Loading instructions, Basic Computer Science

They are particular register instructions. They are used to load bytes or sequences of bytes onto a register.
LODS (LODSB) (LODSW)
LAHF
LDS
LEA
LES
LODS (LODSB) (LODSW) INSTRUCTION
Goal: To load sequences of a byte or a word into the accumulator.
Syntax:
LODS
This instruction takes the sequence found on the address specified by SI, loads it to the AL (or AX) register and adds or subtracts , depending on the state of DF, to SI if it is a bytes transfer or if it is a words transfer.
MOV SI, OFFSET VAR1
LODS
The first line loads the VAR1 address on SI and the second line receives the content of that locality to the AL register.
• The LODSB and LODSW commands are used likewise, the first one loads a byte and the second one a word (it uses the whole AX register).
LAHF INSTRUCTION
Goal: It transfers the full content of the flags to the AH register.
Syntax:
LAHF
This instruction is helpful to make sure the state of the flags through the execution of our program.
LDS INSTRUCTION
Goal: used to load the register of the data segment
Syntax:
LDS destiny, source
The source operator must be a dual word in memory. The word related with the largest address is transferred to DS, in other words it is taken as the segment address. The word associated with the lesser address is the displacement address and it is deposited in the register indicated as destiny.
LEA INSTRUCTION
Goal: To load the address of the source operator
Syntax:
LEA destiny, source
The source operator must be situated in memory, and its displacement is placed on the index register or specified pointer in destiny.
Posted Date: 5/4/2012 4:29:00 AM | Location : United States







Related Discussions:- Loading instructions, Assignment Help, Ask Question on Loading instructions, Get Answer, Expert's Help, Loading instructions Discussions

Write discussion on Loading instructions
Your posts are moderated
Related Questions
Program Planning (Preparation of a Flow Chart) A flow chart is a graphic method for indicating a proposed or actual solution to the problem. A flow chart shows the steps a comp


The difference between kernel mode and user mode gives a rudimentary form of security in the following manner. Convinced instructions could be executed only when the CPU is in kern

requirement analysis and specification for online voting

Design an ER diagram for an IT training group. The company has 12 instructors and can handle upto 100 trainees for each training section. The company offers 5 advanced technology c

Problem Write the steps to use the Network setup wizard. Elaborate the optional subcomponents in the windows component wizard. 1. Click Next to skip past the Welcome screen.

Question 1 Write short note on                             1) NFS 2) CIFS Question 2 What is Virtual Application? Write down the benefits and drawbacks of it Questi

Question 1 Write a note on transition, transition types & Features Question 2 Describe the different types of lens used in film shooting Question 3 Briefly explain

For which X,Y in {o, O, Theta, Omega, omega}, do the relationships t(n)+t''(n) = X(min(t(n),t''(n))) and t(n)+t''(n) = Y(max(t(n),t''(n))) hold for all t,t'' such that t(n),t''(n)

Problem 1 Explain the different categories of electronic payment system in detail Listing the types and sub types Explanation Problem 2 We know that there a