ans E
The industry standard rule is 80/20, which means 80% local, 20% over the router.
However, according to Cisco’s online documentation, the answer is 70/30.
This makes sense, considering more and more traffic is starting to go from the desktop to an
ultimate destination outside the local are network, such as the Internet.
413 Which of the following are examples of the Session Layer?A.) TCP
B.) LLC
C.) SQL
D.) NFS
E.) Token Ring
Ans C D
Session layer examples include Netbios Names, SQL, NFS, X Windows, and RPC.
414 Which layer of the 7 layer model provides services to the Application layer over the
Session layer connection?
A.) Transport
B.) Application
C.) Session
D.) Network
E.) Datalink
F.) Presentation
Ans F
The OSI Presentation layer is sandwiched between the Application and Session layers.
415 What type of switching creates variable latency through the switch?
A.) Cut-Through
B.) Inverted
C.) Layer 4
D.) Multiplexed
E.) Store and Forward
Ans E
DEFINITION: Latency = Delay.
Because a store and forward switch reads the whole frame before forwarding,a larger frame
takes longer than a shorter frame.
416 The network portion of an address typically represents a:
A.) Router
B.) Ethernet MAC address.
C.) Computer
D.) Host
E.) Segment
Ans E
Every network segment is represented by a network or subnetwork address.
417 The Physical layer works with which of the following:
A.) Segments
B.) Datagrams
C.) Packets
D.) Bits
E.) Frames
The correct answer(s): D
Physical – bits
Datalink – frames Network – packets
418 Which of the following is an example of the Network Layer?
A.) LLC
B.) SQL
C.) Token Ring
D.) IPX
E.) SPX
Ans D
Most protocol suites have different OSI layer protocols within them. At layer 3,
IP is for TCP/IP. TCP is layer 4.
IPX is for IPX/SPX. SPX is layer 4.
DDP is for Appletalk
419 When setting up a frame-relay network between a Cisco router and a non-Cisco router,
what encapsulation type should you use?
A.) SAP
B.) CISCO
C.) IANA
D.) Apollo
E.) IETF
F.) Q933A
Ans E
The Internet Engineering Task Force (IETF) encapsulation method is the standard encapsulation
type for Frame Relay. Cisco routers default to the CISCO encapsulation method, because it was
created before there was a standard.
420 A user device that connects to a DCE must be which of the following?
A.) DTE
B.) CPE
C.) Demarc
D.) DCE
E.) CO
Ans A
DTE’s are the router side, and receive clocking.
DCE’s are the DSU/CSU side, and provide clocking.
It may or may not be Customer Premises equipment.
CCNA Interview Questions Page 42
<<Previous Next>>
421 What does the parameter — LOG — do on an IPX access list?
A.) The log keyword is not a valid option.
B.) Read the LOG to figure out what traffic to deny.
C.) Logs the creation of the access list.
D.) Logs IPX access control list violations whenever a packet matches a particular access list
entry.
E.) Ensures the IPX protocol places a log in the fireplace. Ans D
Router(config)#access-list 900 deny any ?
log Log matches against this entry
422 Given the global configuration commands:
‘banner motd #’
‘Hello #’
When would the message be displayed?
A.) The message of the day banner shows up before login.
B.) The message of the day banner shows up during logoff.
C.) These commands are not the right syntax for MOTD.
D.) Message of the day banners are displayed upon entering global config mode.
E.) Message of the day banners are not possible.
F.) The message of the day would be, ‘Hello #’
Ans A
Message of the day banners are displayed when a user logs on to the router. In the example
above, the ‘#’ is the unique delimiting (terminating) character. In this way, banners can have
multiple lines, terminated not by hitting <ENTER>, but rather by the chosen (unique) delimiting
character.
423 Which ISDN specification deals with call Setup and Teardown?
A.) Q-Series
B.) J-Series
C.) I- Series
D.) C- Series
E.) F-Series
Ans A
The 2 most important ISDN specifications are Q & I:
Q = Call setup and teardown.
I = Concepts and terminology.
424 All equipment located at the customers site is called:
A.) CPE
B.) CO
C.) DCE
D.) Demarc
E.) DTE
Ans A
CPE – Customer Premise Equipment
425 Which layer allows multiple Ethernet devices to uniquely identify one another on the
Datalink layer?
A.) Transport
B.) Session
C.) Network
D.) Datalink – MAC Sublayer
E.) Datalink – LLC Sublayer Ans D
Ethernet MAC addresses are 48 bits long, and provide a unique hardware identifier.
426 Which of the following are examples of ICMP?
A.) Traceroute
B.) Web Browsing
C.) Ping
D.) Telnet
E.) Destination Unreachable message from a router
F.) Inverse Tunnels
Ans A C E
Ping and Traceroute are used by ICMP for Testing.
Destination Unreachable messages are generated by a router when it does not have a route to
the network.
427 Novell NetWare has an Ethernet frame type called Ethernet_SNAP. What is the
matching Cisco command line keyword for this encapsulation method?
A.) arpa
B.) sap
C.) snap
D.) gns
E.) dix
F.) novell-ether
Ans C
Novell 802.2 = sap (contains 802.2 LLC headers)
Novell 802.3 = novell-ether (NetWare proprietary)
Ethernet_II = arpa (the Internet standard)
snap = snap (field type set to ‘AA’)
428 Given the Novell IPX address 1aceb0b.0000.0c12.3456 which part is the network
portion of the address?
A.) 0000
B.) 1
C.) 3456
D.) 1ace
E.) 0000.0c12.3456
F.) 1aceb0b
Ans F
IPX addresses are 80 bits total: The first section of the address is the network portion, the last 3
groups of numbers are the host.
429 In version 11.2 of the IOS, a Cisco router configured for frame-relay can automatically
detect the LMI type. What is this known as?
A.) Psychic
B.) ESP
C.) Inverse ARP
D.) Hello
E.) Reverse ARP
F.) Autosense Ans F
Autosense allows the router to determine which LMI type the frame relay switch is using. Options
include CISCO, ANSI, and Q933A.
430 What type of Ethernet operation allows only one entity to transmit at a time? For
example, if someone else is transmitting, they must wait.
A.) Full-Duplex
B.) Dual-Duplex
C.) Half-Duplex
D.) Latex
E.) Quarter-Duplex
F.) Suplex
Ans C
Half-Duplex is like a one-lane bridge. If one car is going over the bridge, all other cars must wait
on the other side before crossing
CCNA Interview Questions Page 43
<<Previous Next>>
431 Which of the following are examples of the Application Layer?
A.) LLC
B.) Token Ring
C.) Spreadsheet
D.) TCP
E.) IP
F.) Word Processor
Ans C F
Pretty much any end-user program is an example of the Application Layer.
432 Which technologies listed below help prevent network loops in a switched (bridged)
environment?
A.) Store-and-Forward
B.) IEEE 802.1d
C.) Diikjstra Algorithm
D.) Cut-Through
E.) Spanning Tree Protocol
F.) Routing
Ans B E
The Spanning Tree Protocol (STP) eliminates loops by disabling the port(s) that are causing the
bridging loop. This is also called putting a port into ‘blocking’ mode. The industry standard for STP
is IEEE 802.1d
433 Which OSI Reference Layer controls end-to-end (host to host) communication?
A.) Transport
B.) Physical
C.) Datalink
D.) Network E.) Session
Ans A
The Session layer controls a conversation between applications.
The Transport layer controls communications between hosts.
434 What is the first step in data encapsulation?
A.) User information is converted into data.
B.) Frames are put into bits.
C.) Data is converted into segments.
D.) Segments are converted into datagrams and packets.
E.) Packets are put into logical frame.
Ans A
The Five steps to data encapsulation (IN ORDER):
1) User information is converted into data.
2) Data is converted into segments.
3) Segments are converted into datagrams and packets.
4) Packets are put into logical frame.
5) Frames are put into bits.
435 We know that TCP provides connection oriented services, what else does it provide?
A.) FECN & BECN
B.) Path discovery.
C.) Flow control and error checking.
D.) Name resolution.
E.) File manipulation.
Ans C
The transmission control protocol uses acknowledgements and windowing to handle flow control
and error checking.
436 With distance vector routing protocols, it is never useful to send the same routing
update packet back out the same interface that it was learned. This concept is called
what?
A.) Holddown timers
B.) Poison Reverse
C.) Count to infinity
D.) Split Horizon
E.) Link State
Ans D
Split horizon is the concept of: ‘Don’t tell me what I just told you.’
437 Which of the following are ways to provide login access to a router?
A.) HTTP
B.) Console
C.) Telnet
D.) Aux Port
E.) SNMP
F.) LLC Ans A B C D
You can connect via Aux, Console, Telnet, or HTTP to a Cisco router.
SNMP can support Community (password protected) SET and PUT commands, but you can not
issue a command line interface command with it.
438 What two types of PPP data compression are available using Cisco IOS?
A.) Predictor
B.) DoubleSpace
C.) Stacker
D.) PAP
E.) ZIP
F.) CHAP
Ans A C
Stacker and predictor have similar compression rates.
Stacker uses more CPU, while predictor uses more RAM.
439 In regards to the OSI seven-layer model, at which layer is EBCDIC and ASCII?
A.) Presentation
B.) Application
C.) Transport
D.) Session
E.) Datalink
F.) Network
Ans A
The OSI Presentation layer includes EBCIDIC, ASCII, PICT, GIF, MIDI, and MPEG.
Encryption can also occur at this layer.
440 Which of the following are examples of the Transport Layer?
A.) SQL
B.) UDP
C.) IP
D.) LLC
E.) ARP
Ans B
TCP is connection oriented.
UDP is connectionless.
CCNA Interview Questions Page 44
<<Previous Next>>
441 Given the global configuration command ‘banner motd #7 Hello #’, what do the ‘#’
symbols represent?
A.) Escape sequence to exit the menu.
B.) Nothing, just part of the banner.
C.) Tic Tac Toe Macro.
D.) Delimiting Character
E.) Message border character.
F.) Number of times message to be displayed. Ans D
Delimiting characters allow you to have a message the is more than one line. You simply type as
many lines as you want, ending with the delimiting (terminating) character.
442 There is a process in Frame-Relay where LMI resolves an IP address from a DLCI
number. What is this called?
A.) arp
B.) inverse arp
C.) rarp
D.) automap
E.) reverse arp
F.) arp
Ans B
Inverse Arp maps the Local DLCI number to the remote IP address.
Inverse Arp is a function of LMI.
443 When setting up a WAN network, everything outside of the Demarc is not owned by
the customer. Which of the following are not owned by the customer?
A.) The T1 line.
B.) LAN
C.) The Router
D.) DTE
E.) PC’s
F.) CO
Ans A F
The Central Office is the where phone people work.
The Telco maintains ownership of its physical wiring, and leases their use to their customers.
444 You want to segment a network. The network is running SNA and Netbios. Which
device should NOT be used to segment the network?
A.) A store and forward switch.
B.) A router.
C.) A Catalyst 5000.
D.) A cut-through switch.
E.) A bridge.
Ans B
SNA and Netbios are non-routable, you should bridge them.
The most correct answer for this question is ‘A Router.’
The purpose here is to recognize that Layer 2 protocols can not be routed.
However, there are ways to turn a non-routable protocol into a routable protocol via a protocol
gateway, DLSW+, RSRB and other technologies.
445 Name a major component of the Point-to-Point Protocol (PPP) to negotiate and set up
control options on the WAN data link.
A.) RFC 1661
B.) High Level Datalink Protocol (HDLC)
C.) Challenge Handshake Authentication Protocol (CHAP)
D.) SS7 E.) Link Control Protocol (LCP)
Ans E
LCP negotiates many of the PPP settings during call setup.
446 Which of the following is an example of the Physical Layer?
A.) SQL
B.) IP
C.) LLC
D.) Token Ring
E.) FDDI
F.) TCP
Ans D E
FDDI, Token Ring and Ethernet are all physical layer framing standards.
447 Cisco’s implementation of ISDN BRI has multi protocol support, SNMP MIB support,
and what other features?
A.) Call waiting
B.) Compression
C.) ADSL
D.) 1.544 Mbps
E.) Call screening
F.) Negative ‘G’ support
Ans B E
Caller ID is part of ISDN and you can screen calls based on it.
Cisco can compress with Stacker or Predictor.
448 The Network layer works with which of the following:
A.) Globules
B.) Bits
C.) Packets
D.) Segments
E.) Frames
Ans C
Physical – bits
Datalink – frames
Network – packets
449 An optional parameter on an IPX access is the ‘LOG’ parameter. This records accesslist
violations when a packet matches. What else does the ‘LOG’ option do?
A.) Records the number of times that a packet matches the list.
B.) Return a message to user who is denied access the by list.
C.) Notifies an SNMP Agent.
D.) Saves the log to NVRAM.
E.) Send an SNMP Trap.
Ans A
It will record to the log. By default a Cisco router logs to RAM and can display the offense to the
console, which is not recommended. It is suggested that you log to a syslog server, for less router CPU impact.
450 Which is not a common problem with Distance-Vector routing?
A.) Slow convergence.
B.) Complex configuration.
C.) Routing loops.
D.) Periodic updates can slow convergence.
E.) Counting to infinity.
Ans B
Easy Config:
Router(config)#router rip
Router(config-router)#network 10.0.0.0
Router(config-router)#
That’s it! (Remember that the network is followed by the CLASSFUL address.)

0

351 What are the 2 functions of the Data Link Mac layer?
A.) Handles access to shared media
B.) Manages protocol access to the physical network medium
C.) Provides SAPs for higher level protocols
D.) Allows multiple devices to uniquely identify one another on the data link layer
Ans B D
These are the two primary functions of the MAC layer.
352 Which layer is responsible for coordinating communication between systems?
A.) Application
B.) Network
C.) Session
D.) Transport
E.) Physical
F.) Data Link
Ans C
The Session layer performs the following: Responsible for establishing and maintaining
communications channels. In practice, this layer is often combined with the Transport Layer.
Dialog control between devices or nodes. Organizes the communication through simplex, half
and full duplex modes. Deals with connection establishment, data transfer, and connection
release.
353 What is the default CDP broadcast update rate for Cisco routers? A.) 120 seconds
B.) 60 seconds
C.) 30 seconds
D.) 90 seconds
Ans B
Cisco Discovery Protocol is a proprietary protocol to allow you to access configuration information
on other routers and switches with a single command. It uses SNAP at the Data-Link Layer. By
default CDP sends out a broadcast every 60 seconds and it holds this information for 180
seconds. CDP is enabled by default.
354 You need to come up with a TCP/IP addressing scheme for your company. How many
network IDs must you allow for when you define the subnet mask for the network?
A.) One for each WAN link
B.) One for each router interface
C.) One for each NIC installed in each client
D.) One for each subnet with hosts
E.) One for each host ID
Ans A D
When determining Network Ids, you need to take into account each Subnet and Each WAN link
you will have. Add these numbers up and you will find the answer to which Network ID you can
use.
355 What is the protocol number for UDP?
A.) 6
B.) 17
C.) 25
D.) 21
Ans B
User Datagram Protocol – UDP is a connectionless oriented transport protocol for use when the
upper layers provide error-recovery and reliability. UDP does not sequence data or re-assemble it
into any order after transmission. This protocol uses Port 17.
356 What is the default LMI type?
A.) Cisco
B.) ANSI
C.) IETF
D.) Q933a
Ans A
Local Management Interface (LMI) was developed in 1990. LMI messages provide information
about the current DLCI values, the global or local significance of the DLCI value, and the status of
virtual circuits.
There are three types of LMI standards:
ANSI – Annex D defined by ANSI standard T1.617
ITU-T (Q.933A) – Annex A defined by Q933A
Cisco (default) – LMI defined by the gang of four
357 You have two Cisco routers setup back-to-back in a lab using DTE/DCE cables. To
which router would you add the clockrate command? A.) The serial port on the DCE router
B.) The Ethernet port on the DTE router
C.) The Ethernet port on the DCE router
D.) The serial port on the DTE router
Ans A
In order to connect routers back-to-back, a clock rate must be set on the router with the DCE
cable. This will provide the clocking usually performed by a DSU/CSU. It is recommended that a
bandwidth statement be added to the interface because some routing protocols, such as IGRP,
use this to make routing decisions.
358 How does a switch use store and forward?
A.) By using a Class I repeater in a collision domain
B.) The LAN switch copies the entire frame into its onboard buffers and then looks up the
destination address in its forwarding, or switching, table and determines the outgoing interface
C.) By using broadcast addresses as source addresses
D.) The switch waits only for the header to be received before it checks the destination address
and starts forwarding the packets
Ans B
Store-and-Forward switching copies the entire frame into its buffer and computes the CRC. If a
CRC error is detected, the frame is discarded, or if the frame is a runt (less than 64 bytes
including the CRC) or a giant (more than 1518 bytes including the CRC). The LAN switch then
looks up the destination address in its switching table and determines the outgoing interface. The
frame is then forwarded to the outgoing interface. Cisco Catalyst 5000 switches uses the Storeand-Forward
method. The problem with Store-and-Forward switching is latency is increased.
Latency also varies with the size of the frame. The larger the frame, the more latency associated.
This of course is due to the fact that the entire frame is copied into its buffer before being
forwarded.
359 Which of the following are valid WAN terms?
A.) DTE
B.) DCE
C.) Demarc
D.) CPE
Ans A B C D
All of the above are valid WAN terms.
360 Which two describe frame tagging?
A.) Examines particular info about each frame
B.) A unique ID placed in the header of each frame as it traverses the switch fabric
C.) A user- assigned ID defined to each frame
D.) The building of filter tables
Ans B C
Frame identification (frame tagging) uniquely assigns a user-defined ID to each frame. This
technique was chosen by the IEEE standards group because of its scalability.
In this approach, a unique user-defined identifier is placed in the header of each frame as it’s
forwarded throughout the switch fabric. The identifier is understood and examined by each switch prior to any broadcasts or transmissions to switch ports of other switches, router, or end-station
devices. When the frame exits the switch fabric, the switch removes the identifier before the
frame is transmitted to the target end-station.
The following points summarize frame tagging:
Used by Catalyst 3000 and 5000 series switches
Specifically developed for multi-VLAN, inter-switch communication
Places a unique identifier in the header of each frame
Functions at layer 2
Requires little processing or administrative overhead
CCNA Interview Questions Page 36
<<Previous Next>>
361 A ISDN BRI circuit can be described as a which of the following?
A.) 3B channels
B.) 2-64Kbps B channels and 1-16Kbps D channel
C.) none of the above
D.) 2-64Kbps B channels and 1-16Kbps C channel
Ans B
There are two types of ISDN Channels :
BRI (Basic Rate Interface) – is 2 64Kbps B channels for data and one 16Kbps D channel for link
management.
PRI (Primary Rate Interface) – is 23Kbps B channels and 1 64Kbps D channel.
362 The two sublayers of the IEEE Data Link Layer are which of the following?
A.) Link and Logical Control
B.) Data Link and LLC
C.) Logical Link Control and Media Access Control
D.) Data Link and MAC
Ans C
Logical Link Control Sublayer – Acts as a managing buffer between the upper layers and the
lower layers. Uses Source Service Access Points (SSAPs) and Destination Service Access
Points (DSAPs) to help the lower layers talk to the Network Layer.
Media Access Control (MAC) -The MAC sublayer manages protocol access to the physical
network medium. The IEEE MAC specification defines MAC addresses, which allow multiple
devices to uniquely identify one another at the data link layer.
363 The — terminal no editing — command will perform what function?
A.) Edit the contents of NVRAM
B.) Allows access to the terminal port
C.) Stops the advanced editing feature
D.) Enable password functions
Ans C
The command to disable advanced editing feature is: Router(config)# terminal no editing
364 Which two of the following are valid ways to have multiple encapsulation types on a
single interface? A.) This is not possible
B.) subinterfaces
C.) additional physical interfaces
D.) secondary addresses
Ans B D
Cisco routers do not allow multiple encapsulation types on a single interface. Therefore, it is
necessary to create either a Secondary Network, or a Subinterface and assign a new
encapsulation type.
365 Which 3 statements describe default encapsulation and LMI type configuration?
A.) There are only four encapsulations and 3 LMI type options
B.) The LMI type config term options
C.) In release 11.3 the LMI type is autosensed
D.) The default LMI is Cisco
E.) IETF encap must be configured unless the connecting routers are both cisco
Ans C D E
The above 3 statements best describe default encapsulation and LMI type configuration for Cisco
routers.
366 Which can be true regarding VLANs?
A.) They are created by location
B.) They are created by function
C.) They are created by department
D.) They are created by group
Ans A B C D
A Virtual LAN (VLAN) is a switched network that is logically segmented by communities of
interest without regard to the physical location of the users. Each port on the switch can belong to
a VLAN. Ports in a VLAN share broadcasts. A VLAN looks like, and is treated like, it’s own
subnet.
The benefits of VLANs are as follows:
Simplify moves, adds, and changes
Reduce administrative costs
Have better control of broadcasts
Tighten network security
Microsegment with scalability
Distribute traffic load
Relocate server into secured locations
367 What is true when using DDR?
A.) HDLC is the preferred encapsulation
B.) You must use static routing
C.) You should use dynamic routing
D.) You should use ISDN
Ans B
When using Dial Demand Routing (DDR), static routes must be specified in order to route
packets.
368 If you are running Token Ring with Novell IPX routing, which encapsulation should you use?
A.) SAP
B.) SNAP
C.) 802.5
D.) 802.2
Ans B
Token Ring with Novell IPX routing uses the SNAP protocol, not 802.5.
369 What are the 3 ways routers learn paths to destination networks?
A.) Dynamic
B.) Static
C.) Routing tables
D.) Default
Ans A B D
There are three methods in which routers can learn paths to destination networks, they are:
1) Static – The administrator manually enters the routes.
2) Dynamic – A routing protocol is used.
3) Default – A gateway of last resort is set.
370 Bridges work at what layer of the OSI model?
A.) Data Link
B.) Network
C.) Physical
D.) Application
Ans A
Bridges work at Layer 2 (Data Link) because they examine the MAC address of the packet which
they base decisions upon.
CCNA Interview Questions Page 37
<<Previous Next>>
371 What is the default switching method for the Cisco 5000 series?
A.) Cut-through
B.) Store-and-splice
C.) Latency
D.) Store-and-forward
Ans D
Store-and-Forward switching copies the entire frame into its buffer and computes the CRC. If a
CRC error is detected, the frame is discarded, or if the frame is a runt (less than 64 bytes
including the CRC) or a giant (more than 1518 bytes including the CRC). The LAN switch then
looks up the destination address in its switching table and determines the outgoing interface. The
frame is then forwarded to the outgoing interface. Cisco Catalyst 5000 switches uses the Storeand-Forward
method. The problem with Store-and-Forward switching is latency is increased.
Latency also varies with the size of the frame. The larger the frame, the more latency associated.
This of course is due to the fact that the entire frame is copied into its buffer before being
forwarded. 372 The benefits to segmenting with Bridges are which of the following?
A.) Scalability
B.) Datagram filtering
C.) Manageability
D.) Reliability
Ans A C D
Manageability, reliability and scalability are all benefits to segmenting with bridges.
373 What is the administrative distance for IGRP?
A.) 90
B.) 120
C.) 110
D.) 100
Ans D
IGRP is a distance vector routing protocol designed by Cisco. The maximum hop count is 255,
and it uses a combination of variables to determine a composite metric. IGRP has an
administrative distance of 100.
