stack instructions, Basic Computer Science

Assignment Help:
These instructions permit the use of the stack to store or recover data.
POP
POPF
PUSH
PUSHF

POP INSTRUCTION
Purpose: It improves a portion of information from the stack
POPF INSTRUCTION
Purpose: It extracts the flags stored on the stack
POPF
This command moves bits of the word stored on the superior part of the stack to the flag register.
PUSH INSTRUCTION
Purpose: It puts a word on the stack.
Syntax:
PUSH source
The PUSH instruction reduces by two the value of SP and then transfers the data of the source operator to the new resulting address on the just modified register.
The decrement on the address is due to the fact that when adding values to the stack, this one raises from the greater to the smaller segment address, consequently by subtracting 2 from the SP register what we do is to raise the size of the stack by two bytes, which is the only amount of information the stack can handle on every input and output of information.
PUSHF INSTRUCTION
Purpose: It situates the value of the flags on the stack.
Syntax:
PUSHF
This command reduces by 2 the value of the SP register and then the content of the flag register is relocated to the stack, on the address indicated by SP.
The flags are gone stored in memory on the similar bits indicated on the POPF command.

Related Discussions:- stack instructions

CS310, Ask question #Minimashdhdghfdgdfgdsgfdsgdsgdgdfgdgfdgdfgdfgdfsgfdsgd...

Ask question #Minimashdhdghfdgdfgdsgfdsgdsgdgdfgdgfdgdfgdfgdfsgfdsgdfsgum 100 words accepted#

Perverse software, Perverse software: Perverse software is a program w...

Perverse software: Perverse software is a program which causes hindrances in other programs execution in such a way resulting in modification or complete destruction of data w

Explain the characteristics of leasing, Question 1 Give the classification...

Question 1 Give the classification of Client/Server software architectures Question 2 Explain the characteristics of Leasing Question 3 Write a note on Activator interfa

C, programm for fibonacci series

programm for fibonacci series

Distinguish between passive and active attacks, QUESTION (a) Distinguis...

QUESTION (a) Distinguish between passive and active attacks. (b) Give two reasons why it is important to organise security awareness programs for users. (c) Explain how s

SQL 2008 Server Management Studio, 4. Provide a list of productid’s, the n...

4. Provide a list of productid’s, the name of the vendor and their credit rating. The results should be ordered by last name and then by credit rating. Write out the SQL that wo

Flowchart, i need help with flowcharting a procedure

i need help with flowcharting a procedure

Fhtjhnkjfdum, ryby db fgrh herbgh buyh hehg gvo hb bbithbs bgshbshdgbh bu...

ryby db fgrh herbgh buyh hehg gvo hb bbithbs bgshbshdgbh bubfvhb bs v h hjjg jdk jnmnv j

Explain the functions of alu, Question 1 Write down the Booth's Multiplica...

Question 1 Write down the Booth's Multiplication Algorithm. Justify the Booth's Multiplication Algorithm Question 2 Explain the functions of ALU Question 3 Define the term ins

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd