adplus-dvertising
frame-decoration

Question

Cycle stealing technique is used in

a.

Interrupt based data transfer

b.

Polled mode data transfer

c.

DMA based data transfer

d.

None of these

Posted under DMA Microprocessor

Answer: (c).DMA based data transfer

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. Cycle stealing technique is used in

Similar Questions

Discover Related MCQs

Q. During DMA acknowledgement cycle, CPU relinquishes

Q. Access time is faster for _________.

Q. DMA stands for

Q. If the crystal oscillator is operating at 15 MHz, the PCLK output of 8284 is

Q. In which T-state does the CPU sends the address to memory or I/O and the ALE signal
for demultiplexing

Q. If a 1M ×1 DRAM requires 4 ms for a refresh and has 256 rows to be refreshed, no
more than __________ of time must pass before another row is refreshed.

Q. In a DMA write operation the data is transferred

Q. Which type of JMP instruction assembles if the distance is 0020 h bytes

Q. A certain SRAM has CS = 0 , WE = 0 and OE = 1. In which of the following
modes this SRAM is operating

Q. Which of the following is true with respect to EEPROM?

Q. Which microprocessor pins are used to request and acknowledge a DMA transfer?

Q. Software command CLEAR MASK REGISTER in DMA

Q. The common register(s) for all the four channels of 8257 is

Q. The IOW (active low) in its slave mode loads the contents of a data bus to

Q. To indicate the I/O device that its request for the DMA transfer has been honored by the CPU, the DMA controller pulls

Q. The number of clock cycles required for an 8257 to complete a transfer is

Q. The block of 8237 that decodes the various commands given to the 8237 by the CPU is

Q. The priority between the DMA channels requesting the services can be resolved by

Q. The register that holds the current memory address is

Q. The register that holds the data byte transfers to be carried out is