374 On an ISDN BRI interface, the control channel is the ‘D’ channel. What is the rate of
this channel?
A.) 64 Kbps
B.) 1.544 Mbps
C.) 128 Kbps
D.) 2.048 Mbps
E.) 16 Kbps
Ans E
16K for the D channel (control)
64K for the two B channels (data)
375 MIDI and MPEG are examples of what layer of the OSI seven layer model?
A.) Session
B.) Network
C.) Datalink
D.) Transport
E.) Application
F.) Presentation
Ans F
The OSI Presentation layer includes EBCIDIC, ASCII, PICT, GIF, MIDI, and MPEG.
Encryption can also occur at this layer.
376 Which ISDN specification series deals with Concepts and Terminology?
A.) World Series
B.) I- Series
C.) Q-Series
D.) 911-Series
E.) J-Series
F.) F-Series
Ans B The 2 most important ISDN specifications are Q & I:
Q – Call setup and teardown.
I – Concepts and terminology.
377 Which of the following is an example of the Physical Layer?
A.) SQL
B.) IP
C.) LLC
D.) DDP
E.) Ethernet
Ans E
FDDI, Token Ring and Ethernet are all physical layer framing standards.
378 In regards to the ISDN BRI standard, which channel is used for control?
A.) B
B.) D
C.) E
D.) I
E.) Q
Ans B
B is Bearer for Data (2 channels at 64kb each).
D is for Control (16kb).
379 Which protocol resolves an IP address to a MAC address?
A.) DHCP
B.) RARP
C.) ARP
D.) NBP
E.) DNS
Ans C
The Address Resolution Protocol (ARP) sends out a broadcast to determine the MAC address
from the IP address.
380 Which of the following is an example of the Network Layer?
A.) TCP
B.) IP
C.) SQL
D.) Token Ring
E.) LLC
Ans B
Most protocol suites have different OSI layer protocols within them. At layer 3,
IP is for TCP/IP. TCP is layer 4.
IPX is for IPX/SPX. SPX is layer 4.
DDP is for AppletalkCCNA Interview Questions Page 38
<<Previous Next>>
381 The Internet Control Message Protocol occurs at what layer of the seven layer model?
A.) Physical
B.) Transport
C.) Session
D.) Datalink
E.) Presentation
F.) Network
Ans F
ICMP is used for error handling and testing at layer 3. Ping and traceroute are examples of ICMP.
382 Which of the following are examples of the Session Layer?
A.) IP
B.) Netbios Names
C.) NFS
D.) Token Ring
E.) SQL
F.) TCP
Ans B C E
Session layer examples include Netbios Names, SQL, NFS, X Windows, and RPC.
383 What is the regional telco office called, where the customers local loop terminates?
A.) Demarc
B.) DTE
C.) DCE
D.) CO
E.) CPE
Ans D
The Central Office (CO) is the Telephone Company (Telco) location nearest you.
384 What is the default LMI type for Cisco Routers that are using Frame-Relay?
A.) Gandalf5
B.) Q933A
C.) Cisco
D.) IETF
E.) ARPA
F.) SAP
Ans C
Local Management Interface (LMI) types are Cisco, ANSI, and Q933A.
385 Most routing protocols recognize that it is never useful to send information about a
route back out the direction from which the original packet came. This is an example of
which routing technology?
A.) Split Horizon B.) LMI
C.) Triggered Updates
D.) Poison Reverse
E.) SYN, ACK
F.) DLCI
Ans A
The golden rule of Split Horizon: Do not send any update packet back out the same interface that
it was received or learned from. Poison Reverse is typically used on larger networks, where a
more aggressive routing loop solution is required.
386 Which layer of the 7 layer model is responsible for representing the application
information between 2 different OS’s? For example, converting ASCII to EBCIDIC.
A.) Transport
B.) Application
C.) Physical
D.) Session
E.) Presentation
F.) Network
Ans E
The OSI Presentation layer formats the data, which includes encryption services.
387 Which type of switching reads in the entire frame before forwarding it?
A.) Tabling
B.) Store-and-Forward
C.) Inverse ARP
D.) Fast Forward
E.) Cut-Through
F.) Routing
Ans B
Store-and-Forward is slower, but it checks the frame for errors before forwarding. This can
actually help to improve overall network performance on noisy lines.
388 Which OSI Reference Layer is concerned with path determination?
A.) Datalink
B.) Physical
C.) Network
D.) Transport
E.) Session
Ans C
The Network layer is where routing occurs.
389 Which of the following are examples of the Datalink Layer?
A.) LLC
B.) SQL
C.) TCP
D.) Token Ring
E.) IP Ans A
MAC and LLC are the sublayers of the Datalink layer.
390 What is the standard ISDN term for a non-native analog telephone?
A.) TE1
B.) TA
C.) LE
D.) TE2
E.) ET
Ans D
Terminal Equipment 2 (TE2) does not support native digital ISDN. The analog device will require
an external analog to digital converter.
CCNA Interview Questions Page 39
<<Previous Next>>
391 Which Distance Vector characteristic can help to speed up convergence?
A.) Triggered Updates.
B.) Split Horizon.
C.) Poison Reverse.
D.) Hold Down timers.
E.) Inverse ARP.
Ans A
Instead of waiting on a pre-set periodic interval (before sending the routing table), DV routing
protocols can send triggered updates to immediately notify the neighbor routers. Hold down
timers, Poison Reverse, and Split Horizon are features that are used to avoid routing loops.
392 Which type of switching is considered to be ‘wire speed?’
A.) Cut-Through
B.) Multiplexed
C.) Inverted
D.) Layer 4
E.) Store and Forward
F.) Layer 3
Ans A
Cut-Through is the fastest mode of switching. Store and Forward reads in the entire frame,
confirms the frame is valid, and then forwards the frame onto the wire. Cut-Through only checks
the destination header in the frame and immediately forwards the frame onto the wire, without
checking the frame to be valid. Layer-3 switching is actually routing.
393 The Datalink layer works with which of the following:
A.) Packets
B.) Bits
C.) Globules
D.) Frames
E.) Segments
Ans D
Physical – bits Datalink – frames
Network – packets
394 What is a characteristic of Store and Forward switches?
A.) They forward the frame before it is completely read.
B.) They work at wire speed.
C.) They are the same a Cut-Through switching.
D.) They read the entire frame and check CRC before forwarding.
E.) They decrease latency.
Ans D
Store and Forward switch will not forward fragments.
The longer the frame, the longer the delay (latency) before the switch can forward.
395 Station A is transmitting data to station B, and expects an acknowledgment after every
400 bytes. After transmitting data for a while, the two stations determine the line is reliable
and change to expecting and acknowledgement every 600 bytes.
This is an example of (pick the best answer only):
A.) BECN
B.) Sliding Windows
C.) Poison Reverse
D.) Countdown timers
E.) Split Horizon
F.) Count to infinity
Ans B
A TCP/IP ‘window’ is the amount of data (number of bytes) that the sending station will transmit
before expecting an acknowledgement back.
If the stations can change that window size on the fly, that is called a sliding window. This is done
to optimize performance.
396 Which device listed below provides clocking for the line?
A.) DCE
B.) CPE
C.) CO
D.) DTE
E.) Demarc
Ans A
The Data Circuit-terminating Equipment (DCE) is responsible for providing the clocking on the
wire.
HINT: When You see the ‘C’ in ‘DCE’, think ‘Clocking’ t.
397 Which OSI Reference Layer controls application to application communication?
A.) Datalink
B.) Network
C.) Transport
D.) Session
E.) Physical
Ans D
The Session layer controls a conversation between applications. The Transport layer controls communications between hosts.
398 The Datalink Layer is broken down into 2 layers, LLC and MAC. The LLC establishes
media independence and what else?
A.) Provides Windowing.
B.) Provides flow control.
C.) Provides SAP’s (Service Access Points).
D.) The Datalink layer does not have sublayers.
E.) Provides SAP’s (Service Advertising Protocol).
F.) RIP Updates.
Ans B C
OSI layer-2 SAP allows the upper layers to encapsulate multiple layer 3 protocols.
IPX SAP is a protocol used to advertise NetWare services every 60 seconds.
399 When a Distance Vector routing protocol detects that a connected network has gone
down, it sends out a special routing update packet, telling all directly connected routers
that the distance to the dead network is infinity. This is an example of which routing
technology?
A.) ICMP.
B.) Only Link State routing protocols have this intelligence.
C.) Triggered updates.
D.) Garrison-4.
E.) Split Horizon.
F.) Poison Reverse.
Ans F
Instead of just removing the route from the routing update, Poison Reverse sets the distance to
‘infinity’ (for IP RIP this is a hop count of 16). This immediately makes the route invalid for all
neighboring routers.
400 Which of the following would be displayed by the command ‘SHOW CDP NEIGHBOR
DETAIL’?
A.) The incoming/outgoing port.
B.) The hardware platform.
C.) One address per protocol.
D.) Amount of Flash Memory Available
E.) The routers hostname.
F.) The subnet mask, if IP is configured.
Ans A B C E
CDP shows a lot of the same info that ‘show version’ does locally, but FLASH memory is not part
of it. The ‘detail’ keyword is optional, but even when used, IP subnet mask information is not
displayed by CDP for IP interfaces.
CCNA Interview Questions Page 40
<<Previous Next>>
401 Which of the following are characteristics of UDP?
A.) UDP is connection oriented.
B.) UDP is used with TFTP. C.) UDP is unreliable.
D.) UDP is connectionless.
E.) UDP is at the transport layer.
F.) UDP uses no acknowledgements.
Ans B C D E F
UDP sends packets ‘blind’ down the network, and relies on upper-layer protocols to form
connections and detect errors. TCP is a connection-oriented protocol that can provide reliable
transport.

0

AC23  Microprocessor Based System Design
1
TYPICAL QUESTIONS & ANSWERS
PART – I
OBJECTIVE TYPE QUESTIONS
Each Question carries 2 marks.
Choose the correct or best alternative in the following:
Q.1   If the crystal oscillator is operating at 15 MHz, the PCLK output of 8284 is
(A)  2.5 MHz.  (B)5 MHz.
(C)7.5 MHz.  (D)10 MHz.
  Ans:(A)
Q.2  In which T-state does the CPU sends the address t o memory or I/O and the ALE signal
for demultiplexing
(A)  T1.  (B) T2.
(C)  T3.  (D)T4.
Ans, During the first clocking period in a bus cycle, which is called T1, the address of
the memory or I/O location is sent out and the control signals ALE, DT/R’ and IO/M’
are also output. Hence answer is (A).
Q.3  If a  1 M 1 × DRAM requires 4 ms for a refresh and has 256 rows  to be refreshed, no
more than __________ of time must pass before another row is refreshed.  
(A)  64 ms.  (B)4 ns.
(C)0.5 ns.  (D)15.625  s µ .
AnsAnswer is (B)
Q.4   In a DMA write operation the data is transferred
(A)  from I/O to memory.  (B)  from memory to I/O.
(C)from memory to memory.  (D) from I/O to I/O.
AnsA DMA writes operation transfers data from an I/O device to memory. Hence
answer is (A).
Q.5  Which type of JMP instruction assembles if the di stance is 0020 h bytes
(A)  near. (B) far.
(C)  short.  (D)  none of the above.
AnsThe three byte near jump allows a branch or jump within ± 32K bytes. Hence
answer is (A).
Q.6   A  certain  SRAM  has  0 CS = ,  0 WE =  and  1 OE = .   In  which  of  the  following
modes this SRAM is operating
(A)Read  (B) Write
AC23  Microprocessor Based System Design
2
(C)  Stand by  (D)  None of the above
AnsFor CS’=WE’=0, write operation. Hence answer is (B).
Q.7  Which of the following is true with respect to EEPROM?  
(A)  contents can be erased byte wise only.
(B)  contents of full memory can be erased together.
(C)  contents can be erased using ultra violet rays
(D)  contents can not be erased
AnsAnswer is (C).
Q.8  Pseudo instructions are basically
(A)  false instructions.
(B)  instructions that are ignored by the microprocessor.
(C)assembler directives.
(D)instructions that are treated like comments.
Ans Pseudo-instructions  are  commands  to  the  assembler. All  pseudo-operations  start
with a period. Pseudo-instructions are composed of  a pseudo-operation which may be
followed by one or more expressions. Hence answer is (C).
Q.9  Number  of  the  times  the  instruction  sequence  below  will  loop  before  coming  out  of
loop is
   MOV AL, 00h
   A1: INC AL
  JNZ A1
(A)  00  (B)  01
(C)  255  (D)256
AnsAnswer is (D)
Q.10 What will be the contents of register AL after the following has been executed
   MOV BL, 8C
   MOV AL, 7E
   ADD AL, BL
(A)  0A and carry flag is set  (B)0A and carry flag is reset
(C)6A and carry flag is set  (D)6A and carry flag is reset
  Ans, Result is 1,0A. Hence answer is (A).
Q.11 Direction flag is used with
(A)  String instructions.  (B)Stack instructions.
(C)Arithmetic instructions.  (D)Branch instructions.
  AnsThe direction flag is used only with the string instructions. Hence answer is (A).
Q.12 Ready pin of a microprocessor is used
(A)  to indicate that the microprocessor is ready to receive inputs.
(B)  to indicate that the microprocessor is ready to receive outputs.
(C)  to introduce wait states.
AC23  Microprocessor Based System Design
3
(D)  to provide direct memory access.
AnsThis input is controlled to insert wait states into the timing of the microprocessor.
Hence answer is (C).
Q.13 These are two ways in which a microprocessor can come out of Halt state.
(A)   When hold line is a logical 1.
(B)  When interrupt occurs and the interrupt system hasbeen enabled.
(C) When both (A)and (B)are true.
(D) When either (A) or (B) are true.
  AnsAnswer is (A)
Q.14 In the instruction FADD, F stands for
(A)  Far.  (B)Floppy.
(C)Floating.  (D) File.
  AnsAdds two floating point numbers. Hence answer is (C).
Q.15 SD RAM refers to
(A)  Synchronous DRAM  (B) Static DRAM
(C)Semi DRAM  (D) Second DRAM
Ans, Answer is (A)
Q.16 In case of DVD, the speed is referred in terms ofn X (for example 32 X). Here, X
refers to  
(A)  150 KB/s  (B)  300 KB/s
(C)  1.38 MB/s  (D)2.4 MB/s
 AnsAnswer is (C).
Q.17 Itanium processor of Intel is a
(A)  32 bit microprocessor.  (B)64 bit microprocessor.
(C)128 bit microprocessor.  (D)256 bit microprocessor.
  AnsThe Itanium is a 64-bit architecture microprocessor. Hence answer is (B).
Q.18   LOCK prefix is used most often
(A)  during normal execution.  (B) during DMA accesses
  (C)  during interrupt servicing.  (D) during memory accesses.
AnsLOCK is a prefix which is used to make an instruction of 8086 non-interruptable.
Hence answer is (C).
Q.19 The Pentium microprocessor has______execution units.
(A)  1 (B) 2
  (C) 3  (D) 4
AnsThe Pentium microprocessor is organized with threeexecution units. One
executes floating-point instructions, and the othertwo (U-pipe and V-pipe) execute
AC23  Microprocessor Based System Design
4
integer instructions. Hence answer is (C).
Q.20   EPROM is generally erased by using
(A) Ultraviolet rays  (B)infrared rays
(C)12 V electrical pulse  (D) 24 V electrical pulse
AnsThe EPROM is erasable if exposed to high-intensityultraviolet light for about 20
minutes or less. Hence answer is (A)
Q.21Signal voltage ranges for a logic high and for alogic low in RS-232C standard are
(A)Low = 0 volt to 1.8 volt, high = 2.0 volt to 5 volt
(B) Low =-15 volt to –3 vol, high = +3 volt to +15 volt
(D)  Low = +3 volt to +15 volt, high = -3 volt to -15 volt
(E)  Low = 2 volt to 5.0 volt, high = 0 volt to 1.8 volt
AnsAnswer is (B)
Q.22 The PCI bus is the important bus found in all the new Pentium systems because
(A)  It has plug and play characteristics
(B)  It has ability to function with a 64 bit data bus
(C)  Any Microprocessor can be interfaced to it with PCIcontroller or bridge
(D)  All of the above
  Ans, Answer is (D).
Q.23 Which of the following statement is true?  
(A)  The group of machine cycle is called a state.
(B)  A machine cycle consists of one or more instructioncycle.
(C)  An instruction cycle is made up of machine cycles and a machine cycle is
made up of number of states.
(D)  None of the above
  AnsAn instruction cycle consists of several machine cycles. Hence Answer is (B).
Q.24 8251 is a
(A)   UART
(B)  USART
(C)  Programmable Interrupt controller
(D)  Programmable interval timer/counter
  AnsThe Intel 8251 is a programmable communication interface. It is USART.
Q.25   8088 microprocessor has
(A) 16 bit data bus  (B)4 byte pre-fetch queue
  (C)  6 byte pre-fetch queue  (D) 16 bit address bus
AnsThe 8088 is a 16-bit microprocessor with an 8-bit data bus. The 16-bit address
bus. Hence answer is (D).
AC23  Microprocessor Based System Design
5
Q.26By what factor does the 8284A clock generator divide the crystal oscillator’s output
frequency?
(A)One  (B)Two
(C)Three  (D)Four
AnsWhen F/C’ is at logic 0; The oscillator output is steered through to the divideby-3 counter. Hence answer is (c).
Q.27The memory data bus width in Pentium is
(A)16 bit  (B) 32 bit
(C)64 bit  (D)None of these
AnsThe Data bus width is 64 bits. Hence answer is (C).
Q.28 When the 82C55 is reset, its I/O ports are all initializes as
(A)output port using mode 0  (B)Input port using mode 1
(C)output port using mode 1  (D)Input port using mode 0
AnsA RESET input to the 82C55 causes all ports to be set up as simple input ports
using mode 0 operations. Hence answer is (D).
Q.29 Which microprocessor pins are used to request andacknowledge a DMA transfer?
(A)reset and ready  (B) ready and wait
(C)HOLD and HLDA  (D)None o these
Ans, The HOLD pin is an input that is used request a DMA action and the HLDA
pin is an output that that acknowledges the DMA action. Hence answer is (C).
Q.30Which of the following statement is false?
(A) RTOS performs tasks in predictable amount of time
(B) Windows 98 is RTOS
(C) Interrupts are used to develop RTOS
(D)Kernel is the one of component of any OS
AnsOperating systems, like Windows, defer many tasks and do not guarantee their
execution in predictable time. Hence answer is (B).
Q.31 The VESA local bus operates at
(A)8 MHz  (B) 33 MHz
(C)16 MHz  (D)None of these
AnsThe VESA local bus operates at 33 MHz. Hence answer is (B).
Q.32The first modern computer was called_____________.
(A)FLOW-MATIC  (B) UNIVAC-I
(C)ENIAC  (D)INTEL
Ans, ENIAC (Electronic Numerical Integrator And Computer) was the first generalpurpose electronic computer. It was a Turing-complete, digital computer capable of
being  reprogrammed  to  solve  a  full  range  of  computing  problems.  ENIAC  was
AC23  Microprocessor Based System Design
6
designed  to  calculate  artillery  firing  tables  for  the  U.S.  Army’s  Ballistic  Research
Laboratory. Hence answer is (c).
Q.33Software command CLEAR MASK REGISTER in DMA
(A)Disables all channels.
(B) Enables all channels.
(C)None.
(D)Clears first/last flip-flop within 8237.
  AnsEnables all four DMA channels. Hence answer is (B).
Q.34The first task of DOS operating system after loading into the memory is to use the file
called___________.
(A)HIMEM.SYS  (B) CONFIG.SYS
(C)AUTOEXEC.BAT  (D)SYSTEM.INI
Ans, The first task of the DOS operating system, afterloading into memory, is to
use a file called the CONFIG.SYS file. This file specifies various drivers that load
into the memory, setting up or configuring the machine for operation under DOS.
Q.35   If the programmable counter timer 8254 is set in mode 1 and is to be used to count
six events, the output will remain at logic 0 for _____ number of counts
(A)5  (B)6
(C)0  (D)All of the above
  Ans. OUT continues for the total length of the count. Hence answer is (B).
Q.36 The flash memory is programmed in the system by 12 V programming pulse.
(A)TRUE  (B)FALSE
  AnsThe flash memory device requires a 12V programmingvoltage to erase and write
new data. Hence answer is (A).
Q.37A plug and play (PnP) interface is one that contains a memory that holds
configuration information of the system.
(A)TRUE  (B)FALSE
 AnsAnswer is (A)
Q.38 The accelerated graphics port (AGP) allows virtually any microprocessor to be
interfaced with PCI bus via the use of bridge interface.
(A)  TRUE  (B)FALSE
  Ans, this port probably will never be used for any devices other than the video card.
Hence answer is (B).
Q.39  A Bus cycle is equal to how many clocking periods
(A) Two   (B) Three
(C) Four   (D) Six
AC23  Microprocessor Based System Design
7
Ans Typically,  the  bus-cycle  of  the  8086  and  8088  processors  consist  of  four  clock
cycles or pulses. Thus, duration of a bus-cycle is = ‘4*T’. Hence Answer is (C).
Q.40  The time required to refresh a typical DRAM is
(A) 2 – 4 us   (B) 2 – 4 ns
(C) 2 – 4 ms   (D) 2 – 4 ps
AnsThe capacitor Cs discharges through the internal resistance of the NMOS transistor
T1. Typically Cs = 0.2 pF and the internal resistance Rin = 10
10
ohms, so:
Cs x Rin = 0.2 x 10
-12
x 10
10
x 10
3
ms = 2 ms
So the typical refresh time interval is 2 ms. HenceAnswer is (C).
Q.41  The no. of address lines required to address a memory of size 32 K is
(A) 15 lines   (B) 16 lines
(C) 18 lines   (D) 14 lines
Ans32K = 32 X 1024 bits = 2
5
X 2
10
= 2
15
Hence answer is ( A).
Q.42  The no. of wait states required to interface 8279 to 8086 with 8MHz clock are
(A) Two   (B) Three
(C) One   (D) None
AnsTwo wait states used so that device can function with an 8 MHz. Hence answers is
( A).
Q.43  NMI input is
(A) Edge sensitive    (B) Level sensitive
(C) Both edge and level triggered  (D) edge triggered and level sensitive
AnsNon-maskable interrupt (NMI) is an edge –triggeredinput that requests an
interrupt on the positive edge (0 to 1 transition).
Q.44Data rate available for use on USB is
(A)12 Mbits per second  (B)1.5 Mbits per second
   (C)  Both (A)and (B)  (D)No restriction
  AnsData transfer speeds are 12 Mbps for full speed operation and 1.5 Mbps for slow
speed operation. Hence answer is (c).
Q.45 In 80186, the timer which connects to the system clock is
(A)  timer 0  (B)timer 1
   (C)  timer 2  (D)Any one can be connected
Ans.Timer 2 is internal and clocked by the master clock. Hence answer is (c).
Q.46  Conversion of the +1000 decimal number into signed binary word results
(A) 0000 0011 1110 1000   (B) 1111 1100 0001 1000
(C) 1000 0011 1110 1000   (D) 0111 1100 0001 1000
AC23  Microprocessor Based System Design
8
Ans
1000 /2 =>500 0
  500/2=>250 0
  250/2=>125 0
  125/2=>62 1
  62/2=>31 0
  31/2=>15 1
  15/2=>7 1
  7/2=>3 1
  3/2=>1 1
  16 bit signed number is 1000,0011,1110,1000
  Hence Answer is (C).
