Comparison instructions , Basic Computer Science

They are used to evaluate operators, and they have an effect on the content of the flags.
CMP
CMPS (CMPSB) (CMPSW)
CMP INSTRUCTION
Idea: To measure up to the operators.
Syntax:
CMP destiny, source
This instruction subtracts the source operator from the destiny operator but with no this one storing the outcome of the operation, and it only concerns the state of the flags.

CMPS (CMPSB) (CMPSW) INSTRUCTION
Idea: To compare sequences of a byte or a word.
Syntax:
CMP destiny, source
With this instruction the series of source characters is subtracted from the destiny chain.
DI is used as an index for the additional segment of the source chain, and SI as an index of the destiny series.
It only affects the content of the flags and DI as well as SI is incremented.
Posted Date: 5/4/2012 7:18:33 AM | Location : United States







Related Discussions:- Comparison instructions , Assignment Help, Ask Question on Comparison instructions , Get Answer, Expert's Help, Comparison instructions Discussions

Write discussion on Comparison instructions
Your posts are moderated
Related Questions
They are used to evaluate operators, and they have an effect on the content of the flags. CMP CMPS (CMPSB) (CMPSW) CMP INSTRUCTION Idea: To measure up to the operators. Syntax: CMP


System software: System software helps run the  computer hardware and system. It is designed to control the operations of a computer and coordinate all external devices like c

compare encoders and multiplers

Classify computer systems according to capacity. How they are different from computers according to the classification of technology. Provide comparative study also.

QUESTION (a) Give the representation of a queue as an abstract data type. (b) What is a priority queue? Give two types of priority queues. (c) The following program does

Problem 1 Perform the following conversion a. (ABE) 16 =() 2 b. (101011) 2 =() 10 2 Explain how full adder adds three bits 3 Explain digital multiplexers


QUESTION (a) Distinguish between passive and active attacks. (b) Give two reasons why it is important to organise security awareness programs for users. (c) Explain how s

what is member dereferencing oprator ?