about flag instructions, Basic Computer Science

They straightforwardly affect the content of the flags.
CLC
CLD
CLI
CMC
STC
STD
STI
CLC INSTRUCTION
Reason: To uncontaminated the cartage flag.
Syntax:
CLC
This instruction turning the bit corresponding to the cartage flag, or in extra words it puts it on zero.
CLD INSTRUCTION
Reason: To uncontaminated the address flag.
Syntax:
CLD
This instruction exits the corresponding bit to the address flag.
CLI INSTRUCTION
Reason: To uncontaminated the interruption flag.
Syntax:
CLI
This instruction exits the interruptions flag, disabling this way those maskarable interruptions.
A maskarable interruptions is that one whose functions are disabled when IF=0.
CMC INSTRUCTION
Reason: To balance the cartage flag.
Syntax:
CMC
This instruction goes together the state of the CF flag, if CF = 0 the instructions equals it to 1, and if the instruction is 1 it equals it to 0.
We might say that it only "inverts" the value of the flag.
STC INSTRUCTION
Reason: To make active the cartage flag.
Syntax:
STC
This instruction locates the CF flag in 1.
STD INSTRUCTION
Reason: To make active the address flag.
Syntax:
STD
The STD instruction puts the DF flag in 1.
STI INSTRUCTION
Reason: To set in motion the interruption flag.
Syntax:
STI
The instruction sets off the IF flag, and this enables the maskarable external interruptions ( the ones which only function when IF = 1).
Posted Date: 5/4/2012 7:28:16 AM | Location : United States







Related Discussions:- about flag instructions, Assignment Help, Ask Question on about flag instructions, Get Answer, Expert's Help, about flag instructions Discussions

Write discussion on about flag instructions
Your posts are moderated
Related Questions
Optical disk storage and cd - ROM: Optical disk storage is relatively new alternative to magnetic storage. Digital data is burnt into the surface of a plastic disk coated with

There are two kinds of procedures, the intrasegments, which are found on the similar segment of instructions and the inter-segments which can be stored on dissimilar memory segment

Question 1 What is IT auditing? Discuss the three phases involved in the IT auditing Question 2 List and explain the two types of load balancing methods Question 3

WHAT DO MEAN BY ALGORITHM,HOW CAN ALGORITHM HELP TO WRITE BETTER COMPUTER PROGRAM ,WRITE AN ALGORITHM IN COMPUTER INTEREST

Use the methods of C4.5 to design a decision tree

They are used to act upon logic operations on the operators. AND OR, NEG NOT TEST XOR AND INSTRUCTION Function: It acts upon the conjunction of the operators bit by bit. Syntax: A

Machines which exhibit intelligent nature Machines in this case could easily be personal computers, or they could be robots with embedded systems, or a combination of both. Wh

Question: a) Illustrate, in detail, what is virtual memory? b) The Memory Management Unit is responsible for the translation of virtual addresses to their corresponding phy

Memory access: The use of semi-conductor memory elements (bistables) has been made possible by the use of large scale integrated circuits (LSI) which provide reliability, ease