Q.47  What do the symbols [ ] indicate?
(A) Direct addressing  (B) Register Addressing
(C) Indirect addressing  (D) None of the above
AnsAnswer is (C).
Q.48  SDRAM refers to
(A) static DRAM   (B) synchronous DRAM
(C) sequential DRAM  (D) semi DRAM
Ans, Answer is (B)
Q.49  Which pins are general purpose I/O pins during mode-2 operation of the 82C55?
(A) PA0 – PA7   (B) PB0-PB7
(C) PC3-PC7    (D) PC0-PC2
AnsIn mode 2 Port-A can be programmed to operate as bidirectional port. The mode-2
operation is only for Port-A. Hence Answer is (A)
AC23  Microprocessor Based System Design
9
PART – II
DESCRIPTIVES
Q.1  Describe the operation performed by the instruction OUT 47 h, AL.  (3)
Ans  :  It  transfers  the  content  of  AL  to  I/O  port  47h.  Notice  that  I/O  port  number
appears as 0047h on the 16 bit address bus and thatdata from AL appears on the data
bus of the microprocessor.
Q.2   How is 8255 (Programmable Peripheral Interface) configured if its control register
contains 9B h.   (3)
Ans
AC23  Microprocessor Based System Design
10
   9BH => 1001 1011 =>
   b6b5=00-> Mode0
   b4=0-> Port A as input.
   b3=1-> Port C as input (PC7-PC4)
   b2=0-> Mode 0
   b1=1-> Port B as input
   b0=1-> Port C as input (PC3-PC0).
Q.3 Write a control word for counter 1 of 8253 / 8254that selects the following options:
load least significant byte only, mode 5 of operation and binary counting. Then write
an instruction sequence that will load the control word into 8253 / 8254 that is located
at address 01000 h of memory address space. Assumethat 8253 / 8254 is attached to
the I/O bus of the CPU and the address inputs
0
A and
1
A are supplied by
2
A and
3
A
respectively.   (5)
 Ans
AC23  Microprocessor Based System Design
11
  Based on the above given conditions and assuming  counter 0 is used. The control
word becomes 0001 1010h.
  Identify the port address
  – The CS is enabled when A7=1
  – The Control Register is selected when A1 and A0 =1
  – Assuming unused address lines A6 to A2 are at logic 0,
  Then port address will be as follows
   Control Register = 83H
   Counter 2 = 82H
   MVI A,B0H
   OUT 83H
   MVI A, LOWBYTE
   OUT 82H
   MVI A,HIGHBYTE
   OUT 82H
  LOOP:MVI A,80H
   OUT 83H
   IN 82H
   MOV D,A
   IN 82H
   ORA D
   JNZ LOOP
   RET
 Q.4 ‘Pentium  processor  has  a  superscalar  architecture’.   Explain  the  meaning  of  the
statement.   (4)
Ans
The Pentium microprocessor is organized with three  execution units. One executes
floating-point  instructions,  and  the  other  two  (U-pipe  and  V-pipe)  execute  integer
instructions.  This  means  that  it  is  possible  to  execute  three  instructions
simultaneously.
Q.5 Write a short note on RS-232-C.   (8)
  Ans
 The RS-232 standard is a collection of connectionstandards between different pieces
of  equipment.  The  EIA  RS-232  serial  communication  standard  is  a  universal
standard,  originally  used  to  connect  teletype  terminals  to  modem  devices.  In  a
modern PC the RS-232 interface is referred to as a COM port. The COM port uses a
9-pin D-type connector (Refer Fig (a)) to attach to the RS-232 cable. The RS-232
standard  defines a  25-pin  D-type  connector (Refer Fig   (b))  but  IBM reduced  this
connector to a 9-pin device so as to reduce cost and size.
AC23  Microprocessor Based System Design
12
Fig (a) Female & Male “DB-9” Connector
  Fig 1(b) Female & Male “DB-25” Connector
Q.6 Explain the terms: simplex, half duplex and full duplex.  (6)
Ans
Simplex Transmission
Data in a simplex channel is always one way. Simplex channels are not often used
because it is not possible to send back error or control signals to the transmit end.
An example of a simplex channel in a computer system is the interface between the
keyboard and the computer, in that key codes need only be sent one way from the
keyboard to the computer system.
Half Duplex Transmission
A half duplex channel can send and receive, but notat the same time. It’s like a onelane bridge where two-way traffic must give way in order to cross. Only one end
transmits at a time, the other end receives.
Full Duplex Transmission
Data can travel in both directions simultaneously. There is no need to switch from
transmit to receive mode like in half duplex. It’s like a two lane bridge on a twolane highway.
 Q.7 How  DRAM’s  are  different  from  SRAM’s?   Why  DRAMs  are  said  to  employ
address multiplexing?   (4)
Ans
   Dynamic RAM (DRAM) is essentially the same as SRAM, except that it retains
data for only 2 or 4 ms on an internal capacitor. After 2 or 4 ms, the contents of the
DRAM  must  be  completely  rewritten  (refreshed)  because  the  capacitors,  which
store  logic  1  or  logic  0,  lose  their  charges.  The  entire  content  of  the  memory  is
refreshed with 256 reads in a 2-to-4 ms interval. Refreshing also occurs during a
write, a read or during a special refresh cycle.
AC23  Microprocessor Based System Design
13
Q.8Explain the operation of 8279. Explain thefollowing terms:
(i)  N key Roll over.
(ii)  Key board debounce.
(iii)  FIFO RAM.  (9)
Ans
   The 8279 is a programmable keyboard and display  interfacing component that
scans  and  encodes  up  to  a  64-key  keyboard  and  controls  up  to  a  16-digit
numerical display. The keyboard interface has builtin first-in first-out (FIFO)
buffer that allows it store up to eight keystrokes before the microprocessor must
retrieve a character. The display section controls up to 16 numeric displays from
an internal 16 X 8 RAM that stores the coded display information.
   The  keyboard  section  consists  of  eight  lines  that  can  be  connected  to  eight
columns  of  a  keyboard,  plus  two  additional  lines  as well  as  to  shift  and
CNTL/STB  keys.  The  key  pressed  are  automatically  debounced  and  the
keyboard can operate in two modes two –key lock outor n-key rollover. If two
keys in the two –key lock out mode are pressed simultaneously, only first key is
recognized. In the N-key roll over mode, simultaneous key are recognized and
their codes are stored in the internal buffer.
Q.9    What are the differences between CGA and VGA graphics adapters?  (4)
Ans
   The  Color  Graphics  Adapter  (CGA),  originally also called the  Color/Graphics
Adapter  or  IBM  Color/Graphics  Monitor  Adapter  introduced  in  1981,  was
IBM’s first color graphics card, and the first color computer display standard for
the IBM PC.
   The standard IBM CGA graphics card was equipped  with 16 kilobytes of video
memory, and could be connected either to a NTSC-compatible monitor or TV
via an RCA jack, or to a dedicated 4-bit “RBGI” interface CRT monitor, such as
the IBM 5153 color display.
   The  term  Video  Graphics  Array  (VGA)  refers  specifically  to  the  display
hardware  first  introduced  with  the  IBM  PS/2  line  of computers  in  1987,  but
through  its  widespread  adoption  has  also  come  to  mean  either  an  analog
computer  display  standard,  the  15-pin  D-subminiature  VGA  connector  or  the
640×480  resolution  itself.  While  this  resolution  has been  superseded  in  the
personal  computer  market,  it  is  becoming  a  popular  resolution  on  mobile
devices.
   VGA  was  officially  superseded  by  IBM’s  XGA  standard,  but  in  reality  it was
superseded  by  numerous  slightly  different  extensions  to  VGA  made  by  clone
manufacturers that came to be known collectively as”Super VGA”.
Q.10  What do you mean by A/D conversion? Explain anyone of the following A/D
techniques:
(i)  Successive approximation.
(ii)  Parallel / flash converter.
(5)
Ans
The electronic circuit, which translates an analogsignal into a digital signal, is
known as Analog – to – Digital converter (ADC).
AC23  Microprocessor Based System Design
14
(i)  Successive approximation ADC
   One method of addressing the digital ramp ADC’s  shortcomings is the so-called
successive approximation ADC. The only change in this design is a very special
counter  circuit  known  as  a  successive-approximation register.  Instead  of
counting up in binary sequence, this register counts by trying all values of bits
starting  with  the  most  significant  bit  and  finishing  at  the  least-significant  bit.
Throughout the count process, the register monitorsthe comparator’s output to
see  if  the  binary  count  is  less  than  or  greater  than  the  analog  signal  input,
adjusting the bit values accordingly. The way the register counts is identical to
the  “trial-and-fit”  method  of  decimal-to-binary  conversion,  whereby  different
values of bits are tried from MSB to LSB to get a binary number that equals the
original decimal number. The advantage to this counting strategy is much faster
results:  the  DAC  output  converges  on  the  analog  signal  input  in  much  larger
steps than with the 0-to-full count sequence of a regular counter.
   Without  showing  the  inner  workings  of  the  successive-approximation  register
(SAR), the circuit looks like this:
   Fig: Successive Approximation ADC Circuit
AC23  Microprocessor Based System Design
15
   It  should  be  noted  that  the  SAR  is  generally  capable  of  outputting  the  binary
number in serial (one bit at a time) format, thus eliminating the need for a shift
register.  Plotted  over  time,  the  operation  of  a  successive-approximation  ADC
looks like this:
Fig: Successive Approximation ADC Circuit Input andoutput Waveforms
ii.  Parallel / flash converter.
   Also called the parallel A/D converter, this circuit is the simplest to understand.
It is formed of a series of comparators, each one comparing the input signal to a
unique  reference  voltage.  The  comparator  outputs  connect  to  the  inputs  of  a
priority  encoder  circuit,  which  then  produces  a  binary  output.  The  following
illustration shows a 3-bit flash ADC circuit:
AC23  Microprocessor Based System Design
16
Fig: FLASH ADC Circuit
   Vref is a stable reference voltage provided by aprecision voltage regulator as
part  of  the converter  circuit, not  shown  in the  schematic.  As the analog  input
voltage  exceeds  the  reference  voltage  at  each  comparator,  the  comparator
outputs will sequentially saturate to a high state.The priority encoder generates
a  binary  number  based  on  the  highest-order  active  input,  ignoring  all  other
active inputs.
Q.11  What do you mean by external and internal data bus? How are these two related
in 8088 processor.   (2)
AnsInternal Data Bus: A bus that operates only withinthe internal circuitry of
the CPU, communicating among the internal caches ofmemory that are part of
the CPU chip’s design. This bus is typically ratherquick and is independent of
the rest of the computer’s operations.
   External Data Bus: A bus that connects a computer to peripheral devices. The
8088  microprocessor  has  16-bit  registers,  16-bit  internal  data  bus  and  20-bit
address bus, which allows the processor address up to 1 MB of memory.
AC23  Microprocessor Based System Design
17
Q.12  What is the difference between XT and AT computer system?  (2)
Ans
   XT ->extended and AT->Advanced Technology
   Some  differences  between  the  PC  and  XT  include  the  type  of  power  supply
originally  included–63  vs  135  watts;  the  number  and  spacing  of  expansion
slots–5 vs 8; the PC has a cassette tape interfaceconnector on the back.
Q.13  What are program-invisible registers?  (2)
Ansthe global and local descriptor tables are found in the memory system. In
order  to  access  and  specify  the  address  of  these  tables,  the  program  invisible
registers  used.  The  program  invisible  registers  are not  directly  addressed  by
software so they are given name.
   The  GDTR  (global  descriptor  table  register)  and  IDTR  (interrupt  descriptor
table  register)  contain  the  base  addresses  of  the  descriptor  table  and  its  limit.
The limit of each descriptor table is 16 bits because the maximum table length is
64  Kbytes.  When  the  protected  mode  operation  is  desired,  the  address  of  the
global descriptor table and its limit are loaded into the GDTR.
Q.14   The interrupt vector table is always created in thefirst 1K area of the memory.
Justify the statement.   (2)
AnsWhen the CPU receives an interrupt type number from the PIC, it uses this
number to look up the corresponding interrupt vector in memory. There are 256
interrupt types. Each interrupt vector occupies 4 bytes. Therefore, a total of 4 x
256 = 1K bytes of memory is reserved at the beginning of the processor memory
address space for storing interrupt vectors.
Q.15  What is the purpose of carry (c) flag and zero (z) flag?  (2)
   AnsCarry flag holds the carry after addition or the borrow after subtraction. The
carry  flag  also  indicates  error  conditions,  as  dictated  by  some  programs  and
procedures.
   The Zero flag shows that the result of an arithmetic or logical operation is zero.
If Z=1, the result is zero; if Z=0, the result is notzero.
Q.16  What is 16-bit ISA? Compare it with 8-bit ISA bus.  (6)
AnsThe only difference between the 8 and 16-bit ISA bus is that an additional
connector is attached behind the 8-bit connector. 16-bit ISA card contains two
edge connectors. One plugs into the original 8-bit connector and other plugs into
the  16-bit  connector.  The  added  features  that  are  most  often  used  are  the
additional  interrupt  request  inputs  and  DMA  request signals.  Interfaces  found
for the ISA bus are modems and sound cards.
Q.17  Compare memory mapped I/O with I/O mapped I/O.  (4)
Ans Memory  Mapped  I/O  Scheme:  In  this  scheme  there  is  only  one  address
space.  Address  space  is  defined  as  all  possible  addresses  that  microprocessor
AC23  Microprocessor Based System Design
18
can generate. Some addresses are assigned to memories and some addresses to
I/O devices. An I/O device is also treated as a memory location and one address
is  assigned  to  it.  In  this  scheme  all  the  data  transfer  instructions  of  the
microprocessor can be used for both memory as well as I/O device. This scheme
is suitable for a small system.
In I/O mapped I/O scheme the addresses assigned to  memory locations can also
be  assigned  to  I/O  devices.  Since  the  same  address  may  be  assigned  to  a
memory  location  or  an  I/O  device,  the  microprocessor  must  issue  a  signal  to
distinguish whether the address on the address bus  is for a memory location or
an I/O device.
Q.18  Explain in brief the functions of the clock gener ator chip, 8284.  (4)
Ans, 8284 Clock generator:
The  8284  is  an  ancillary  component  to  the  microprocessors.  Without  clock
generator,  many  additional  circuits  are  required  to generate  the  clock  in  an
microprocessor based system. A 8284 provides the following basic functions or
signals:  Clock  generation,  RESET  synchronization,  READY  synchronization,
and a TTL-level peripheral clock signal.
Q.19  Write a brief note on MMX technology.  (4)
   Ans, MMX (Multimedia extensions) technology adds 57 new instructions to the
instruction set of the Pentium – 4 microprocessors.The MMX technology also
introduces  new  general  purpose  instructions.  The  new  MMX  instructions  are
designed for application such as motion video, combined graphics with video,
image  processing,  audio  synthesis,  speech  synthesis and  compression,
telephony,  video  conferencing,  2D  graphics,  and  3D  graphics.  These  new
instructions  operate  in  parallel  with  other  operations  as  the  instruction for  the
arithmetic coprocessor.
   The  MMX  architecture  introduces  new  packed  data  types.  The  data  types  are
eight  packed,  consecutive  8-bit  bytes;  four  packed, consecutive  16-bit  words;
and two packed, consecutive 32-bit double words.
Q.20  What are the different modes in which 8255 Programmable Peripheral Interface
(PPI)  can  operate?   Write  the  8086  initialisation  routine  required  to  program
8255 for mode 1 with Port A and Port B as output Ports and Port C as an input
port. Indicate all the relevant signals.  (6)
 Ans
•  24 I/O lines in 3 8-bit port groups – A, B, C
•  A, B can be 8-bit input or output ports
•  C can serve as 2 4-bit input or output ports
•  3 modes of operation:
–  Mode 0:A, B, C simple input or output level sensitive ports
–  Mode 1:A, B input or output ports with strobe control in C
–  Mode 2:A is bidirectional with control/handshake inB and C
•  A, B can only change 1 byte at a time
•  C has individual bit set/reset capability
•  Advantage  is  non-dedicated  circuit  can  change  port  configuration  with
software and no “glue logic”
AC23  Microprocessor Based System Design
19
•  Ports A, B, and C are used for I/O data.
•  The control register is programmed to select the operation mode of the three
ports A, B, and C.
•  Mode 0 : simple I/O mode
•  Any of the ports A, B, CL and CU can be programmed as input or output.
•  No control of individual bits (all bits are out or all bits are in)
  Mode0:
  Mode1:
AC23  Microprocessor Based System Design
20
   Mode2:
Q.21   Explain the operation of IRET instruction. What memory locations contain the
vector for an INT 34 instruction?  (4)
Ans
 The Interrupt return (IRET) instruction is used only with software or hardware
interrupt service procedures. Whenever an IRET instruction executes, it stores
the contents of I and T from the stack. This is important because it preserves the
state  of  the  flag  bits.  If  interrupts  were  enabled  before  an  interrupt  service
procedure,  they  automatically  re-enabled  by  the  IRET  instruction  because  it
restores the flag register.
 Interrupt Number 20-FF are stored at an address 80 – 3FFH.
Q.22   Explain the following terms:
i.  Branch prediction logic.
ii.  Paging.
iii.  Assembler.
iv.  Microprocessor development system.  (8)
Ans
(i)  Branch  prediction  logic  in  Pentium:  The  Pentium  microprocessor  uses
branch  prediction  logic  to  reduce  the  time  required for  a  branch  caused  by
internal delays. These delays are minimized becausewhen a branch instruction is
encountered,  the  microprocessor  begins  pre-fetch  instruction  at  the  branch
address.  The  instructions  are  loaded  into  the  instruction  cache,  so  when  the
branch occurs, the instructions are present and allow the branch to execute in one
clocking period. If for any reason the branch prediction logic errors, the branch
requires  an  extra  three  clocking  periods  to  execute.  In  most  cases,  the  branch
prediction is correct and no delay ensues.
AC23  Microprocessor Based System Design
21
(ii) Paging  Unit: The  paging  mechanism  functions  with  4K  –  byte  memory
pages or with a new extension available to the Pentium with 4M byte-memory
pages.  In  the  Pentium,  with  the  new  4M-byte  paging  feature  memory  for  the
page-table reduced to single page table.
(iii)  Assembler:An assembler or macro-assembler generally forms a part of the
operating system. Which translates a assembly language program into machine
language program.
(iv)  Microprocessor development system:Computer systems have undergone
many changes recently. Machines that once filled large areas have been reduced
to  small  desktop  computer  systems  because  of  the  microprocessor.  Although
these  desktop  computers  are  compact,  they  possess  computing  power  that  was
only dreamed of a few years ago.
The blocks of the microprocessor based system are
1.  The Memory and I/O System
2.  The DOS Operating System
3.  The Microprocessor
Q.23  Explain the following instructions:
(i) TEST (ii) NEG (iii) CMP (iv) DAA.  (8)
 Ans
(i)  TEST: The TEST instruction performs the AND operation. The difference is
that  the  AND  instruction  changes  the  destination  operand,  while  the  TEST
instruction  does  not.  A  TEST  only  affects  the  condition  of  the  flag  register,
which indicates the result of the test.
(ii) NEG:  Arithmetic  sign  inversion  or  two’s  complement  (NEG).  The  NEG
instruction two’s complements a number, which meansthat the arithmetic sign of
a signed number changes from positive to negative or from negative to positive.
(iii)CMP: The comparison instruction (CMP) is a subtraction that changes only
the flag bits; the destination operand never changes. A comparison is useful for
checking the entire contents of a register or a memory location against another
value.  A  CMP  is  normally  followed  by  a  conditional  jump  instruction,  which
tests the condition of the flag bits
(iv)  DAA: The DAA instruction follows the ADD or ADC instruction to adjust
the result into a BCD result. The DAA instruction functions only with the AL
register, this addition must occur eight bits at a time.
Q.24  With respect to serial communication define the following:
   (i) baud rate.  (ii) asynchronous communication.
   (iii) parity.  (iv) half duplex.  (4)
AC23  Microprocessor Based System Design
22
Ans
   Half Duplex Transmission: A half duplex channel  can send and receive, but not
at the  same  time.  It’s  like  a  one-lane  bridge  where two-way traffic  must  give
way in order to cross. Only one end transmits at a time, the other end receives.
   Asynchronous  means “no  synchronization”,  and thus  does  not  require sending
and receiving idle characters. However, the beginning and end of each byte of
data must be identified by start and stop bits. Thestart bit indicates when the
data  byte  is  about  to  begin  and  the  stop  bit  signals  when  it  ends.  The
requirement  to  send  these  additional  two  bits  causes  asynchronous
communication  to  be  slightly  slower  than  synchronous  however  it  has  the
advantage  that  the  processor  does  not  have  to  deal  with  the  additional  idle
characters.
   The rate of data transfer in serial data communication is denoted in bps. Bits per
second (bps) is the rate of transfer of informationbits. Baud is the number of
signal level changes per second in a line, regardless of the information content
of those signals. The baud and bps rates are not necessarily equal. The ratio of
BPS to baud depends on the information-coding scheme that you are using. For
example,  each  character  in  asynchronous  RS-232  coding  includes  a  start  and
stop bit that are not counted as information bits,  so the BPS rate is actually less
than the baud rate.
   Besides  the  synchronization  provided  by  the  use  of  start  and  stop  bits,  an
additional  bit  called  a  parity  bit  may  optionally be  transmitted  along  with  the
data.  Figure  shows  the  inclusion  of  an  additional  parity  bit  for  error  control
purposes. A parity bit affords a small amount of error checking, to help detect
data  corruption  that  might  occur  during  transmission.  You  can  choose  even
parity, odd parity, mark parity, space parity or none at all. When even or odd
parity is being used, the numbers of marks (logical1 bit) in each data byte are
counted,  and  a  single  bit  is  transmitted  following  the  data  bits  to  indicate
whether the number of 1 bit just sent is even or odd.
Fig. Framed data including a parity bit
For  example,  when  even  parity  is  chosen,  the  parity bit  is  transmitted  with  a
value of 0 if the number of preceding marks is an even number. For the binary
value of 0110 0011 the parity bit would be 0. If even parity were in effect and
the binary number 1101 0110 were sent, then the parity bit would be 1.
Q.25  What  is  the  importance  of  RS232-C  in  serial  communication?   Name  some
application where you see its use.   (4)
‘B’
D7 D6 D5 D4 D3 D2 D1 D0
‘C’ ‘A’
Stop
bit
Start
bit
Character frame,11 bits in total
Parity
bit
P
AC23  Microprocessor Based System Design
23
Ans RS-232  stands  for  Recommend  Standard  number  232  and  C  is  the  latest
revision of the standard. The serial ports on most  computers use a subset of the
RS-232C standard. The full RS-232C standard specifies a 25-pin “D” connector
of  which  22  pins  are  used.  Most  of  these  pins  are  not  needed  for  normal  PC
communications,  and  indeed,  most  new  PCs  are  equipped  with  male  D  type
connectors having only 9 pins. In the world of serial communications, there are
two different kinds of equipment:
•  DTE – Data Terminal Equipment
•  DCE – Data Communications Equipment
Q.26  Write short notes on (Any FOUR):-
(i)  8259.
(ii)  Real time clock.
(iii)  Real and protected mode.
(iv)  Super scalar architecture.
(v)  Comparison between Motorola processors and INTEL processors.
