adplus-dvertising
frame-decoration

Question

The instruction that multiplies the content of the stack top by 2n is

a.

FMUL

b.

FPREM

c.

FSCAL

d.

FCSH

Answer: (c).FSCAL

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. The instruction that multiplies the content of the stack top by 2n is

Similar Questions

Discover Related MCQs

Q. If the opcode bit is D=1, then the source and destination operands are

Q. Which of the following is not a data transfer instruction?

Q. The instruction that performs real or integer multiplication of the specified operand with stack top is

Q. When the instruction, FDIV is performed, the destination is

Q. When the instruction, FPREM, is performed, the data stored on to the stack top is

Q. If ‘x’ is the value stored at the top of the stack, then the instruction F2XMI calculates the expression

Q. The content of the stack is compared with zero to check whether the content is zero, using the instruction

Q. The instruction that loads log 10 (to the base 2) to stack top is

Q. The instructions that are used to program the numeric processor or to handle the internal housekeeping functions are

Q. When the instruction FINIT performs its function, then the TAG status is

Q. The instruction that enables the interrupt structure and response mechanism is

Q. The instruction that is used to store the environment of the coprocessor to a destination memory location is

Q. The instruction that is the NOP instruction of the coprocessor is

Q. The 8089 shares the system bus and memory with the host CPU in

Q. The 8089 communicates with the host CPU using bus arbiter and controller in

Q. The number of address lines used by the I/O processor in 8089 is

Q. The IO device that can be interfaced with 8089 is

Q. In the 8089 architecture, the address of memory table for channel-2 is calculated by

Q. Which of the following is not a general purpose register of 8089?

Q. The registers that are used as source and destination pointers during DMA operations are