(4 x 4 = 16)
Ans
(i)  8259:
The 8259A adds 8 vectored priority encoded interrupts to the microprocessor. It can
be expanded to 64 interrupt requests by using one master 8259A and 8 slave units.
CS and WR must be decoded. Other connections are direct to microprocessor.
The pins D7 – D0: the bidirectional data connection, IR7 – IR0: Interrupt request,
used to request an interrupt & connect to a slave in a system with multiple 8259A.
WR :-Connects to a write strobe signal (lower or upper in a 16 bit system) , RD :-
Connects  to  the  IORC  signal  ,   INT  :-  Connects  to  the  INTR  pin  on  the
microprocessor from the master and is connected to a IR pin on a slave and INTA
:-  Connects  to  the  INTA  pin  on  the  microprocessor.  In  a  system  only  the  master
INTA signal is connected
A0  :-  Selects  different  command  words  with  in  the  8259A,   CS  :-  Chip  select  –
enables the 8259A for programming and control, SP/EN :- Slave Program (1 for
master,  0  for  slave)/Enable  Buffer  (controls  the  data  bus  transceivers  in  a  large
microprocessor based system when in buffered mode) and CAS2-CAS0 :- Used as
outputs from the master to the slaves in cascaded systems.
Fig : 8259 Block Diagram
AC23  Microprocessor Based System Design
24
(ii)  Real time clock:
A real-time clock keeps the time in real time – that is, in hours and minutes. The
software for the real-time clock contains an interrupt service procedure that is
called 60 times per second and a procedure that updates the count located in four
memory locations.
Assembler directives:
An  assembler  directive  is  a  statement  to  give  direction  to  the  assembler  to
perform  the  task  of  assembly  process.  The  assembler directives  control
organization of the program and provide necessary information to the assembler
to  understand  assembly  language  programs  to  generate  machine  codes.  They
indicate  how  an  operand  or  section  of  a  program  is  to  be  processed  by  the
assembler.  An  assembler  supports  directives  to  define  data,  to  organize
segments to control procedures, to define macros etc.
(iii)  Real and protected mode:
   Operation  of  Real  mode  interrupt:  When  the  microprocessor  completes
executing the current instruction, it determines whether an interrupt is active by
checking (1) instruction execution, (2) single –step, (3) NMI, (4) co-processor
segment  overrun,  (5)  INTR,  and  (6)  INT  instruction  in  the  order  presented.  If
one or more of these interrupt conditions are present, the following sequence of
events occurs:
1.  The contents of the flag register are pushed onto the stack
2.  Both the interrupt (IF) and trap (TF) flags are cleared. This disables the
INTR pin and the trap or single-step feature.
3.  The  contents  of  the  code  segment  register  (CS)  are  pushed  onto  the
stack.
4.  The contents of the instruction pointer (IP) are pushed onto the stack.
5.  The interrupt vector contents are fetched, and thenplaced into both IP
and  CS  so  that  the  next  instruction  executes  at  the interrupt  service
procedure addressed by the vector.
  Protected mode interrupt:
   In the protected mode, interrupts have exactly the same assignments as in real
mode,  but  the  interrupt  vector  table  is  different.  In  place  of  interrupt  vectors,
protected  mode  uses  a  set  of  256  interrupt  descriptors  that  are  stored  in  an
interrupt descriptor table (IDT).
(iv).  Super scalar architecture:
The  Pentium  microprocessor  is  organized  with  three  execution  units.  One
executes  floating-point  instructions,  and  the  other two  (U-pipe  and  V-pipe)
execute  integer  instructions.  This  means  that  it  is possible  to  execute  three
instructions simultaneously.
(v).  Comparison between Motorola processors and INTEL processors:
AMD/Intel  processors  are  really  about  the  same  thing.   They  run  the  same
software  and  operate  in a  very  similar  manner.  AMD is  often less expensive
than Intel, and depending on what you use a computer for one may be somewhat
faster than the other.
Motorola  has  been  largely  relegated  to  the  “also-ran”  category  of
microprocessor manufactures since Apple computer stopped using them in favor
of the IBM Power PC processor (Apple has since switched to Intel).
AC23  Microprocessor Based System Design
25
Motorola  had  an  excellent  32  bit  processor  design  years  before  Intel.
Furthermore,  the  design  of  the  Motorola  68000  processor  line  (from  a
programmer’s perspective) was immensely better. The two major features of the
68000 line that made this true were
1) Orthogonality of register access and
2) Number of registers available.
These features made writing code for Motorola CPUs much simpler.
Q.27    What is (i) USB (ii) AGP (iii) XMS (iv) EMS (v) TSR (vi) EDO RAM  (6)
 Ans
(i).  USB:The USB (UNIVERSAL SERIAL BUS) is intended to connect
peripheral  devices  such as  keyboards,  a mouse, modems, and sound cards  to
the microprocessor through a serial data path and atwisted pair of wires. The
main idea is to reduce system cost by reducing the  number of wires. Another
advantage is that the sound system can have a separate power supply from the
PC,  which  means  less  noise.  The  data  transfer  rates through the  USB are  12
Mbps at present.
(ii).  AGP:The latest addition to many computer systems is the inclusion
of the  accelerated graphics port(AGP). The AGP operates at the bus clock
frequency of the microprocessor. It is designed so  that a transfer between the
video  card  and  the  system  memory  can  progress  at  a  maximum  speed.  The
AGP can transfer data at a maximum rate of 528M bytes per second. This port
probably will never be used for any devices other than the video card.
(iii).  XMS:The  memory  system  is  divided  into  three  main  parts. TPA
(transient  program  area), system  area,  and  XMS  (extended  memory
system). The type of microprocessor in your computer determines whether an
extended memory system exists.
(iv).  EMS:The  area  at  location  C8000H-DFFFFFH  is  often  open  or  free.
This area is used for the expanded memory systemin a PC or XT system, or
for the upper memory system in an AT system. The EMS allows a 64K-byte
page frame of memory to be used by application programs.
(v).  TSR:The TPA also holds TSR (terminate and stay resident) programs
that remain in memory in an active state until activated by a hot-key sequence
or another event such as an interrupt.
(vi).  EDO RAM:A  slight  modification  to  the  structure  of  the  DRAM
changes the device into an EDO (extended data output) DRAM device. In the
EDO  memory,  any  memory  access,  including  a  refresh, stores  the  256  bits
selected  by  RAS’  into  latches.  These  latches  hold  the  next  256  bits  of
information,  so  in  most programs,  which  are  sequentially executed,  that  data
are available without any wait states.
Q.28  What are program invisible registers? Explain the purpose of the GDTR. If the
microprocessor  sends  linear  address  00200000H  to  the  paging  mechanism,
which paging directory entry and which page table entry is accessed?  (3)
AC23  Microprocessor Based System Design
26
 Ans, the global and local descriptor tables are found  in the memory system. In
order  to  access  and  specify  the  address  of  these  tables,  the  program  invisible
registers  used.  The  program  invisible  registers  are not  directly  addressed  by
software so they are given name.
   The  GDTR  (global  descriptor  table  register)  and  IDTR  (interrupt  descriptor
table  register)  contain  the  base  addresses  of  the  descriptor  table  and  its  limit.
The limit of each descriptor table is 16 bits because the maximum table length is
64  Kbytes.  When  the  protected  mode  operation  is  desired,  the  address  of  the
global descriptor table and its limit are loaded into the GDTR.
   For  linear  address  00000000H  –  003FFFFFH,  the  first  entry  of  the  page
directory is accessed. Each page directory entry represents or repages a 4-Mbyte
section of the memory system. The contents of the page directory select a page
table that is indexed by the next 10 bits of the linear address. This means that
address 00000000H – 00000FFFH selects page directory entry 0 and page table
entry 0.
Q.29  Discuss the salient features of a parallel programmable interface, 8255.  (4)
 Ans
•  24 I/O lines in 3 8-bit port groups – A, B, C
•  A, B can be 8-bit input or output ports
•  C can serve as 2 4-bit input or output ports
•  3 modes of operation:
–  Mode 0:A, B, C simple input or output level sensitive ports
–  Mode 1:A, B input or output ports with strobe control in C
–  Mode 2:A is bidirectional with control/handshake inB and C
•  A, B can only change 1 byte at a time
•  C has individual bit set/reset capability
•  Advantage  is  non-dedicated  circuit  can  change  port  configuration  with
software and no “glue logic”
•  Ports A, B, and C are used for I/O data.
•  The control register is programmed to select the operation mode of the three
ports A, B, and C.
•  Mode 0 : simple I/O mode
•  Any of the ports A, B, CL and CU can be programmed as input or output.
•  No control of individual bits (all bits are out or all bits are in)
•  Mode  1:  Ports  A  and  B  can  be  used  as  input  or  output  ports  with
handshaking.
•  Mode 2 : Port A can be used as bidirectional I/O port with handshaking
Q.30  What  do  you  understand  by  assembler  directives?  What  do  the  following
assembler directives do?
(i)  ASSUME
(ii)  SEGMENT
(iii)  DB
(iv)  PUBLIC   (8)
Ans
(i)  ASSUME: This directive will be used to map the segment register names
with memory addresses.
The Syntax is as follows:
AC23  Microprocessor Based System Design
27
ASSUME  SS: Stackseg, DS : Dataseg, CS:Codeseg
The ASSUME will tell the assembler to use the SS register with the address of the stack
segment whose name is stackseg.
(ii) SEGMENT:  This  directive  defines  to the assembler the  start  of  a  segment  with
name segment-name. The segment name should be unique and follows the rules of the
assembler
The Syntax is as follows:
Segment Name SEGMENT  {Operand (Optional)} ; Comment
.
.
.
Segment Name  ENDS.
(iii)  DB  (Define  Byte): The  DB  directive  defines  a  byte-type  variable  (i.e.  a
variable which occupies one byte of memory space).  In a given directive statement,
there may be single initial value or multiple values of the defined variable. If there is
one initial value, one byte of memory space is reserved. If there are multiple values,
one byte of memory space is reserved for each value. The general format is:
  Name of Variable DB Initial value or values.
(iv)  The  PUBLIC and  EXTRN  directives  are  very  important  to  modular
programming. PUBLIC used to declare that labels of  code, data, or entire segments
are available to other program modules. EXTRN (external) declares that labels are
external to modules. Without these statements, modules could not be linked together
to create a program by using modular programming techniques. They might link, but
one module would not be able to communicate to another.
  The  PUBLIC  directive  is  placed  in  the  opcode  field  of  an  assembly  language
statement to define a label as public, so that the label can be used by other modules.
Q.31  Discuss the role of a bus arbiter in a multiprocessor configuration.  (4)
Ans,  Bus  arbiter:  Which  functions  to  resolve  priority  between  bus  masters  and
allows  only  one  device  at  a  time  to  access  the  shared  bus.  The  8289  bus  arbiter
controls the interface of a bus master to a shared  bus. This is designed to function
with the 8086/8088 microprocessors. Each bus masteror microprocessor requires an
arbiter for the interface to the shared bus, which Intel calls the MULTIBUS and IBM
calls the MICRO CHANNEL.
The shared bus used only to pass information from one microprocessor to another;
otherwise, the bus master function in their own local bus modes by using their own
local programs, memory, and I/O space. Microprocessors connected in this kind of
system are often called parallel or distributed processors because they can execute
software and perform tasks in parallel.
Q.32  Show  how  a  typical  DMA  controller  can  be  interfac ed  to  an  8086/8085  based
maximum mode system.   (8)
Ans, For 8088 in maximum mode:
AC23  Microprocessor Based System Design
28
The  RQ/GT1  and  RQ/GT0  pins  are  used  to  issue  DMA  request  and  receive
acknowledge signals. Sequence of events of a typical DMA process
 1) Peripheral asserts one of the request pins, e.g. RQ/GT1 or RQ/GT0 (RQ/GT0 has
higher priority)
  2) 8088 completes its current bus cycle and enters into a HOLD state
3) 8088 grants the right of bus control by asserting a grant signal via the same pin as
the request signal.
  4) DMA operation starts
5) Upon completion of the DMA operation, the peripheral asserts the request/grant
pin again to relinquish bus control.
Q.33     What  is  a  co-processor?  What  is  its  use  in  a  typical  microprocessor  based
system.  (8)
 Ans8087 NDP (numerical data processor) is also known  as math co-processor
which  is  used  in  parallel  with  the  main  processor  for  number  crunching
applications,  which  would  otherwise  require  complex programming.  It  is  also
faster than 8086/8088 processor in performing mathematical computation. It has
its own specialized instruction sets to handle mathematical programs.
 It is a processor which works in parallel with the main processor. It has its own
set  of  specialized  instructions.  The  number  crunching  part  of  the  program  is
executed  by  8087.  Instruction  for  8087  are  written  in  the  main  program
interspersed  with  the  8086  instructions.  All  the  8087  instruction  codes  have
11011 as the most significant bits of their first code byte.
Q.34   What  is  segmentation?  What  are  its  advantages?  How is  segmentation
implemented in typical microprocessors?  (8)
AC23  Microprocessor Based System Design
29
Ans
Segment memory addressing divides the memory into many segments. Each of these
segments  can  be  considered  as  a  linear  memory  space.  Each  of  these  segment  is
addressed by a segment register.
However since the segment register is 16 bit wide and the memory needs 20 bits for
an  address  the  8086  appends  four  bits  segment  register  to  obtain  the  segment
address. Therefore, to address the segment 10000H by , say the SS register, the SS
must contain 1000H.
The first advantage that memory segmentation has isthat only 16 bit registers are
required both to store segment base address as wellas offset address. This makes the
internal circuitry easier to built as it removes the requirement for 20 bits register in
case the linear addressing method is used. The second advantage is relocatability.
Q.35 What is a PCI bus? Discuss its features and usage.  (6)
Ans
  Peripheral  Component  Interconnect  (PCI):  This  bus was  developed  by  Intel  and
introduced in 1993. It is geared specifically to fifth- and sixth-generation systems,
although the latest generation 486 motherboards usePCI as well.
PCI bus has plug – and – play characteristics and the ability to function with a 64-bit
data bus. A PCI interface contains series of registers, located in a small memory device
on the PCI interface that contains information about the board.
Q.36   How is EISA bus different from ISA bus?  (4)
Ans
The Extended Industry Standard Architecture (EISA) is a 32 bit modification to the ISA
bus. As computers became larger and had wider data buses, a new bus was needed that
would transfer 32-bit data. The clocking speed limited up to 8MHz. The most common
application for the EISA bus is a disk controller or as a video graphics adapter. These
applications  benefit  from  the  wider  data  bus  width  because  the  data  transfer  rate  for
these devices are high.
Q.37   Differentiate between synchronous and asynchronoustypes of serial communication.
(6)
Ans Serial  data  communication  uses  two  basic  types,  synchronous  and
asynchronous.  With  synchronous  communications,  the  two  devices  initially
synchronize themselves to each other, and then continually send characters to stay in
sync. Even when data is not really being sent, a constant flow of bits allows each
device to know where the other is at any given time. That is, each character that is
sent is either actual data or an idle character.
Asynchronous  means  “no  synchronization”,  and  thus  does  not  require  sending  and
receiving idle characters. However, the beginning and end of each byte of data must be
identified by start and stop bits. The start bit indicates when the data byte is about to
begin and the stop bit signals when it ends. The requirement to send these additional
two  bits  causes asynchronous  communication  to  be  slightly slower  than synchronous
however  it  has  the  advantage  that  the  processor  does  not  have  to  deal  with  the
additional idle characters.
AC23  Microprocessor Based System Design
30
Q.38   Draw and explain the block diagram of programmable interrupt controller 8259.
(8)
Ans The  8259A  adds  8  vectored  priority  encoded  interrupts  to  the
microprocessor. It can be expanded to 64 interrupt requests by using one master
8259A and 8 slave units. CS and WR must be decoded.Other connections are
direct to microprocessor.
The pins D7 – D0: the bidirectional data connection, IR7 – IR0: Interrupt request,
used to request an interrupt & connect to a slave in a system with multiple 8259A.
WR :-Connects to a write strobe signal (lower or upper in a 16 bit system) , RD :-
Connects  to  the  IORC  signal  ,   INT  :-  Connects  to  the  INTR  pin  on  the
microprocessor from the master and is connected to a IR pin on a slave and INTA
:-  Connects  to  the  INTA  pin  on  the  microprocessor.  In  a  system  only  the  master
INTA signal is connected
A0  :-  Selects  different  command  words  with  in  the  8259A,   CS  :-  Chip  select  –
enables the 8259A for programming and control, SP/EN :- Slave Program (1 for
master,  0  for  slave)/Enable  Buffer  (controls  the  data  bus  transceivers  in  a  large
microprocessor based system when in buffered mode) and CAS2-CAS0 :- Used as
outputs from the master to the slaves in cascaded systems.
Fig : 8259 Block Diagram
Q.39   Discuss the various types of memory devices that you are familiar with.  (8)
 Ans
All  of  the  memory  used  as  main  store  in  a  modern  computer  is implemented as
semiconductors fabricated on wafers of silicon. Semiconductor memory is fast and
easy  to  use.  To  fulfil  the  needs  of  modern  computer systems  it  is  becoming
increasingly dense (more bits per chip) and cheap.
A semiconductor memory chip consists of a large number of cells organized into
an  array,  and  the  logic  necessary  to  access  any  array  in  the  cell  easily.  Semiconductor memory may be classed according to the mechanism used by each cell
to  store  data.  The  simplest  type  of  memory  is  called  static  memory.  In  static
AC23  Microprocessor Based System Design
31
memory each cell uses a flip-flop made from four orsix transistors. The data in
each cell is remembered until the power is switchedoff. Static memory is easy to
use  and  reliable,  but  is  relatively  bulky,  slow  and expensive.  Most  computer
systems therefore use dynamic memory as their main store. Dynamic memory uses
just  a  single  transistor  per  cell,  and  is  therefore denser,  faster  and  cheaper.
Unfortunately each cell gradually forgets the data stored in it, and so extra circuitry
must be used to continually refresh the cells.
Memory,  with  regard  to  computers,  most  commonly  refers  to  semiconductor
devices whose contents can be accessed (i.e., read and written to) at extremely high
speeds. The main characteristics of semiconductor memory are based on capacity,
organization  and  access  time.  In  microprocessor-based  systems  semiconductor
memories are used as primary storage for code and data.
In  contrasts  with  storage,  which  (1)  retains  programs  and  data  regardless  of
whether  they  are  currently  in  use  or  not,  (2)  retains  programs  and  data  after  the
power supply has been disconnected, (3) has much slower access speeds and (4)
has a much larger capacity (and a much lower cost).Examples of storage devices
are  hard  disk  drives  (HDD),  floppy  disks,  optical  disks  (e.g.,  CDROMS  and
DVDs) and magnetic tape.
The term memory as used in a computer context originally referred to the magnetic
core memory devices that were used beginning in the1950s. It was subsequently
applied to the semiconductor memory devices that replaced core memories in the
1970s.
Computer  memory  today  consists  mainly  of  dynamic  random  access  memory
(DRAM)  chips  that  have  been  built  into  multi-chip  modules  that  are,  in  turn,
plugged  into  slots  on  the  motherboard  (the  main  circuit  board  on  personal
computers  and  workstations).  This  DRAM  is  commonly  referred  to  as  RAM
(random access memory), and it constitutes the mainmemory of a computer.
The random in random access memory refers to the fact that any location in such
memory  can  be  addressed  directly  at  any  time.  This  contrasts  with  sequential
access  media,  such  as  magnetic  tape,  which  must  be  read  partially  in  sequence
regardless of the desired content.
There  are  three  basic  kinds  of  memory  used  in  microprocessor  systems  –
commonly  called  ROM,  RAM,  and  hybrid.  ROM  and  RAM  are   –  “Read  Only
Memory” and “Random Access Memory”. The program maybe stored in ROM or
RAM  –  the  program  does  not  normally  change  while  it executes  –  while  data  is
stored in the registers and RAM. Of course, if you  turn off the chip and turn it on
again, you have lost all the contents of the registers, and RAM.
In  a  typical  computer,  as  much  as  possible  is  in  RAM,  to  give  the  maximum
possible  flexibility;  you  have  basic  programmes  allowing  you  to  interact  with
discs, keyboards and the display in ROM, and load in as much of the software as
possible when you run the programs.
Q.40  Write explanatory notes on Microprocessor development system.  (16)
 Ans,
 Microprocessor development system:
Computer  systems  have  undergone  many  changes  recently.  Machines  that  once
filled large areas have been reduced to small desktop computer systems because of
AC23  Microprocessor Based System Design
32
the microprocessor. Although these desktop computers are compact, they possess
computing power that was only dreamed of a few years ago.
The blocks of the microprocessor based system are
1.  The Memory and I/O System
2.  The DOS Operating System
3.  The Microprocessor
Q.41    Discuss DOS function call and BIOS function call with one example of each.  (5)
Ans
DOS function call:
In order to use DOS function calls, always place the function number into register
AH and load all other pertinent information into registers, as described in the entry
data  table  (Refer  Text1-page  no  809).  Once  this  is  accomplished,  follow  with  an
INT 21H to execute the DOS function.
Example: MOV AH, 6
  MOV DL, ‘A’
  INT 21H.
Example shows how to display an ASCII A on the CRT screen at the current cursor
position with a DOS function call.
  BIO stands for Basic Input Output System. It is aset of programs to provide most
basic low-level services such as services keyboard,disks, serial port, printer, display,
and  bootstrap.  BIOS  programs  are  stored  in  a  ROM.  When  power  is  switched  on
ROM-BIOS takes the control of a computer. First of  all, ROM-BIOS programs for
power-on-self test are executed. These tests check  that whether the computer is in
proper working order after this test, the process of loading the operating system into
main  memory  is  called  booting.  ROM-BIOS  contains  a  program  called  bootstrap
loader, this directs CPU to read from the disk a specific program called boot and to
load it into main memory.
BIOS function callsare found stored in the system and video BIOS ROMs. These
BIOS ROM function directly control the I/O devices,with or without DOS loaded
into a system.
  INT10H: This is a BIOS interrupt is often called the video services interrupt because
it  directly  controls  the  video  display  in  a  system. The  INT10H  instruction  uses  a
register  AH  to  select  video  services  provided  by  this  interrupt.  The  video  BIOS
ROM is located on the video board and varies from one video card to another.
  INT11H:  This  function  used  to  determine  the  type  of  equipment  installed  in  the
system.
  INT12H: The memory size is returned by the INT 12H instructions.
  INT13H: This call controls the diskettes and alsofixed or hard disk drives attached
to the system.
  INT14H: This call controls the serial COM ports attached to the computer.
Q.42  Differentiate between real and protected modes of an Intel microprocessor. Discuss
protected mode memory addressing in brief.  (7)
Ans  Operation  of  Real  mode  interrupt:  When  the  microprocessor  completes
executing  the  current  instruction,  it  determines  whether  an  interrupt  is  active  by
checking  (1)  instruction  execution,  (2)  single  –step,  (3)  NMI,  (4)  co-processor
segment overrun, (5) INTR, and (6) INT instruction in the order presented. If one or
AC23  Microprocessor Based System Design
33
more  of  these  interrupt  conditions  are  present,  the following  sequence  of  events
occurs:
1.  The contents of the flag register are pushed onto the stack
2.  Both the interrupt (IF) and trap (TF) flags are cleared. This disables the
INTR pin and the trap or single-step feature.
3.  The  contents  of  the  code  segment  register  (CS)  are  pushed  onto  the
stack.
4.  The contents of the instruction pointer (IP) are pushed onto the stack.
5.  The interrupt vector contents are fetched, and thenplaced into both IP
and  CS  so  that  the  next  instruction  executes  at  the interrupt  service
procedure addressed by the vector.
  Protected mode interrupt:
   In the protected mode, interrupts have exactly the same assignments as in real
mode,  but  the  interrupt  vector  table  is  different.  In  place  of  interrupt  vectors,
protected  mode  uses  a  set  of  256  interrupt  descriptors  that  are  stored  in  an
interrupt descriptor table (IDT).
Q.43What  do  you  mean by the  term  procedure? What is  the  difference  between  near
call and far call?   (4)
Ans
PROC:  The  PROC and  ENDP  directives  indicate  the  start  and  end  of a procedure.
These directives force structure because the procedure is clearly defined. The PROC
directive indicates the start of a procedure, must  also be followed with a NEAR or
FAR.  A  NEAR  procedure  is  one  that  resides  in  the  same  code  segment  as  the
program. A FAR procedure may reside at any locationin the memory system.
Q.44  Design an address decoding logic using a 3:8 decoder (74138) to interface a total of
64k  memory  locations  in  the  address  range  from  F0000  to  FFFFF.   Divide  64k
memory locations in eight blocks of 8 k locations each and generate eight chip select
signals.  (8)
  Ans
  Text1-page 350
Q.45   Draw  and  explain  the  block  diagram  of  DMA  controller.  Also  explain  the  various
modes in which DMAC works.  (8)
Ans
Direct memory access (DMA)  is a process in which an external device takes over
the  control  of  system  bus  from  the  CPU.DMA  is  for  high-speed  data  transfer
from/to mass storage peripherals, e.g. hard disk drive, magnetic tape, CD-ROM, and
sometimes video controllers. For example, a hard disk may boasts a transfer rate of 5
M bytes per second, i.e.1 byte transmission every 200 ns. To make such data transfer
via the CPU is both undesirable and unnecessary.
The basic idea of DMA is to transfer blocks of data directly between memory and
peripherals. The data don’t go through the microprocessor but the data bus is occupied.
“Normal” transfer of one data byte takes up to 29 clock cycles. The DMA  transfer
requires only 5 clock cycles.
AC23  Microprocessor Based System Design
34
The  modes  of  operation  include  demand  mode,  single  mode,  block  mode,  and
cascade mode. Demand mode transfers data until an external EOP is input or until
the DREQ input becomes inactive. Single mode releases the HOLD after each byte
of  data  transferred.  Block  mode  automatically  transfers  the  number  of  bytes
indicated  by  the count  register  for the  channel.  Cascade  mode  is  used  when  more
than one 8237 is present in a system.
 Q.46 What is DRAM? What do you understand by DRAM refreshing? With the help of a
block diagram, show how DRAM can be interfaced to amicroprocessor.  (6)
  Ans Dynamic RAM (DRAM) is essentially the same as SRAM,except that it retains
data for only 2 or 4 ms on an internal capacitor. After 2 or 4 ms, the contents of the
DRAM must be completely rewritten (refreshed) because the capacitors, which store
logic 1 or logic 0, lose their charges. The entire  content of the memory is refreshed
with 256 reads in a 2-to-4 ms interval. Refreshing also occurs during a write, a read
or during a special refresh cycle.
  Text 1 – Fig (page 342).
Q.47  Discuss  mode  –2  (bi-directional  mode)  of  8255  (Programmable  Peripheral
Interface).   (6)
AC23  Microprocessor Based System Design
35
Ans
Q.48   Discuss the following: (ANY THREE)  (12)
(i)  Some features of Pentium series of microprocessors.
(ii)  Virtual memory.
(iii)  MMX Technology.
(iv)  Graphics adapters.
Ans
(i).  Some features of Pentium series of microprocessors:
The Pentium is a 32-bit superscalar, CISC microprocessor. The term superscalar is
used for the processor which contains more than onepipeline to execute more than
one instruction simultaneously in parallel.
The main features of Pentium are, it has two ALU’s,one floating-point unit, two 8
KB cache, pre-fetch buffers, a branch target buffer. Two ALU’s means that there are
two pipelines. Each ALU contains five functional units. The two pipelines are integer
pipelines. They are named U and V pipeline.
When Pentium was introduced, its operating frequency was 60 MHz. gradually; the
operating frequency was raised to 233 MHz. The Pentium uses 0.6 micron Bi-CMOS
process technology. It uses power management feature.
The  memory  management  is  improved  by  adding  paging  unit  and  a  new  system
memory-management mode.
Paging Unit: The paging mechanism functions with 4K– byte memory pages or with
a  new  extension  available  to  the  Pentium  with  4M  byte-memory  pages.  In  the
Pentium, with the new 4M-byte paging feature memoryfor the page-table reduced to
single page table.
Memory – management mode: The system memory-management mode (SMM) is on
the same level as protected mode, real mode, and virtual mode, but it is provided to
function as a manager. The SMM is not intended to be used as an application or a
system  level  feature.  It  is  intended  for  high-level system  functions  such  as  power
management.
AC23  Microprocessor Based System Design
36
(ii).  Virtual memory:
  The  term  virtual  memory  refers  to  something  which appears  to  be  present  but
actually it is not. The virtual memory technique allows users to use more memory
for  a  program  than  the  real  memory  of  a  computer.  A programmer  can  write  a
program  which  requires  more  memory  space  than  the  capacity  of  the  main
memory. Such a program is executed by virtual memory technique. The program is
stored in the secondary memory. The memory management unit (MMU) transfers
the currently needed part of the program from the secondary memory to the main
memory for execution. This part of the program is executed by the processor. After
execution this part of the program is sent back to  the secondary memory together
with the immediate results. Thereafter, the CPU takes another part of the program
for execution. Thus the main memory always keeps only the currently needed part
of the program. This type of ‘to and fro’ movement  instructions and data between
the  main  memory  and  secondary  memory  is  called  swapping.  Thus  a  program
requiring more memory space than the capacity of the main memory can executed
using a swapping technique. This concept is known avirtual memory technique.
(iii).  MMX Technology:
   MMX  (Multimedia  extensions)  technology  adds  57  new  instructions  to  the
instruction  set  of  the  Pentium  –  4  microprocessors. The  MMX  technology  also
introduces  new  general  purpose  instructions.  The  new  MMX  instructions  are
designed  for  application  such  as  motion  video,  combined  graphics  with  video,
image processing, audio synthesis, speech synthesisand compression, telephony,
video conferencing, 2D graphics, and 3D graphics. These new instructions operate
in parallel with other operations as the instruction for the arithmetic coprocessor.
  The MMX architecture introduces new packed data types. The data types are eight
packed,  consecutive  8-bit  bytes;  four  packed, consecutive  16-bit  words;  and  two
packed, consecutive 32-bit double words.
(iv)  Graphics adapters:
Video card converts digital output from the computer into an analog video signal
and sends the signal through a cable to the monitoralso called a graphics card.
•  The number of colours a video card displays is determined by its bit depth
•  The video card’s bit depth, also called the color depth, is the number of bits it
uses to store information about each pixel
•  i.e. 8-bit video card uses 8 bits to store information about each pixel; this video
card can display 256 colors (2x2x2x2x2x2x2x2)
•  i.e. 24-bit video card uses 24 bits to store information about each pixel and can
display 16.7 million colors
•  The greater the number of bits, the better the resulting image
Video Electronics Standards Association (VESA),  which consists of video card
and  monitor  manufacturers,  develops  video  stands  to define  the  resolution,
number of colors, and other display properties.
a.  Monochrome Display Adapter (MDA)
b.  Hercules Graphics Card
c.  Colour Graphics Adapter (CGA)
d.  Enhanced Graphics Adapter (EGA)
e.  Video Graphics Adapter (VGA)
f.  Super VGA (SVGA) and Other Standards Beyond VGA
AC23  Microprocessor Based System Design
37
Q.49  Write explanatory notes on (ANY FOUR)
(i)  Paging
(ii)  8284 Clock generator
(iii)  Assembler Directives
(iv)  Hard disk drive controller  (16)
Ans
(i)  Paging:
   The  memory  paging  mechanism  located  within  the  80386  and  above  allows  any
physical memory location to be assigned to any linear address. The linear address is
defined as the address generated by a program.  Withthe memory paging unit, the
linear  address  is  invisibly  translated  into  any  physical  address,  which  allows  an
application written to function at a specific address to be located through the paging
mechanism. It also allows memory to be placed into areas where no memory exists.
(ii)  8284 Clock generator:
The 8284 is an ancillary component to the microprocessors. Without clock generator,
many  additional  circuits  are  required  to  generate  the  clock  in  an  microprocessor
based  system.  A  8284  provides  the  following  basic  functions  or  signals:  Clock
generation,  RESET  synchronization,  READY  synchronization,  and  a  TTL-level
peripheral clock signal.
(iii)  Assembler Directives:
An assembler directive is a statement to give direction to the assembler to perform
the  task  of  assembly  process.  The assembler  directives  control  organization  of  the
program and provide necessary information to the assembler to understand assembly
language  programs  to  generate  machine  codes.  They  indicate  how  an  operand  or
section  of  a  program  is  to  be  processed  by  the  assembler.  An  assembler  supports
directives  to  define  data,  to  organize  segments  to  control  procedures,  to  define
macros etc.
(iv)  Hard disk drive controller:  This converts instructions from software running
on  the  computer  to  the  electrical  signals  required  to  operate  the  hard  disk.  The
function of a disk controller is disk drive selection, track and sector selection, head
loading, to parallel and parallel to serial conversion of data, error checking etc. The
data  recorded  on  a  magnetic  disk  is  the  combination of  clock  and  data.  Therefore,
data read must be separated from the clock information. The data processed by a CPU
or  stored  in  the  main  memory  is  in  the  byte  form.  The  bytes  to  be  recorded  on  a
magnetic disk must be converted into serial format.
Q.50  What  do  you  mean  by  Macro?  Discuss  merits  and  dem erits  of  Macro  over
procedures  .  (6)
   Ans MACRO:A sequence of instructions to which a name is assigned is called
macro. Macros and subroutines are similar. Macros are used for short sequence
of instructions whereas subroutines for longer ones. Macros executes faster than
subroutines.
AC23  Microprocessor Based System Design
38
The MACRO directive informs assembler the beginningof a macro This is used
with  ENDM  directive  to  enclose  a  macro.  The  general format  of  the  MACRO
directive is :
Macro Name  MACRO  ARG1, ARG2 , …..,ARG N.
The  difference  is  that  a  procedure  is  accesses  via  a  CALL  instruction,  while  a
macro and all the instructions defined in the macro, are inserted in the program at
the point of usage. Creating macro is very similar  to creating a new op-code that
can be used in the program.
Q.51   Draw and discuss power failure detection circuit interrupt NMI.  (6)
   Ans
   The  non-maskable  interrupt  (NMI)  is  an  edge-triggered  input  that  requests  an
interrupt  on  the  positive-edge.  After  a  positive  edge,  the  NMI  pin  must  remain
logic 1 until it is recognized by the microprocessor.
   The NMI input is often used for parity errors and other major system faults, such as
power failures. Power failure is easily detected bymonitoring the AC power line
and causing an NMI interrupt whenever AC power drops out. In response to this
type of interrupt, the microprocessor stores all ofthe internal register in a battery
backed-up-memory  or  an  EEPROM.  The  below  fig  shows  a  power  failure
detection circuit that provides a logic 1 to the NMI input when ever AC power is
interrupted.
Q.52   Interfaced 2k X 8 (i.e 2716) EPROM using multiple input NAND gate decoder for
memory locations FF800H-FFFFFH.   (4)
 Ans
Simple  NAND  gate  Decoder:  When  the  2k  x  8  EPROM  is  used,  address
connection A10 – A0 of the 8088 are connected to address inputs A10-A0 of the
EPROM. The remaining nine address pins (A19-A11) are connected to the inputs
of a NAND gate decoder. The decoder selects the EPROM from one of the many
2Kbyte sections of the entire 1Mbyte address range of the 8088 microprocessor.
AC23  Microprocessor Based System Design
39
   In this circuit, a single NAND gate decodes the memory address. The output of the
NAND gate is logic 0 whenever the 8088 address pinsattached to its inputs (A19-A11) are all logic 1s. The active low , logic 0 output of the NAND gate decoder is
connected to the CE’ input pin that selects (enables) the EPROM.
Q.53  Explain the functions of the following:
   (i) Debugger  (ii) Assembler
   (iii) Linker   (6)
   Ans
(i)  Debugger: It is a program which allows user to testand debug programs. All
computers including microprocessor kits provide debugging facility. To detect
errors  a  program  can  be  tested  in  single  steps.  Each  step  of  the  program  is
executed and tested. The debugger allows the user to examine the contents of
registers and memory locations after each step of execution. This also provides
facility to insert breakpoint in the programs.
(ii)  Assembler:  An  assembler  or  macro-assembler  generally  forms  a  part  of  the
operating system. Which translates a assembly language program into machine
language program.
(iii)  Linker: A large program is divided in smaller programs known as modules. A
linker  is  a  program  which  links  smaller  programs  together  to  form  a  large
program. While developing a program subroutines, which are stored in library
file, are frequently used in the program. The linker also links these subroutines
with the main program.
AC23  Microprocessor Based System Design
40
Q.54   Discuss DMA definition and operation in brief  (4)
   Ans
Direct memory access (DMA) is a process in which an external device takes over
the  control  of  system  bus  from  the  CPU.DMA  is  for  high-speed  data  transfer
from/to  mass  storage  peripherals,  e.g.  harddisk  drive,  magnetic  tape,  CD-ROM,
and sometimes video controllers. For example, a hard disk may boasts a transfer
rate of 5 M bytes per second, i.e.1 byte transmission every 200 ns. To make such
data transfer via the CPU is
both undesirable and unnecessary.
The basic idea of DMA is to transfer blocks of data directly between memory and
peripherals.  The  data  don’t  go  through  the  microprocessor  but  the  data  bus  is
occupied.  “Normal”  transfer  of  one  data  byte  takes  up  to  29  clock  cycles.  The
DMA transfer requires only 5 clock cycles.
Nowadays, DMA can transfer data as fast as 60 M byte per second. The transfer
rate is limited by the speed of memory and peripheral devices.
Q.55  Write an assembly language program to find average of ‘n’ integers.  (6)
Ans
MOV AX, 0000 ; Initial sum 0000
MOV BX, 0000
MOV SI , 0201H
MOV CX, [SI]
BACK: INC SI
INC SI
ADD AX, [SI]
JAE  GO
AC23  Microprocessor Based System Design
41
INC BX
GO: LOOP BACK
MOV [0401], AX
MOV [0403], BX
INT 3
Q.56 Explain following instructions in 8086 family with example and their effect on flag.
   (i) CWD  (ii) IDIV  (iii) AAS  (iv) SAR
   (v) LOOP  (vi) SAHF  (vii) BOUND  (viii) IMUL  (12)
Ans
(i)  CWD (Convert signed word to signed double word): CWD instruction extends
the sign bit of a word in AX register to all the bits of the DX register. It is used
before  a  signed  word  in  AX  is  to  be  divided  by  another  signed  word  using
IDIV instruction. No flags are affected.
(ii)  IDIV  :  This  instruction  is  used  to  divide a  16-bit  signed  number  by  an  8-bit
signed number or 32 bit signed number by a 16-bit signed number. The 32 bit
dividend is placed in DX and AX registers. The 16 bit divisor is placed in a
specified 16-bit register or memory locations. No flags are affected.
(iii)  AAS: (ASCII adjust after subtraction) It is used toadjust the AX register after a
subtraction operation.
(iv)  SAR:  (Shift  each  bit  of  operand  right  by  specified  number  of  bits),  this
instruction shifts each bit of the operand which iscontained in an 8-bit or 16-bit
register or memory locations, right by the specified number of bits. The LSB of
the operand is shifted into carry flag. The MSB which is a sign bit for the sign
operand is retained in MSB position.
Flags affected are: OF, SF, ZF, PF and CF.
(v)  LOOP: (Jump to specified label until CX = 0) this isused to repeat a sequence
of  instructions  for  the  specified  number  of  times.  The  number  of  times  the
specified  sequence  is  to  be  repeated  is  stored  in  CX  register.  No  flags  are
affected.
(vi)  SAHF: (Store AH register into flag register) It is  an instruction used to store
the data in the AH register into the lower eight bits of the flag register.
(vii)  BOUND:  The  BOUND  instruction,  which  has  two  operands,  compares  a
register with two words of memory data.
(viii) IMUL: This is an instruction for multiplication of  two signed numbers. The
result is a signed numbers. The OF (Over flow) andCF (Carry flag) are get
affected.
Q.57  Explain keyboard interfacing to 8088 through 8279.  (8)
AC23  Microprocessor Based System Design
42
Ans
   The 8279 is a programmable keyboard and display  interfacing component that scans
and encodes up to a 64-key keyboard and controls upto a 16-digit numerical display.
The keyboard interface has built in first-in first-out (FIFO) buffer that allows it store
up  to  eight  keystrokes  before  the  microprocessor  must  retrieve  a  character.  The
display section controls up to 16 numeric displays from an internal 16 X 8 RAM that
stores the coded display information.
The keyboard section consists of eight lines that can be connected to eight columns
of a keyboard, plus two additional lines as well asto shift and CNTL/STB keys. The
key pressed are automatically debounced and the keyboard can operate in two modes
two –key lock out or n-key rollover. If two keys inthe two –key lock out mode are
pressed  simultaneously,  only first  key  is  recognized.  In  the  N-key roll  over  mode,
simultaneous key are recognized and their codes arestored in the internal buffer.
  Control Word: 000DDMMM – Mode set is command withan op-code of 000 and
two fields programmed to select the mode of operation for the 8279. The DD field
selects the mode of operation for the display and the MMM field selects the mode of
operation for the keyboard.
D7  D6  D5  Function  Purpose
0  0  0  Mode Set
Selects the number of display
positions, left or right entry,
and type of keyboard scan.
0  0  1  Clock
Programs the internal clock
and sets the scan and debounce times
0  1  0  Read FIFO
Selects the type of FIFO read
and the address of the read
0  1  1  Read display
Selects the type of display
read and address of the read
1  0  0  Write display
Selects the type of write and
address of the write
1  0  1
Display write
inhibit
Allows half-bytes to be
blanked
1  1  0  Clear  Clears the display of FIFO
1  1  1  End interrupt
Clears the IRQ signal to the
microprocessor
The 8279 control word summary
Q.58  Discuss the operation of a real mode interrupt and protected mode interrupt.  (6)
  Ans   Operation  of  Real  mode  interrupt:  When  the  microprocessor  completes
executing  the  current  instruction,  it  determines  whether  an  interrupt  is  active  by
checking  (1)  instruction  execution,  (2)  single  –step,  (3)  NMI,  (4)  co-processor
segment overrun, (5) INTR, and (6) INT instruction in the order presented. If one or
more  of  these  interrupt  conditions  are  present,  the following  sequence  of  events
occurs:
AC23  Microprocessor Based System Design
43
1.  The contents of the flag register are pushed onto the stack
2.  Both the interrupt (IF) and trap (TF) flags are cleared. This disables the
INTR pin and the trap or single-step feature.
3.  The  contents  of  the  code  segment  register  (CS)  are  pushed  onto  the
stack.
4.  The contents of the instruction pointer (IP) are pushed onto the stack.
5.  The interrupt vector contents are fetched, and thenplaced into both IP
and  CS  so  that  the  next  instruction  executes  at  the interrupt  service
procedure addressed by the vector.
  Protected mode interrupt:
  In the protected mode, interrupts have exactly the same assignments as in real mode,
but  the  interrupt  vector  table  is  different.  In  place  of  interrupt  vectors,  protected
mode uses a set of 256 interrupt descriptors that are stored in an interrupt descriptor
table (IDT).
Q.59  Write  an  assembly  language  program  to  find  one’s  complement  and  two’s
complement of an 8-bit number   (4)
Ans
  One’s complement of an 8-bit number
  LDA 2501H
  CMA
  STA 2502H
  HLT.
  Two’s complement of an 8-bit number
  LDA 2501H
  CMA
  INR A
  STA 2502H
  HLT.
Q.60  Discuss the following terms: (Any six)
(i) Branch prediction logic in Pentium
(ii) Cache structure in Pentium
(iii) Threaded system
(iv) Super scalar architecture
(v)  Real time operating system
(vi)  D/A conversion   (12)
Ans,
(i)  Branch  prediction  logic  in  Pentium:  The  Pentium  microprocessor  uses  branch
prediction  logic  to  reduce  the  time  required  for  a  branch  caused  by  internal  delays.
These  delays  are  minimized  because  when  a  branch  instruction  is  encountered,  the
microprocessor begins pre-fetch instruction at the branch address. The instructions are
loaded  into  the  instruction  cache,  so  when  the  branch  occurs,  the  instructions  are
present and allow the branch to execute in one clocking period. If for any reason the
branch  prediction logic  errors,  the  branch  requires an  extra  three  clocking  periods  to
execute. In most cases, the branch prediction is correct and no delay ensues.
(ii)  Cache structure in Pentium:The cache in the Pentium has been changed from
the one found in the 80486 microprocessor. The Pentium contains two 8K-byte cache
AC23  Microprocessor Based System Design
44
memories instead of one as in the 80486. There is an 8K-byte data cache and an 8Kbyte  instruction  cache.  The  instruction  cache  stores  only  instructions,  while  the  data
cache stores data used by instructions.
(iii)  Threaded system:At times we need to implement an operating system that can
process multiple threads. Multiple threads are handled by the kernel using a real-time
clock interrupt. One method for scheduling processes in a small RTOS is to use a
time  slice  to  switch  between  various  processes.  The basic  time  slice  can  be  any
duration and is some what dependent on the execution speed of the microprocessor.
Each time slice is activated by a timer interrupt. The interrupt service procedure must
look to a queue to see whether a task is available to execute, and if it is, it must start
execution of the new task. If no new task is present, it must continue executing an
old task or enter an idle state and wait for a new  task to be queued. The queue is
circular and may contain any number of tasks for the system up to some finite limit.
(iv)  Super  scalar  architecture: The  Pentium  microprocessor  is  organized  with
three execution units. One executes floating-point instructions, and the other two (Upipe  and  V-pipe)  execute  integer  instructions.  This means  that  it  is  possible  to
execute three instructions simultaneously.
(v)  Real time operating system (RTOS):The RTOS is an operating system used
in embedded applications that performs tasks in a predictable amount of time. RTOS
much like any other operating system in that it contains the same basic sections.
There are three components to all operating systems: (1) initialization, (2) the kernel,
(3) data and procedures. The initialization sectionis used to program all hardware
components  in  the  system,  load  drivers  specific  to  a  system,  and  program  the
contents  of  the  microprocessor’s  registers.   The  kernel  performs  the  basic  system
task, provides system calls or functions, and comprises the embedded system. The
data  and  procedure  section  holds  all  procedures  and any  static  data  used  by  the
operating system.
(vi)  D/A  conversion:  Digital-to-analog  and  analog-to-digital  conversions  are  two
very  important  aspects  of  digital  data  processing.  Digital-to-analog  involves
conversion of digital data into equivalent analog data. For example, the output of a
digital system might be converted to analog form using a D/A converter for driving a
servomotor,  which  drives  the  cursor  arm  of  a  plotter  or  a  pen  recorder.  It  clearly
shows in this example DAC emulating decoding deviceaction.
Q.61 Explain explanatory notes on (Any four)
(i)  Comparison of RS232C and RS422A standards
(ii)  8259 programmable interrupt controller
(iii)  A/D conversion   (16)
  Ans
(i)  Comparison of RS232C and RS422A standards:
AC23  Microprocessor Based System Design
45
RS232C  RS422A
1.  Standard defined for
asynchronous
communications, where there
is specified timing between
data bits and no fixed timing
between the characters that the
bits form.
2.  This standard defined 25
signal lines and 50ft is the
maximum guaranteed distance.
3.  This standard defines a serial
system with just a single wire
for each direction.
4.  Signal levels are : -25 to -3V
and +3 to +25V.
1.  Date Rate : 10 Mbits/s
2.  Driving ability upto 4000ft
and 10 receivers
3.  It is Differential standard i.e –
Each signal is represented by a
pair of wires and voltage
difference across these wires is
what is sensed at the receiver.
This minimizes the effect of
ground noise or the voltage
drop along the signal leads.
4.  Signal levels are : -2 to -6V
and +2 to +6V
(ii)  8259 programmable interrupt controller:
The 8259A adds 8 vectored priority encoded interrupts to the microprocessor. It can
be expanded to 64 interrupt requests by using one master 8259A and 8 slave units.
CS and WR must be decoded. Other connections are direct to microprocessor.
The pins D7 – D0: the bidirectional data connection, IR7 – IR0: Interrupt request,
used to request an interrupt & connect to a slave in a system with multiple 8259A.
WR :-Connects to a write strobe signal (lower or upper in a 16 bit system) , RD :-
Connects  to  the  IORC  signal  ,   INT  :-  Connects  to  the  INTR  pin  on  the
microprocessor from the master and is connected to a IR pin on a slave and INTA
:-  Connects  to  the  INTA  pin  on  the  microprocessor.  In  a  system  only  the  master
INTA signal is connected
A0  :-  Selects  different  command  words  with  in  the  8259A,   CS  :-  Chip  select  –
enables the 8259A for programming and control, SP/EN :- Slave Program (1 for
master,  0  for  slave)/Enable  Buffer  (controls  the  data  bus  transceivers  in  a  large
microprocessor based system when in buffered mode) and CAS2-CAS0 :- Used as
outputs from the master to the slaves in cascaded systems.
AC23  Microprocessor Based System Design
46
Fig : 8259 Block Diagram
(iii)  A/D conversion:
Fig : Block Diagram Representation of ADC Operation
The  digital  inventory  are  working  a  revolution  in  the  field  of  technology,
microcontrollers,  microprocessors  are  used  more  effectively  than  those  of  analog
circuitry.  But  the  output  of  any  sensors,  which  deals  with  physical  equality  like
temperature, humidity, pressure, viscosity, velocity, which are, used most of the data
acquisition  flat  forms  are  in  the  form  of  analog  signals  or  continuous  signals.
Microcontrollers and microprocessors are do nothingwith these signals. Because they
require the signal in the form of binary numbers. So we should convert these analog
signals  into  digital  format.  The  following  popular  methods  are  used  for  Analog  to
Digital conversion.
1.  Flash ADC
2.  Digital Ramp ADC
AC23  Microprocessor Based System Design
47
3.  Successive Approximation ADC
4.  Tracking ADC
5.  Slope (Integration) ADC.
Q.62  Explain with proper diagram all the six modes of  operation of programmable
interval timer 8254.   (8)
Ans
Mode 0 – Interrupt on terminal count
Mode 1 – Programmable one-shot
Mode 2 – Rate Generator
Mode 3 – Square wave rate generator
Mode 4 – Software triggered strobe
Mode 5 – Hardware trigger strobe
Mode 0: The output in this mode is initially low, and will remain low for the
duration of the count if GATE = 1.
Width of low pulse = N×T
Where N is the the clock count loaded into counter, and T is the clock period of
the CLK input.
When  the  terminal  count  is  reached,  the  output  will go  high  and  remain  high
until a new control word or new count number is loaded. In this mode, if GATE
input becomes low at the middle of the count, the count will stop and the output
will  be  low.  The  count  resumes  when  the  gate  becomes  high  again.  This  in
effect adds to the total time the output is low.
Mode 1: This mode is also called hardware triggerable one-shot.The triggering
must  be  done  through  the  GATE  input  by  sending  a  0-to-1  pulse  to  it.  The
following two steps must be performed:
•  Load the count registers.
•  A 0-to-1 pulse must be sent to the GATE input to trigger the counter.
Contrast  this  with  mode  0,  in  which  the  counter  produces  the  output
immediately after the counter is loaded as long as  GATE = 1.In mode 1 after
sending  the  0-to-1  pulse  to  GATE,  OUT  becomes  low  and  stays  low  for  a
duration of N×T, then becomes high and stays high until the gate  is triggered
again.
Mode 2: This mode is also called divide-by-N counter. In this mode, if GATE =
1,  OUT  will  be  high  for  the  N×T  clock  period,  goes  low  for  only  one  clock
pulse,  then  the  count  is  reloaded  automatically,  and  the  process  continues
indefinitely.
Mode 3: In this mode if GATE = 1, OUT is a square wave where the high pulse
is equal to the low pulse if N is an even number. In this case the high part and
low  part  of the  pulse  have the  same  duration  and are  equal  to (N/2)×T  (50%
duty cycle). If N is an odd number, the high pulse  is one clock pulse longer.
This mode is widely used as a frequency divider andaudio-tone generator.
Mode 4: In this mode if GATE = 1, the output will gohigh upon loading the count.
It will stay high for the duration of N×T. After the count reaches zero (terminal
AC23  Microprocessor Based System Design
48
count), it becomes low for one clock pulse, then goes high again and stays high
until a new command word or new count is loaded. Torepeat the strobe, the count
must be reloaded again. Mode 4 is similar to mode 2, except that the counter is not
reloaded  automatically.  In  this  mode,  the  count  starts  the  moment  the  count  is
written into the counter.
Mode 5: This mode is similar to mode 4 except that the trigger must be done with
the GATE input. In this mode after the count is loaded, we must send a low-tohigh pulse to the gate to start the counter.
Q.63   What  is  a  macro?  Discuss  different  conditional  constructs/statements  used  while
programming a macro.   (4)
   Ans MACRO:A sequence of instructions to which a name is assigned is called
macro. Macros and subroutines are similar. Macros are used for short sequence of
instructions  whereas  subroutines  for  longer  ones.  Macros  executes  faster  than
subroutines.
The MACRO directive informs assembler the beginningof a macro This is used
with  ENDM  directive  to  enclose  a  macro.  The  general format  of  the  MACRO
directive is :
 Macro Name  MACRO  ARG1, ARG2 , …..,ARG N.
Conditional  assembly  language  statements  are  available  for  use  in  the  assembly
process and in macro sequences. The conditional statements create instructions that
control  the  flow  of  the  program  and  are  variations  of  the  IF-THEN,  IF-THENELSE, DO-WHILE, and REPEAT-UNTIL constructs used inhigh-level language
programming languages.
; assembled portion with WIDT = TRUE and LENGT=TRUE;
IF WIDT
WIDE  DB 72
  ELSE
  ENDIF
  IF LENGT
LONG  DB -1
  ELSE
  ENDIF
Q.64   A 450 ns EPROM won’t work directly with a 5MHz 8088.Why? Explain.  (2)
AnsWhen the 8088 is operated with a 5 MHz clock, it allows 460 ns for the
memory to access data. Because of the decoder’s added time delay 12ns, it is
impossible for this memory to function within 460 ns.
Q.65   What is an interrupt? Discuss all the five software interrupt instructions.  (6)
Ans An  interrupt  is  either  a  hardware-generated  CALL  or  software-generated
CALL.
   The  INTEL  family  microprocessor  has  software  interrupts  INT,  INT0,  INT3
,BOUND and IRET. Out of these five interrupts INT and INT3 are very similar,
BOUND  and  INT0  are  conditional,  and  IRET  is  special interrupt  return
instruction.
AC23  Microprocessor Based System Design
49
   The BOUND instruction, which has two operands, compares a register with two
words of memory data.
   INT0  instruction  checks  the  overflow  flag  (OF).  If  OF=1,  the  INT0  instruction
calls the procedure whose address is stored in interrupt vector type number 4. If
OF=0,  then  the  INT0  instruction  performs  no  operation  and  next  sequential
instruction in the program executes.
   INT  n  instruction  calls  the interrupt  service  procedure  that  begins at  the address
represented  in  vector number  n.  For example, an  INT 80H  or  INT  128  calls  the
interrupt service procedure whose address is storedin vector type 80H (000200H –
000203H). To determine the vector address, just multiply the vector number (n) by
4,  which  gives  the  beginning  address  of  the  4-byte  long  interrupt  vector.  For
example,  an  INT  5  =  4  x  5  =  20  (14H).  The  vector  for INT5  begins  at  address
000014H and continues to 000017H. The only exception is the INT3 instruction, a
1-byte instruction.
   The IRET instruction is a special return instruction used to return for both software
and  hardware  interrupts.  The  IRET  instruction  is  much  like  a  RET,  because  it
retrieves the return address from the stack.
Q.66  Discuss  programmable  keyboard  and  display  interface  -8279  control  word
summary.   (8)
Ans,
   The  8279  is  a  programmable  keyboard  and  display  interfacing  component  that
scans up to 64-key keyboard and controls up to a 16-digit numerical display. This
interface has a built-in FIFO (First-In-First-Out)  buffer that allows it to store up to
eight keystrokes before the microprocessor must retrieve a character. The display
section controls up to 16 numeric displays from an internal 16 x 8 RAM that stores
the coded display information.
 Control Word: 000DDMMM – Mode set is command with  an op-code of 000 and
two fields programmed to select the mode of operation for the 8279. The DD field
selects the mode of operation for the display and the MMM field selects the mode
of operation for the keyboard.
D7  D6  D5  Function  Purpose
0  0  0  Mode Set
Selects the number of display
positions, left or right entry, and
type of keyboard scan.
0  0  1  Clock
Programs the internal clock and
sets the scan and de-bounce
times
0  1  0  Read FIFO
Selects the type of FIFO read
and the address of the read
0  1  1  Read display
Selects the type of display read
and address of the read
1  0  0  Write display
Selects the type of write and
address of the write
AC23  Microprocessor Based System Design
50
1  0  1
Display write
inhibit
Allows half-bytes to be blanked
1  1  0  Clear  Clears the display of FIFO
1  1  1  End interrupt
Clears the IRQ signal to the
microprocessor
The 8279 control word summary
Q.67   State the importance of PUBLIC, EXTRN directives in modular programming.  (4)
Ans The  PUBLIC  and  EXTRN  directives  are  very  important to  modular
programming. PUBLIC used to declare that labels of  code, data, or entire segments
are  available to  other  program  modules.  EXTRN  (external)  declares  that  labels  are
external to modules. Without these statements, modules could not be linked together
to create a program by using modular programming techniques. They might link, but
one module would not be able to communicate to another.
   The  PUBLIC directive  is  placed  in  the  op-code  field  of  an  assembly  language
statement to define a label as public, so that the label can be used by other modules.
  The  EXTRN statement  appears  in  both  data  and  code  segments  to  define  labels  as
external to the segment. If data are defined as external, their sizes must be defined as
BYTE, WORD or DWORD.
Q.68  What is the main difference between 16 bit and 32 bit versions of C/C++ while using
in line assembler.   (4)
Ans The  32-bit  applications  are  written  using  Microsoft  Visual  C/C++  for
windows and the 16-bit applications are written using Microsoft C/C++ for DOS. The
main difference is that Visual C/C++ for windows is  more common today, but does
not easily call DOS functions such as INT21H.
Q.69   Explain how memory management is improved in Pentium processors?  (4)
  Ans  The memory management is improved by adding paging  unit and a new system
memory-management mode.
  Paging Unit: The paging mechanism functions with4K – byte memory pages or with a
new extension available to the Pentium with 4M byte-memory pages. In the Pentium,
with  the  new  4M-byte  paging  feature  memory  for  the  page-table  reduced  to  single
page table.
  Memory – management mode: The system memory-management mode (SMM) is on
the same level as protected mode, real mode, and virtual mode, but it is provided to
function as a manager. The SMM is not intended to be used as an application or a
system  level  feature.  It  is  intended  for  high-level system  functions  such  as  power
management and security, which most Pentiums use during operation.
Q.70  Mention how do the following instructions differ in their functionality-  (4)
(i)  NEG & NOT  (ii) DIV & IDIV
 (iii) AND & TEST  (iv) CMP & SUB
AC23  Microprocessor Based System Design
51
Ans,  NOT:  Logical  inversion  or  the  one’s  complement  and  NEG:  arithmetic
sign inversion or the two’s complement.
   DIV: Unsigned numbers division and IDIV: Signed number division.
   AND: Performs the AND operation and changes the  destination operand. TEST:
Test  instruction  performs  the  AND  operation  and  it  wont  changes  destination
operand but it only affects the condition of the flag register.
   SUB: Performs the subtraction operation and changes the destination operand.
CMP: Comparison instruction is a subtraction that changes only the flag bits; the
destination operand never changes.
Q.71   Why memory decoding is required? Describe 74LS139 memory decoder  (4)
AnsIn order to attach a memory device to the microprocessor, it is necessary to
decode the address sent from the microprocessor. Decoding makes the memory
function at a unique section or partition of the memory map. Without an address
decoder, only one memory device can be connected toa microprocessor, which
would make it virtually useless.
   The 74LS139 is a dual 2-to-4 line decoder. It contains two separate 2-to-4 line
decoders – each with its own address, enable, and output connections.
The Pin-out of the 74LS139
Q.72  Explain data addressing modes (with examples) ava ilable in microprocessors.(8)
Ans, Direct Mode:
•  Instruction includes memory access.
•  CPU accesses that location in memory.
Example:
LDAC 5
AC23  Microprocessor Based System Design
52
Reads the data from memory location 5, and stores the data in the CPU’s
accumulator.
Indirect Mode:
•  Address specified in instruction contains address where the operand resides.
Example:
LDAC @5 or LDAC (5)
Retrieves contents of location 5, uses it to accessmemory address.
Register Direct and Register Indirect Modes
•  Does not specify a memory address. Instead specifies a register.
Example:
LDAC R
Where R is a register containing the value 5.The instruction copies the value 5 from
register and into the CPU’s accumulator.
Immediate Mode
•  The operand specified in this mode is the actual data it self.
Example:
LDAC #5
Moves the value 5 into the accumulator.
Implicit Mode
•  Does not exactly specify an operand. Instruction implicitly specifies the
operand because it always applies to a specific register.
Example:
CLAC
Clears the accumulator, and sets value to zero. Nooperands needed.
Relative Mode
•  Operand supplied is an offset, not the actual address. Added to the contents
of the CPU’s program counter register to generate the required address.
Example:
LDAC $5 is located at memory location 10, and it takes up two blocks of memory.
Thus the value retrieved for this instruction will be 12 + 5, and will be stored in the
accumulator
Index Mode and Base Address Mode
•  Address supplied by the instruction is added to thecontents of an index
register.
•  Base address mode is similar except, the index register is replaced by a base
address register.
Example:
LDAC 5(X) where X = 10
Reads data from location (5 + 10) = 15 and stores it in the accumulator.
Q.73  What is the use of these assembler directives-?
 (i) .MODEL  (ii) PROC  (2)
Ans
MACRO:A sequence of instructions to which a name is assigned is called macro.
Macros  and  subroutines  are  similar.  Macros  are  used for  short  sequence  of
instructions  whereas  subroutines  for  longer  ones.  Macros  executes  faster  than
subroutines.
The MACRO directive informs assembler the beginningof a macro This is used with
ENDM directive to enclose a macro. The general format of the MACRO directive is:
AC23  Microprocessor Based System Design
53
 Macro Name  MACRO  ARG1, ARG2 , …..,ARG N.
PROC:  The  PROC and  ENDP  directives  indicate  the  start  and  end  of a procedure.
These directives force structure because the procedure is clearly defined. The PROC
directive indicates the start of a procedure, must  also be followed with a NEAR or
FAR.  A  NEAR  procedure  is  one  that  resides  in  the  same  code  segment  as  the
program. A FAR procedure may reside at any locationin the memory system.
Q.74   (i) Convert binary number in two’s compliment form0100 1000
 (ii) Convert hexadecimal BCH to decimal  (2)
Ans.
 01001000 => 10111000
BCH =>1011 1100 => 188.
Q.75 What is TPA (transient program area)? Draw the memory map of TPA in a personal
computer and explain different areas.  (6)
Ans
  The memory system is divided into three main parts : TPA, System are and XMS (
extended memory system).
  The  TPA  holds  the  DOS  operating  system  and  other programs  that  control  the
computer  system.  The  TPA  also  stores  any  currently  active  or  inactive  DOS
application programs. The length of the TPA is 640Kbytes.
9FFFF  MSDOS Program
9FFF0
Free TPA
.
.
.
.
.
.
08E30  COMMAND.COM
08490
Device drivers such
as MOUSE.SYS
02530  MSDOS Program
01160  IO.SYS Program
00700
DOS Communication
area
00500
BIOS
Communication area
00400
Interrupt Vectors
00000
The memory map of the TPA in a Personal Computer
Q.76  What is memory paging? Explain how it is used for memory addressing.  (6)
AC23  Microprocessor Based System Design
54
Ans
   The  memory  paging  mechanism  located  within  the  80386  and  above  allows  any
physical memory location to be assigned to any linear address. The linear address is
defined  as  the  address  generated  by  a  program.  With the  memory  paging  unit,  the
linear  address  is  invisibly  translated  into  any  physical  address,  which  allows  an
application written to function at a specific address to be located through the paging
mechanism. It also allows memory to be placed into areas where no memory exists.
Q.77  Describe in detail the software interrupts available in INTEL family. How interrupts
are executed in real and protected mode.  (8)
  Ans
The INTEL family microprocessor has software interrupts INT, INT0, INT3 ,BOUND
and IRET. Out of these five interrupts INT and INT3are very similar, BOUND and
INT0 are conditional, and IRET is special interruptreturn instruction.
The BOUND instruction, which has two operands, compares a register with two words
of memory data.
INT0 instruction checks the overflow flag (OF). If  OF=1, the INT0 instruction calls
the procedure whose address is stored in interrupt vector type number 4. If OF=0, then
the  INT0  instruction  performs  no  operation  and  next sequential  instruction  in  the
program executes.
INT  n  instruction  calls  the  interrupt  service  procedure  that  begins  at  the  address
represented  in  vector  number  n.  For  example,  an  INT 80H  or  INT  128  calls  the
interrupt  service  procedure  whose  address  is  stored in  vector  type  80H  (000200H  –
000203H). To determine the vector address, just multiply the vector number (n) by 4,
which gives the beginning address of the 4-byte long interrupt vector. For example, an
INT  5  =  4  x  5  =  20  (14H).  The  vector  for  INT5  begins  at  address  000014H  and
continues to 000017H. The only exception is the INT3 instruction, a 1-byte instruction.
The IRET instruction is a special return instruction used to return for both software and
hardware interrupts. The IRET instruction is much like a RET, because it retrieves the
return address from the stack.
Q.78 Explain  the  necessity  of  decoding  when  memory  device  is  attached  to  a
microprocessor? With neat diagram indicate how a simple NAND gate decoder is used
to select a 2716 EPROM memory component for memory  locations FF800H-FFFFFH.
(5)
Ans
  In order to attach a memory device to the microprocessor, it is necessary to decode the
address  sent  from  the  microprocessor.  Decoding  makes  the  memory  function  at  a
unique section or partition of the memory map. Without an address decoder, only one
memory device can be connected to a microprocessor,which would make it virtually
useless.
  Simple NAND gate Decoder:  When the 2k x 8 EPROM is used, address connection
A10  –  A0  of  the 8088 are  connected to  address inputs A10-A0  of  the  EPROM.  The
remaining nine address pins (A19-A11) are connectedto the inputs of a NAND  gate
AC23  Microprocessor Based System Design
55
decoder. The decoder selects the EPROM from one of the many 2Kbyte sections of the
entire  1Mbyte  address  range  of  the  8088  microprocessor.
  In  this circuit, a  single NAND gate  decodes  the  memory  address. The  output  of  the
NAND gate is logic 0 whenever the 8088 address pinsattached to its inputs (A19-A11)
are all logic 1s. The active low , logic 0 output of the NAND gate decoder is connected
to the CE’ input pin that selects (enables) the EPROM.
Q.79  Write a Program in assembly language to find the largest of n numbers stored in the
memory.   (8)
   Ans
   MOV AX, 0000
   MOV SI, 0200
   MOV CX, [SI]
   BACK : INC SI
   INC SI
   CMP AX, [SI]
   JAE GO
   MOV AX, [SI]
   GO: LOOP BACK
   MOV [0251], AX
   INT 3.
Q.80   Define the following   (3)
(i) Isolated I/O  (ii) memory mapped I/O
   (iii) Hand shaking
Ans
   There  are  two  schemes  for  the  allocation  of  addresses  to  memories  and  input  /
output devices.
AC23  Microprocessor Based System Design
56
(i).  Memory  Mapped  I/O  Scheme:  In  this  scheme  there  is  only  one  address
space. Address space is defined as all possible addresses that microprocessor can
generate.  Some  addresses  are  assigned  to  memories  and  some  addresses  to  I/O
devices. An I/O device is also treated as a memory  location and one address is
assigned  to  it.  In  this  scheme  all  the  data  transfer  instructions  of  the
microprocessor can be used for both memory as well as I/O device. This scheme
is suitable for a small system.
(ii).  In I/O mapped I/O scheme the addresses assigned to  memory locations can
also  be  assigned  to  I/O  devices.  Since  the  same  address  may  be  assigned  to  a
memory  location  or  an  I/O  device,  the  microprocessor  must  issue  a  signal  to
distinguish whether the address on the address bus is for a memory location or an
I/O device.
(iii).  Hand  shaking:  In  an  ASYNCHRONOUS  data  transfer  is  not  based  on
predetermined  timing  pattern.  This  technique  of  data  transfer  is  used  when  the
speed of an I/O device does not match the speed of  the microprocessor, and the
timing characteristic of I/O device is not predictable. In this technique the status
of  the  I/O  device  i.e.  whether  the  device  is  ready  or  not,  is  checked  by  the
microprocessor  before  the  data  are  transferred. The microprocessor  initiates  the
I/O device to get ready and then continuously checks the status of the I/O device
till  the  I/O  device  becomes  ready  to  transfer  data. When  I/O  device  becomes
ready, the microprocessor sends instructions to transfer data. This mode of data
transfer  is  also  called  handshaking  mode  of  data  transfer.  The  microprocessor
issues  an  initiating  signal  to  the  I/O  device  to  get  ready.  When  I/O  device
becomes ready it sends signals to the processor to  indicate that it is ready. Such
signals are calledhandshake signals.
Q.81  Explain in detail the operation of 8255 in mode1 taking suitable example.  (8)
Ans
  In mode1, Ports A and B are programmed as input or output ports and Port C is used
for handshaking.
Example:
PA[7:0
]
STB
A
IBF
A
INTR
A
PC
3
PC
5
PC
4
PB[7:0
]
STB
B
IBF
B
INTR
B
PC
0
PC
1
PC
2
PC6,
7
8255
PA[7:0
]
OBFA
ACKA
INTR
A
PC
3
PC
6
PC
7
PB[7:0
]
OBFB
ACKB
INTR
B
PC
0
PC
1
PC
2
PC4,
5
8255
AC23  Microprocessor Based System Design
57
Q.82   What is the function of 8254 Programmable IntervalTimer? Discuss any one of its
applications in detail.   (8)
AC23  Microprocessor Based System Design
58
Ans
•  8253/54 Timer Description and Initialization
•  PTI (programmable Interval Timer/Counter)
•  8253 and 8254 have exactly the same pin-out.
•  8254 is a superset of the 8253.
•  It Generates accurate time delays
•  It  can  be  used  for  applications  such  as  a  real-time clock,  an  event
counter,  a  digital  one  shot,  a  square  wave  generator  and  a  complex
waveform generator
8254 Functional Description:
8254 Programming:
AC23  Microprocessor Based System Design
59
8254 Mode1 Operation:
Q.83  Discuss the control words (ICWS) of IC8259.  (5)
Ans
  The Programmable interrupt controller is used when several I/O devices transfer data
using  interrupt  and  they  are  connected  to  the  same  interrupt  line  of  the
microprocessor.
  The Intel 8259 is a single chip programmable interrupt controller. It is compatible
with 8086, 8088 and 8085 microprocessor. It is a 28–pin DIP I.C package and uses
N-MOS technology.
8259 Control Word Initialization
AC23  Microprocessor Based System Design
60
AC23  Microprocessor Based System Design
61
Q.84 Write short note on “ANY FOUR” of the following  (16)
   (i)  ISA BUS
(ii).  Graphic Adapter and MONITOR
(iii).  DMA controller
(iv).  Protected mode addressing
Ans
    (i)  The ISA or Industry Standard Architecture,  bus has been around since the
very start  of  the  IBM-compatible personal computer  system. In fact,  any card
from the very first personal computer will plug into and function in any of the
modern Pentium 4-based computers. This is all made  possible by the ISA bus
interface found in  all  these machines,  which  is still  compatible  with  the  early
personal computers.
    ISA bus has evolved from its original 8-bit standard to the 16-bit standard found
in  most  systems  today.  The  ISA  bus  connector  contains  the  entire  demultiplexed address bus (A19-A0) for the 1M byte 8088 system, the 8-bit data
bus (D7-D0), and the four control signals MEMR’, MEMW’, IOR’ and IOW’
for controlling I/O and any memory that might be placed on the printed circuit
card. ISA Card only operates at 8 MHz rate.
(ii)  Video card converts digital output from the computer into an analog video
signal and sends the signal through a cable to the monitor also called a graphics
card.
•  The number of colors a video card displays is determined by its bit depth
•  The video card’s bit depth, also called the color depth, is the number of bits
it uses to store information about each pixel
•  i.e.  8-bit  video card  uses  8  bits  to store information  about  each  pixel;  this
video card can display 256 colors (2x2x2x2x2x2x2x2)
•  i.e. 24-bit video card uses 24 bits to store information about each pixel and
can display 16.7 million colors
•  The greater the number of bits, the better the resulting image
Video Electronics Standards Association (VESA),  which consists of video card
and  monitor  manufacturers,  develops  video  stands  to define  the  resolution,
number of colors, and other display properties.
g.  Monochrome Display Adapter (MDA)
h.  Hercules Graphics Card
i.  Color Graphics Adapter (CGA)
j.  Enhanced Graphics Adapter (EGA)
k.  Video Graphics Adapter (VGA)
l.  Super VGA (SVGA) and Other Standards Beyond VGA
   (iii)  A  DMA  controller  interfaces  with  several  peripherals  that  may  request
DMA.  The  controller  decides  the  priority  of  simultaneous  DMA  requests
communicates with the peripheral and the CPU, and provides memory addresses
for  data  transfer.  DMA  controller  commonly  used  with  8088  is  the  8237
programmable device.
The  8237  is  in  fact  a  special-purpose  microprocessor.  Normally  it  appears  as
part  of  the  system  controller  chip-sets.  The  8237  is  a  4-channel  device.  Each
AC23  Microprocessor Based System Design
62
channel is dedicated to a specific peripheral device and capable of addressing 64
K bytes section of memory.
(iv).  This addressing allows access to data and programs located above the first
1M byte of memory, as well as within the first 1M byte of memory. Addressing
this  extended  section  of  the  memory  system  requires a  change  to  the  segment
plus an offset addressing scheme used with real mode memory addressing. When
data and programs are addressed in extended memory,the offset address is still
used to access information located within the memory segment.
The  segment  register  contains  a  selector  that  selects  a  descriptor  from  a
descriptor  table.  The  descriptor  describes  the  memory  segment’s  location,
length, and access rights.
Q.85   Compare RS232C and RS422A standards.
   Ans
RS232C  RS422A
1.  Standard defined for
asynchronous communications,
where there is specified timing
between data bits and no fixed
timing between the characters
that the bits form.
2.  This standard defined 25
signal lines and 50ft is the
maximum guaranteed distance.
3.  This standard defines a serial
system with just a single wire for
each direction.
4.  Signal levels are : -25 to -3V
and +3 to +25V.
1.  Date Rate : 10 Mbits/s
2.  Driving ability upto 4000ft
and 10 receivers
3.  It is Differential standard
i.e – Each signal is represented by
a pair of wires and voltage
difference across these wires is
what is sensed at the receiver.
This minimizes the effect of
ground noise or the voltage drop
along the signal leads.
4.  Signal levels are : -2 to -6V and +2 to +6V
Q.86   Discuss the feature of Pentium in brief.
HRQ
HLDA
DRQ
DACK
PI/E
Controler DMA Dispozitiv Periferic
Memoria
principala
HOLD
U C P
MA
MD
MC
HOLDA
Magistrala de adrese
Magistrala de date
Magistrala de comenzi
AC23  Microprocessor Based System Design
63
   Ans
The Pentium is a 32-bit superscalar, CISC microprocessor. The term superscalar is
used for the processor which contains more than onepipeline to execute more than
one instruction simultaneously in parallel.
The main features of Pentium are, it has two ALU’s,one floating-point unit, two 8
KB cache, pre-fetch buffers, a branch target buffer. Two ALU’s means that there
are two pipelines. Each ALU contains five functional units. The two pipelines are
integer pipelines. They are named U and V pipeline.
When Pentium was introduced, its operating frequency was 60 MHz. gradually; the
operating  frequency  was  raised  to  233  MHz.  The  Pentium  uses  0.6  micron  BiCMOS process technology. It uses power management feature.
Q.87   Discuss the following assembler directives with example
i.  DWORD
ii.  OFFSET
iii.  SEGMENT
iv.  MACRO
v.  ASSUME
vi.  ENDP
   Ans
(i).  DWORD:It defines word type variable. The defined variable may have one or
more initial values in the directive statement. If there is one value, two bytes of
memory space are reserved. The general format is
Name of variable  DW  Initial value or values.
(ii).  OFFSET: It is an operator to determine the offset (displacement) of a variable
or procedure with respect to the base of the segment which contains the named
variable or procedure. The operator can be used to load a register with the offset
of a variable.
The operator can be used as follows :
MOV SI, OFFSET ARRAY
(iii).  SEGMENT  :   This  directive  defines  to  the  assembler  the  start  of  a
segment with name segment-name. The segment name should be unique and
follows the rules of the assembler
The Syntax is as follows:
Segment Name SEGMENT  {Operand (Optional)} ; Comment
.
.
.
Segment Name  ENDS.
(iv).  MACRO: A  sequence  of  instructions  to  which  a  name  is  assigned  is
called  macro.  Macros  and  subroutines  are  similar.  Macros  are  used  for  short
sequence  of  instructions  whereas  subroutines  for  longer  ones.  Macros  executes
faster than subroutines.
AC23  Microprocessor Based System Design
64
The  MACRO  directive  informs  assembler  the  beginning of  a  macro  This  is  used
with  ENDM  directive  to  enclose  a  macro.  The  general format  of  the  MACRO
directive is :
 Macro Name  MACRO  ARG1, ARG2 , …..,ARG N.
(v).  ASSUME: This directive will be used to map the segment register names with
memory addresses.
The Syntax is as follows:
ASSUME  SS: Stackseg, DS : Dataseg, CS:Codeseg
The ASSUME will tell the assembler to use the SS register with the address of the
stack segment whose name is stackseg.
(vi).  ENDP: (End Procedure) It informs assembler the end of a procedure. In
assembly  language  programming,  subroutines  are  called  procedures.  A  procedure
may be an independent program module to give certain result or the required value
to  the  calling  program.  This  directive  is  used  together  with  PROC  directive  to
enclose procedure. The general format of ENDP directive is:
Procedure Name   ENDP
Q.88   Discuss Stepper motor interfaced to the 82C55.
   Ans
A stepper motor rotates in steps in response to digital pulse input. The shaft of the
motor rotates in equal increments when a train of input pulses is applied. To control
direction, numbers of steps to appropriate pulses are applied to the stator windings
of the motor.
12 V supply is used to energize the poles. Pulses sent by the microprocessor switch
on  rated  voltage  to  the  windings  of  the  desired  poles.  A  delay  subroutine  is
incorporated in the program. After energizing one set of pole windings some delay
is provided, then the power supply is switched ontothe other set of pole windings.
This delay governs the speed of motor.
AC23  Microprocessor Based System Design
65
Q.89   Discuss the EISA bus and need of PCI bus.
   Ans
The Extended Industry Standard Architecture (EISA) is a 32 bit modification to the
ISA  bus.  As  computers  became  larger  and  had  wider  data  buses,  a  new  bus  was
needed  that  would  transfer  32-bit  data.  The  clocking  speed  limited  up  to  8MHz.
The most common application for the EISA bus is a disk controller or as a video
graphics adapter. These applications benefit from the wider data bus width because
the data transfer rate for these devices are high.
Peripheral  Component  Interconnect  (PCI):  This  bus  was  developed  by  Intel  and
introduced in 1993. It is geared specifically to fifth- and sixth-generation systems,
although the latest generation 486 motherboards usePCI as well.
PCI bus has plug – and – play characteristics and the ability to function with a 64-bit data bus. A PCI interface contains series of registers, located in a small memory
device on the PCI interface, that contains information about the board.
Q.90   Explain cascading of multiple PIC 8259.
   Ans
The 8259A adds 8 vectored priority encoded interrupts to the microprocessor. It can
be expanded to 64 interrupt requests by using one master 8259A and 8 slave units.
CS and WR must be decoded. Other connections are direct to microprocessor.
The pins D7 – D0: the bidirectional data connection, IR7 – IR0: Interrupt request,
used to request an interrupt & connect to a slave in a system with multiple 8259A.
WR :-Connects to a write strobe signal (lower or upper in a 16 bit system) , RD :-
Connects  to  the  IORC  signal  ,   INT  :-  Connects  to  the  INTR  pin  on  the
microprocessor from the master and is connected to a IR pin on a slave and INTA
:-  Connects  to  the  INTA  pin  on  the  microprocessor.  In  a  system  only  the  master
INTA signal is connected
Fig: 8259 Pin Diagram
AC23  Microprocessor Based System Design
66
A0:-  Selects  different  command  words  with  in  the  8259A,   CS  :-  Chip  select  –
enables the 8259A for programming and control, SP/EN :- Slave Program (1 for
master,  0  for  slave)/Enable  Buffer  (controls  the  data  bus  transceivers  in  a  large
microprocessor based system when in buffered mode) and CAS2-CAS0 :- Used as
outputs from the master to the slaves in cascaded systems.
Fig: cascading multiple 8259
Q.91   Discuss need of Pipelining and Caches.
AC23  Microprocessor Based System Design
67
   Ans
The simplest technique for improving performance through hardware parallelism is
pipelining. Pipelining consists of breaking up the  operations to be performed into
simpler  independent  operations,  sort  of  like  the  breaking  up  the  operations  of
assembling  a  car  in  an  assembly  line.  A  typical  processor  pipeline  consists  of  4
pipeline stages (1) Instruction fetch, (2) Instruction decode (3) Instruction execute
and  (4)  Register  file  write-back/memory  access.  In  practice  however,  real
architectures  have  many  more  physical  pipeline  stages,  with  multiple  physical
stages  corresponding  to  one  of  the  above  stages.  For  example  the  execute  stage
might occupy 4 physical pipeline stages
The primary advantages of pipelining are
– Parallelism
– Smaller cycles time
Caches are the other big thing done in the last 2 decades to improve performance.
Keep things locally if they are going to be used soon. From a physics point of view,
an access to memory which is almost exclusively offchip will mean signals have to
travel that much further in one cycle. In practice,since we do not want to make the
system  as  slow  as  its  slowest  component  (memory),  and  the  cycle  time  is  not
determined by the memory access time, and rather memory takes several cycles to
complete.
Q.92   Explain  in  brief  steps  to  develop  a  Microprocessor  based  computer  system
   Ans
The  design  of  a  microcomputer  system  must  begin  with  the  CPU  module. This
module establishes the basic system timing, providean orderly means of starting up
the processor, and provide access to the system buses.
The second step is adding Memory, it is essential to the stored program computer.
From this unit that the CPU fetches instructions directing it in some task. But within
a particular computer system there may be several types of memories each with its
own hierarchy.
The  third  step  is  adding  input  /  output:  This  is  also  known  has  user  interface.
There  are  basically  two  hardware  techniques  for  getting  data  into  and  out  of  a
computer.  The  first  is  the  parallel  interface  and  is  the  most  natural  for
microprocessor. The second technique is the serial interface.

0

CCNA rev 6 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 1
APJ Online CCNA Tutorial
Session 1 of 3
23rd Feb 2009
APAC & Japan
Technical Advocacy Team
APJ Technical Manager
Associate Technical ManagersCCNA rev 6 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 2
Instructor
Development
Future
Direction
This is now available on Webex on demand!
PDF is also available at Instructor Chat ForumCCNA rev 6 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 3
WebEx On-Demand Learning Access
Password: happy3
Go to:
http://ciscolearning.webex.com
1. On the left hand side under “Attend a Session”, click on “Recorded
Sessions”
2. This will bring you to the recorded topic listing.
3. Click on “Instructor Development Future Direction”
4. Click on the “view” button
5. Provide the password “happy3”
6. Complete registration and click register button then enjoy!
7. First time user maybe prompted to install program.
This is best viewed by using 1280 X 1024 resolution on your pc/laptop.
To download pdf copy:
http://academy-community.net/webx?50@309.Hlm8aIMdAQS.240@.1ae95e26CCNA rev 6 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 4
Webex Online
CCNA Tutorial for
February
Creating a bench mark for our InstructorCCNA rev 6 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 5
What is Online CCNA Tutorial?
 3 online sessions conducted by APJ Technical Advocacy
Team
 2 sets of Practice Exams
 4 Packet Tracer Simulation Exercises
 Free but seats are to limited to 75 per class!
 First come first serve basis.
 NOT a boot camp for CCNA certification
 NOT a replacement for instructor training
 Does not guarantee you will pass your CCNA examCCNA rev 6 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 6
What is Online CCNA Tutorial?
 To provide an understanding of what formats and
question types you should be expecting
 To provide you the first hand experience of the
challenges you and your students may go through in
preparing for CCNA Certification
 To help you gain the experience that you can use to help
mentor your students for CCNA certification preparation
 We strongly recommend you to attempt the CCNA
Certification exam within the next 30 daysCCNA rev 6 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 7
Prerequisites Checklist
Active Cisco Networking Academy Instructor in Asia
Pacific and Japan
Have requested the CCNA Certification Voucher
(provided from Exam Fee Waiver Program)
Pass the pre-test (20 Multiple choice questions, 2 hours
online)
Prepared to take CCNA certification within the next 30
days
Willing to join Instructor forum and report back happy
results about the certification exam (optional)CCNA rev 6 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 8
Congratulations!
Instructors that has reported back happy result. Congratulation!
 Edward Mooney Australia
 Yuanhai Lv China
 Difei Li China
 Lian Wang China
 Dandan Zhao China
 Gang Ma China
 Sivadasan E.T. India
 Mee Loong Yang New Zealand
 Rodel antonio Oman
 Ivan Wee Singapore
Total of 16 instructors reported back of their passes, this include the 2
additional pilot sessions in Singapore and MalaysiaCCNA rev 6 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 9
Webex online CCNA Tutorial Agenda (Feb)
 Registration and Pre-test: February 13th – 16th
 CCNA Tutorial: Feb 23rd, Feb 25th and Feb 27th
 3 sessions of Webex online, 2 hours each
 208 instructors registered
 89 instructors join the pre-test
 We have closed the Feb session intake.
 For those who do not make it, you are welcome to join us for March’s session.
Next Session in March
 Registration and Pre-test, week of 16th March
 CCNA Tutorial: March 30, April 1st, April 3rdCCNA rev 6 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 10
Webex online CCNA Tutorial Agenda (Feb)
 Registration and Pre-test: February 13th – 16th
Session 1: February 23rd 12:00pm GMT+8 (2 hours)
–Exam Question Formats, Tips for taking CCNA exam
–Legends vs Truth, Suggested Golden Rules
–Homework after session 1:
–Practice Exam questions (Set 1) , PT Simulation Questions (Set 1)
Session 2: February 25th 12:00pm GMT+8 (2 hours)
–Practice Exam and PT questions Set 1; review answer with Q & A
–Homework after session 2:
–Practice Exam questions Set 2, PT Simulation Questions Set 2
Session 3: February 27th 12:00pm GMT+8 (2 hours)
–Practice Exam and PT questions Set 2; review answer with Q & A
–How to apply CCNA CCAI preso.CCNA rev 6 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 11
Awards for February Session:
 1
st 3 instructors who passed the CCNA certification
exam and notify the TA team will receive a special
congratulation letter and a small gift from APJ
Technical Advocacy Team.CCNA rev 6 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 12
Session 1 of 3
Exam Question Formats
Tips for Taking Exam
Suggested Golden RulesCCNA rev 6 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 13
Agenda
 Exam Overview & Options
 Study Resources
 Exam Question Formats
 Tips for Taking the Exams
 Legends/Truths
 Time Budgeting
 Q&A
Impossible to cover all topics for CCNA in two-hour session
Session is about ―how to prepare for the CCNA Exam‖, not about ―cover all
CCNA knowledge in two hours‖CCNA rev 6 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 14
Exam Overview
and OptionsCCNA rev 6 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 15
ICND1 (640-822) Exam
ICND2 (640-816) Exam
Two Options:
1-Step and 2-Step
CCNA (640-802) ExamCCNA rev 6 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 16
CCNA Exam (640-802)
 From an exam day perspective …
–You may see more ICND2 than ICND1, because some ICND2
skills require ICND1 skills plus more
–e.g., An ICND2-level question using VLSM may also prove
ICND1-level subnetting knowledge and ICND2-level
subnetting knowledge
ICND1 (640-822) Exam
Topics
ICND2 (640-816) Exam
Topics CCNA (640-802) Exam
TopicsCCNA rev 6 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 17
Study ResourcesCCNA rev 6 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 18
CCNA Exam
Recommended Reading
 CCENT/CCNA ICND1
Official Exam Certification Guide,
Second Edition
 CCNA ICND2
Official Exam Certification Guide,
Second Edition
 1 Hour of Video Training
Available Onsite at the Cisco Company StoreCCNA rev 6 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 19
CCNA Exam
Recommended Reading
Video Learning and
Lab Assistance
Foundation
Learning
Test Review and
Practice
Hands on
Application
Available Onsite at the Cisco Company Store
31 Days Before Your CCNA Exam second edition
By Allan Johnson (640-802)CCNA rev 6 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 20
Exam Question
FormatsCCNA rev 6 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 21
Multiple Choice,
Single Answer
 May test simple recall of pertinent facts
 May require analysis and understanding of complex
scenarios
 If you click a 2nd answer, it automatically unchecks the
previous answer
Which OSI model layer is concerned with routing?
A. Layer 1
B. Layer 3
C. Layer 5
D. Layer 7CCNA rev 6 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 22
Multiple Choice,
Multiple Answer
 Question states the number of right answers
 Exam engine reminds about too few, too many
answers
Which cable in the campus LAN should be a
crossover cable (Choose 2)?
A. SW1 – SW2
B. PC1 – SW2
C. AP1 – SW1
D. R1 – SW2
E. PC2 – PC3CCNA rev 6 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 23
Drag-and-Drop
 List of items to be dragged on the left
 Drag to the boxes on the right
Click and drag the unit of information on the left to the OSI Layer to
which it best corresponds on the right. Not all apply.
Layer 1
Layer 2
Layer 3
Layer 4
Packet
Frame
Bit
Segment
RecordCCNA rev 6 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 24
Testlet
 One general scenario
 Multiple different mc questions
 Can move around between the questions
Text of
overall
scenario
Text of each
question
here…
based on
which
question is
clicked hereCCNA rev 6 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 25
Simulations (Sims)
 Problem Statement, with Goal
 Objective: Complete or Fix the Configuration
 Must Access and Use the CLI
 Click a PC icon to (virtually) Use an Emulator to
Connect to Router/Switch
 Sims support:
–Help (?)
–Abbreviated commands
–Tab key to complete commands/keywordsCCNA rev 6 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 26
Sim Topology View
Problem
Statement
Dashed Line
Implies to
Click this PC to
reach R2’s CLICCNA rev 6 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 27
Sim With CLI Visible
Toggle
Between CLI
View and
Topology
View HereCCNA rev 6 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 28
Simlet
 Like testlet, with multiple different MC questions
 Like sim, uses simulator
 Objective is to answer MC questions
 Typically, no configuration requiredCCNA rev 6 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 29
Simlet
Select
Question
Here
Toggle
Between CLI
View and
Topology
View Here Dashed Line between Host D and
router Lab A implies to Click Host
D icon to reach Lab A’s CLICCNA rev 6 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 30
Exam Taking TipsCCNA rev 6 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 31
Tips:
Multiple Choice Questions
 Look for the ―best‖ answer; some answers may be
good, but not ―best‖, so read all the answers
 Look for subtleties, for example:
–―Packet‖ implies layer 3, typically IP packet, routing, etc
–―RIP Version 2‖ implies classless routing protocol and implies
both VLSM support and 2s
formula (instead of 2s – 2 formula)
for the number of subnets
 If you need to guess:
–Rule out as many answers as possible
–Your first impression is usually the better answer to guess
–There is no penalty for guessingCCNA rev 6 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 32
Tips: Testlets
 Answer all questions—exam software will remind you
before letting you move on
 You can move between questions in a single testlet
–If confused by testlet question 1, look at question 2
–When reading question X, go ahead and click answer(s), even
if you are unsure, so you’ll remember your first impressions
 Same general suggestions as MC questionsCCNA rev 6 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 33
Tips: Sims
 Sim questions are always answered by configuring
something!
 The Exam Engine grades the running config, not the
startup config
 Before exam day …
–Practice as much as you can (real gear, simulators, sample
tests, read every configuration in books, repeat labs while in
class, etc.)
–Use multiple sources for practice/review of configurations
 Exam day …
–Do what you can—partial credit!!!
–Start with ―show running-config‖
–There are no style points!CCNA rev 6 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 34
Tips: Simlets
 Simlet questions—no need to change the config!
 You may not have visibility to the running config!
 Before exam day …
–Stop and do ―show‖ commands after each step—this emulates
the status in Simlet questions
–Use resources that emphasize and explain show
command output
–Use multiple sources for guidance in your hands-on practice
 Exam day …
–Guess if you don’t know! (no penalty)
–If unsure, click your best guess now, to remember your first
impressions
–Read all questions, then use sim (personal preference)CCNA rev 6 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 35
Router Simulation
Legends vs. Truth
1. Legend: You lose points if you use help ―?‖
– Truth: No penalty!
2. Legend: You have to save your configs even if the
simulation does not specifically request saving
– Truth: Grading based on running-config
3. Legend: You lose points if you enter too many
commands
– Truth: No penalty!CCNA rev 6 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 36
Router Simulation
Legends vs. Truth (Cont.)
4. Legend: If you miss one little thing, you get 0 points
on that Sim question
–Truth: Partial credit is given, so do as much as you can
5. Legend: You will fail the exam if you miss even one
simulation question
–Truth: You can miss all available points on a sim question and
still pass the exam
6. Legend: You should spend most of your time working
on the simulations
–Truth: Sims do have greater weighting than one MC question,
but do not spend most of your time—maybe 5 to 8 minutesCCNA rev 6 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 37
Other Legends and Truths
1. Legend: The test is adaptive, e.g., if you miss a RIP
question, you’ll get more RIP questions
–Truth: The tests are not adaptive
2. Legend: My exam covered something not listed in the
exam topics
–Truth 1: Exam Topics are ―guidelines‖; the exams may go
beyond the exam topics, so you could see such a question
–Truth 2: More likely: the question was a sample item for
possible future tests, and did not affect your scoreCCNA rev 6 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 38
Cisco Avoids
These Questions …
 Those that require the memorization of command
syntax or interface/menus
 ―Trick questions‖
 Version-dependent questions, e.g., configure Cisco IOS
vs. Cisco Cat IOS
 Subnetting questions that are ambiguous regarding
whether to use the 2s or 2s – 2 formula for the number
of subnetsCCNA rev 6 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 39
Time BudgetCCNA rev 6 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 40
Time and Question Counts on the Exams
 The three exams state the following:
–ICND1: 90 minutes 50–60 questions
–ICND2: 75 minutes 45–55 questions
–CCNA: 90 minutes 50–60 questions
 You learn your exam’s question count as you begin
the exam
 Look at the clock as you begin Sim and Simlet
questionsCCNA rev 6 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 41
Time Budget: Short Version
 You need a way to answer the question:
–Am I using too much time per question so far?
 Time consumers—Sim, Simlet, and Testlet questions—
make the obvious math (actual-time/answeredquestions
vs. time-per-question) much less useful
 Just a suggestion:
–For each simlet/testlet/sim, add 5 to current question count
–Multiple by 1.2
–That’s the number of minutes, or less, you should have
taken so far
–It’s an estimate—don’t be slaved to itCCNA rev 6 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 42
Time Budget Example
 CCNA Exam
 After question 10, you want to check time
 You’ve had one Sim question, no Simlets/Testlets
 Multiply 15 * 1.2 = 18 minutes
 If actual time <= 18 minutes, you’re doing fine on timeCCNA rev 6 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 43
Demo on question type
http://www.cisco.com/comm/applications/PrepCenter/Image
s/Vue_CCNATutorial_Tlt_Sim_simlet_v4_010505.swfCCNA rev 6 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 44
Summary
Prepare
Use the Many Resources
Practice on Routers and Switches, PT, Simulators
Time Budget on Questions—Answer All of Them
Don’t Be Intimidated by the Simulations
Give Yourself a Time Budget When You Hit a Simulation
Shows and Question Marks work
Answer as Much as You CanCCNA rev 6 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 45
Golden Rules from John
 Be calm
 Don’t give up
 Don’t panic
 Schedule at your best timing
 Don’t attempt exam without preparation
 Watch your time
 Focus
 All the best!
Let us know when you are taking the exam, we will
forward you the ppt.CCNA rev 6 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 46
Q and ACCNA rev 6 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 47
Homework:
Set 1 Practice Exam &
PT Simulation
QuestionsCCNA rev 6 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 48
Homework: Practice Exam1CCNA rev 6 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 49
Homework: Practice Exam1CCNA rev 6 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 50
Homework: Practice Exam1CCNA rev 6 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 51
Homework: Practice Exam1CCNA rev 6 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 52
Homework: Practice PT Simulation
QuestionsCCNA rev 6 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 53
Q and ACCNA rev 6 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 54

installing-and-formatting-cisco-2691-cisco-3631-and-cisco

0

installing-and-formatting-cisco-2691-cisco-3631-and-cisco

0

isco certification ,class ccna, certification books ,new cisco ccna ,ccna study guides, cisco voip training ,cisco courses ,london ccna ,exam prep cisco ccna, books ccna training ,courses cisco ccent, training ccna course, london where to get cisco certification ccna cisco training ccna certification classes cisco certification classes ccna boot camps cisco ccna class ccna certification training cisco it training ccna training course cisco classes ccna voice training ccna schools ccna training online cisco certification courses ccnp books online cisco certification ccna classes cisco ccna study cisco ccna bootcamp cisco ccna boot camp ccna training class ccna training what is a ccna certification cisco network training ccna security training cisco training uk cisco ccna training cisco training online cisco certification online ccna class cisco boot camp how to get cisco certified

0
cisco certification ,class ccna, certification books ,new cisco ccna ,ccna study guides, cisco voip training ,cisco courses ,london ccna ,exam prep cisco ccna, books ccna training ,courses cisco ccent, training ccna course, london where to get cisco certification ccna cisco training ccna certification classes cisco certification classes ccna boot camps cisco ccna class ccna certification training cisco it training ccna training course cisco classes ccna voice training ccna schools ccna training online cisco certification courses ccnp books online cisco certification ccna classes cisco ccna study cisco ccna bootcamp cisco ccna boot camp ccna training class ccna training what is a ccna certification cisco network training ccna security training cisco training uk cisco ccna training cisco training online cisco certification online ccna class cisco boot camp how to get cisco certified

ccna certification online ccna online certification ccna exam study guide cisco certified training cisco online training ccna boot camp cisco networking courses ccna books online ccna course ccna exam cost uk ccna courses ccna certification course ccna testing preparing for ccna certification ccna school ccna crash course cisco training courses cisco networking course cisco firewall ccna certification cost cisco certification cost ccna test prep cisco certification training ccna bootcamp where to take ccna exam online ccna cisco training cisco courses online exam cram ccna ccna certification cisco training ccna ccna boot camp reviews cisco ccna course ccna online study ccna prep test cisco ccna testing cisco networking certification cisco training partners free cisco ccna training new ccna exams free cisco training cisco training course ccna training videos ccna training free tech questions and answers ccna study guide ccnp training cisco ccna lab ccna exam fees ccna exam cram online ccna certification cisco ccna certification what is ccna certification ccna certification cisco cisco ccent exam prep ccna for dummies cc ent ccna course ccna cert ccna ccna ccna cisco courses cisco it certification ccna wireless training free cisco certification training cisco bootcamp class a test questions ccna certification exam cost ccna online course ccna book cisco ccna prep center ccna certifications online cisco training online ccna training free ccna training cisco ccna exam cost ccna course online what is a cisco certification ccna from cisco cisco certification ccent cisco ccna courses ccna certification test cisco security certification cisco voip certification new cisco certification cisco qualifications quizzes questions test of questions cisco course where to get ccna certification ccna video training ccna exam locations ccna online training free cisco certifications class c test ccna online training ccna prep ccna free training ccna for free cisco schools ccna exam cost cost of ccna exam cisco certifications list ccna certification exam ccna certification requirements about ccna certification ccnp certification preparing for ccna exam ccna study material class a test questions and answers ccna lab cisco certified courses certified cisco network associate cisco training certification ccna preparation ccna exam preparation ccna exam costs cisco certification cisco ccna book cisco certification ccna ccna cisco certification cisco exam training ccna training video cisco test prep cisco systems certification ccna prep center ccna security certification at certification practice test ccna qualification take ccna exam questions for quizzes cisco_ccna ccna certification path what is the ccna certification cisco qualification cisco ccna study guide ccna certification practice exam ccna exam certification ccna networking how to get ccna ccna test voucher ccna certification review ccna practice exams new ccna exam cisco free training ccna exam voucher pass ccna exam cisco nexus training ccna videos ccna simulator cisco books ccna test question free sample tests latest ccna exam ccna exam centre ccna tests ccnp practice exams ccna voice certification cisco trainings ccna exam dates ccna test cost ccna test centers what is cisco certification certification ccna ccnp practice test what is cisco ccna cisco certification test about ccna how to take ccna exam cisco certification questions online ccna exam certification cisco ccna ccna voice cisco ccna voice cisco ccna practice exams cisco certification practice exams cisco ccent certification ccna price ccna cost ccna course material ccna online ccna certification exams ccna security learning ccna cisco certified ccna certification practice test ccna certification exam questions ccna certification track ccna free practice exams cisco certification exams med certification practice test cisco certificates new cisco exams 640-801 multiple choice quizzes ccna test new ccna test certification cisco

0
cisco exam questions
cisco ccna questions
cisco test questions
cisco subnetting questions
cisco aptitude questions
cisco certification questions
cisco question
cisco practice questions
cisco networking questions
cisco ccna exam questions
cisco internship questions
cisco exam question
cisco ccna test questions
cisco ccent exam questions
cisco ccna practice questions
cisco certification test questions
cisco online exam questions
cisco tshoot exam questions
cisco icnd1 exam questions
cisco icnd2 exam questions
ccna certification cost
ccna exam cost
ccna test cost
ccna cost
cisco ccna exam cost
cost of ccna exam
ccna certification exam cost
ccna exam cost uk
ccna exam costs
cisco questions and answers
cisco interview questions and answers
cisco interview questions and answers pdf
cisco exams questions and answers
cisco exam questions and answers
cisco ccna questions and answers
cisco certification questions and answers
cisco networking questions and answers
cisco test questions and answers
cisco exam answers
cisco answers
cisco ccna answers
cisco test answers
cisco exams answers
cisco netacad test answers
cisco networking academy test answers
cisco academy test answers
cisco ccna test answers
ccna cisco answers
cisco ccna exam questions and answers
cisco practice exam answers
ccna course
ccna courses
ccna course material
ccna training course
ccna training courses
cisco ccna course
cisco ccna courses
ccna certification course
ccna course london
ccna crash course
ccna online training
ccna course online
ccna online
ccna training online
ccna online exam
online ccna training
ccna online course
ccna online training free
online ccna course
ccna certification online
online ccna certification
online ccna exam
ccna online certification
ccna exam online
online ccna
ccna online study
ccna practice test
ccna online test
ccna testing
ccna practice tests
ccna tests
online ccna test
ccna test
ccna practice test online
cisco ccna test
ccna test practice
ccna online practice test
ccna mock test
ccna test center
test ccna
free ccna practice test
ccna test exam
ccna test centre
ccna test papers
ccna exam test
ccna certification test
ccna test online
practice ccna test
free ccna test
new ccna test
cisco ccna test center
ccna wireless practice test
ccna free test
ccna cisco test
practice test ccna
ccna test voucher
ccna test exams
ccna practice test free
cisco ccna testing
ccna 1 test
ccna free practice test
ccna test engine
new cisco ccna test
ccna test centers
cisco courses
cisco certification courses
cisco course
cisco training courses
cisco networking course
cisco certified courses
cisco training course
cisco networking courses
cisco courses london
cisco certifications
cisco certification
cisco certificate
certification cisco
cisco certifications list
cisco security certification
cisco certification path
cisco certification cost
cisco it certification
cisco certification track
what is cisco certification
cisco certificates
cisco voip certification
about cisco certification
what is a cisco certification
cisco certification classes
where to get cisco certification
cisco.com certification
cisco systems certification
track cisco certification
new cisco certification
cisco track certification
cisco new certification
cisco certification class
ccna study material
ccna study
ccna study materials
study ccna
how to study for ccna
studying for ccna
study for ccna
ccna study notes
cisco ccna study
ccna practice questions
ccna test questions
ccna questions
ccna exam questions
ccna questions and answers
ccna question
ccna exam question
ccna exam questions and answers
ccna question and answer
ccna certification test questions
ccna test question
ccna practice test questions
ccna practice questions and answers
ccna exams questions and answers
ccna practice exam questions and answers
practice ccna questions
ccna practice question
ccna practice exam questions
ccna certification questions and answers
ccna test questions and answers
ccna security exam questions
ccna certification questions
ccna certification exam questions and answers
ccna exam practice questions
ccna quiz questions and answers
ccna certification exam questions
ccna exams questions
ccna past questions
ccna questions answers
ccna test questions and answers free
ccna mock exam questions
ccna practical questions & answers
ccna question answer
ccna question and answers
ccna practice test questions answers
new ccna exam questions
ccna exam test questions
free ccna exam questions
new ccna questions
ccna questions and answers 2011
ccna model question papers with answers
ccna online exam questions and answers
ccna past questions and answers
ccna 1 questions and answers
ccna review questions
ccna study questions
ccna new questions
ccna routing and switching questions and answers
cisco certified network associate
cisco networking academy
cisco certified network professional
cisco networking
cisco networking certification
cisco network academy
cisco network
certified cisco network associate
ccna books
ccna book
ccna books free download
cisco ccna books
ccna certification books
cisco ccna book
book ccna exam
ccna exam booking
ccna study guide
ccna study guides
free ccna study guide
cisco ccna study guide
ccna study guide pdf
ccna exam guide
ccna guide
best ccna study guide
ccna free study guide
ccna exam study guide
ccna study guide free download
ccna study guide free
ccna exam certification guide
study guide ccna
ccna test prep
ccna exam prep
ccna prep center
ccna prep test
ccna prep
cisco ccna prep center
ccna certificate
ccna certification
ccna certifications
cisco ccna certification
what is ccna certification
ccna security certification
cisco certification ccna
ccna certification exam
certification cisco ccna
certification ccna
ccna certification salary
ccna cisco certification
ccna certification path
ccna official exam certification library
ccna practice certification exam # 1
ccna certification practice exam
ccna practice certification exam # 2
ccna certification exams
ccna certification requirements
ccna certification review
ccna certification practice test
what is a ccna certification
ccna certification cisco
ccna certification track
about ccna certification
ccna exam certification
what is the ccna certification
ccna certificate exam
ccna practice certification exam
where to get ccna certification
cisco interview questions
cisco interview questions for freshers
cisco interview question
cisco voice interview questions
cisco networking interview questions
cisco voip interview questions
cisco network engineer interview questions
cisco network interview questions
cisco call manager interview questions
cisco switching interview questions
cisco software engineer interview questions
cisco technical interview questions
cisco security interview questions
networking interview questions cisco
cisco phone interview questions
ccnp certification
ccna ccnp
ccnp books
ccnp
ccnp training
ccnp exam
cisco ccnp
ccnp salary
ccnp voice
ccnp practice test
ccnp exam fees
ccnp practice questions
ccnp exam fee
ccnp questions
cisco ccnp exam
ccnp test questions
ccnp exam questions
ccnp practice exam
ccnp practice exams
ccna practice labs
ccna practice exams
ccna practice exam
practice ccna exam
ccna practice
ccna practice quiz
ccna exam practice
ccna security practice exam
ccna practice lab
free ccna practice exam
practice ccna
ccna practice exam free
ccna lab practice
ccna free practice exams
practice exam ccna
ccna 1 practice exam
best ccna practice exams
ccna practical exam
cisco exams
cisco exam
cisco ccna exam
cisco certification exam
book cisco exam
free cisco exams
cisco exam voucher
cisco exam cost
cisco ccna exams
exam cisco
take cisco exam
cisco exams ccna
ccna cisco exam
free cisco exam
cisco certification exams
cisco exam prep
cisco exam ccna
cisco exam path
new cisco exams
cisco ccna certification exam
cisco exam test
cisco exam 1
exam cisco ccna
cisco exam 10
cisco test exams
cisco exam training
where to take cisco exams
new cisco exam
cisco test exam
cisco exam certification
ccna exam cisco
ccna voice
ccna voice exam
cisco ccna voice
ccna voice training
ccna voice certification
cisco ccna
ccna cisco
ccna cisco certified network associate
what is cisco ccna
cisco ccna routing and switching
cisco ccna lab
cisco ccna bootcamp
ccna from cisco
cisco ccna boot camp
cisco ccna quiz
cisco.com ccna
cisco ccna path
cisco training
cisco training uk
cisco certification training
cisco ccna training
cisco voip training
cisco training center
cisco nexus training
cisco network training
training cisco
cisco training partners
ccna cisco training
cisco ccna certification training
cisco training ccna
cisco certified training
cisco training certification
cisco it training
cisco trainings
cisco training and certification
ccna training videos
ccna video training
ccna video
ccna videos
ccna training video
cisco learning
cisco learning network
learning cisco
cisco learning center
learn cisco
cisco online training
cisco training online
cisco certification online
online cisco training
cisco courses online
online cisco certification
cisco online test
ccna classes
ccna class
ccna certification classes
cisco ccna class
ccna training class
ccna certification training
ccna training
ccna security training
training ccna
ccna wireless training
ccna simulator
ccna exam simulator
ccna simulator free
ccna simulation questions
ccna test simulator
ccna exam simulation questions
ccna simulators
free ccna simulator
cisco test
test cisco
cisco certification test
cisco tests
cisco testing
cisco test prep
cisco sample test
cisco ccna practice test
cisco practice test
cisco practice exam
cisco ccna practice exam
cisco practice exams
cisco practice
cisco certification practice exam
free cisco practice exams
cisco ccna practice
cisco exam practice
cisco practice tests
cisco icnd1 practice exam
cisco ccna practice exams
cisco certification practice test
cisco ccna practice test free
cisco certification practice exams
ccna sample questions
ccna sample test
ccna sample exam
sample ccna test
ccna sample test questions
sample ccna questions
ccna exam sample
ccna sample question
cisco ccna sample questions
ccna certification sample questions
ccna sample questions and answers
ccna sample exam questions
ccna exam sample questions
sample ccna test questions
ccna sample
sample ccna exam questions
sample ccna exam
sample ccna questions and answers
free ccna training
free ccna
free ccna certification
free ccna labs
ccna free
ccna free training
free ccna exam
ccna training free
free cisco ccna training
ccna free exam
ccna exam free
free ccna certification exam
ccna for free
ccna preparation
ccna exam preparation
preparing for ccna
preparing for ccna certification
preparing for ccna exam
cisco ccent
ccent cisco
cisco ccent exam
cisco ccent certification
cisco ccent training
cisco ccent exam prep
cisco certification ccent
new ccna exam
new ccna
ccna new exam
new cisco ccna
ccna new
new ccna certification
new cisco ccna exam
cisco new ccna
new ccna exams
the new ccna exam
practice test
icnd1 practice test
mcse practice test
a + practice test
take a practice test
practice test for let
let practice test
cwna practice test
multiple choice questions and answers
multiple choice quiz questions
multiple questions and answers
sample multiple choice questions
multiple choice question answers
multiple question answer
c multiple choice questions
multiple choice questions on
multiple choice questions sample
sample multiple choice questions with answers
multiple choice question and answer
quiz multiple choice questions
quiz questions multiple choice
multiple choice questions test
sample test questions
test samples
multiple choice test sample
sample of test questions
free sample test
free test samples
set test sample paper
test samples for free
sample test question
free sample tests
ccna exam answers
ccna test answers
ccna certification exam answers
ccna exams answers
ccna practice exam answers
ccent practice exam
ccent practice questions
cisco ccent practice exam
ccent practice exams
free ccent practice exam
ccent practice exam questions
free cisco training
free cisco certification
cisco free
cisco free training
free cisco certification training
cisco free certification
cisco certification free
ccent practice test
ccent test questions
cisco ccent practice test
cisco ccent test
ccent practice test free
ccent exam
ccent ccna
ccna ccent
ccent or ccna
ccent sample questions
ccent exam questions and answers
ccna or ccent
cisco ccna 1
ccna 1 exam
ccna 1 cisco
ccna exam 1
ccna 1 certification
ccna 1 exams
cisco routing and switching
ccna switching
switching cisco
switching questions and answers
switching ccna
sample exam
sample certification
sample exams
sample question and answer
sample of question and answer
quiz samples
free certification
free certification exams
free it certification exams
a certification practice test free
certification free
a + certification practice test
certification practice test
practice certification test
med certification practice test
practice certification exams
at certification practice test
re exam questions
exam questions and answers
exam practice questions
past exam questions
exams questions
exam sample questions
exam question and answer
a+exam questions
cwna exam questions
certification exam questions
question exam
let sample questions
sample let questions
let sample questions with answers
let sample questions and answers
sample let questions with answers
let sample test questions
quiz questions free
it questions for quiz
practice quiz questions
quiz sample questions
practice quiz exam questions
answers to test questions
answers to test
c test questions and answers
a practice test questions and answers
answers to the test
class a test questions and answers
ccna security
ccna lab
ccna dumps
ccna exam fees
ccna salary
ccna syllabus
ccna boot camp
what is ccna
ccna exam price
ccna pdf
ccna tutorial
ccna wireless
ccna exam fee
ccna exam dumps
ccna cert
ccna exploration
how to pass ccna
ccna exam paper
ccna labs
ccna notes
learn ccna
ccna exam code
ccna certified
ccna discovery
ccna exam topics
ccna exam locations
ccna exam
ccna mock exam
ccna price
ccna networking
ccna material
ccna braindump
ccna exams
ccna academy
ccna 2
ccna jobs
ccna learning
ccna
ccna exam papers
ccna security exam
ccna exam registration
how to pass ccna exam
ccna for dummies
ccna exam cram
ccna qualification
ccna tutorials
ccna modules
ccna basics
ccna examination
what is a ccna
pass4sure ccna
sybex ccna
ccna latest dumps
ccna quiz
ccna braindumps
about ccna
ccna requirements
ccna exam center
ccna boot camps
exam cram ccna
ccna exam voucher
ccna schools
ccna cheat sheet
ccna bootcamp
ccna voucher
ccna recertification
ccna exam number
exam ccna
ccna virtual lab
ccna program
ccna instructor
learning ccna
ccna cbt
latest ccna exam
ccna routing
ccna exam centre
how to get ccna
latest ccna dumps
ccna exam format
ccna school
ccna practise exam
cbt ccna
ccna exam dates
global knowledge ccna
ccna for you
ccna exam tips
ccna 640-801
take ccna exam
ccna practise exams
mcse ccna
ccna institute
ccna exam fees in india
register for ccna exam
what is ccna exam
ccna 640
about ccna exam
ccna help
pass ccna
ccna bgp
ccna ccna
where to take ccna exam
ccna one
taking ccna exam
ccna cram
pass ccna exam
learn ccna in 5 days
what ccna
exam for ccna
ccna in india
ccna ccna ccna
how to take ccna exam
ccna exam codes
ccna exam content
braindumps ccna
ccna resources
ccna boot camp reviews
cisco academy
cisco certified
cisco classes
cisco cert
what is cisco
cisco login
cisco simulator
cisco boot camp
cisco press
cisco uk
cisco
cisco careers
cisco firewall
cisco it essentials
cisco books
cisco tutorial
cisco routing
cisco education
cisco website
cisco engineer
cisco bootcamp
cisco qualifications
cisco university
how to get cisco certified
routing cisco
cisco cisco cisco
cisco new
cisco quiz
cisco qualification
cisco accreditation
all about cisco
cisco 640-801
cisco schools
new cisco
networking certifications
mcse certification
it certification
a + certification
cwna certification
certification test
test certification
ccnt certification
certification questions
tech certification
exam cram
free practice exams
cwna exam
test exams
free practice exam
preparing exam
a + practice exam
cisco questions
mcse
networking training