Syntax of a Procedure in assembly language, Basic Computer Science

There are two kinds of procedures, the intrasegments, which are found on the similar segment of instructions and the inter-segments which can be stored on dissimilar memory segments.
The value of IP is stored on the stack, when the intrasegment procedures are used and when the intrasegments are used the value of CS: IP is stored.
To redirect the flow of a procedure (calling it), the following directive is used:
CALL Name of the Procedure
The parts which create a procedure are:
• Declaration of the procedure
Code of the procedure
Return directive
Termination of the procedure
The calling of this procedure is done the following way:
Call Adding
Macros recommend a greater flexibility in programming contrasted to the
procedures; nonetheless, these last ones will at rest be used.
Posted Date: 5/4/2012 8:10:09 AM | Location : United States







Related Discussions:- Syntax of a Procedure in assembly language, Assignment Help, Ask Question on Syntax of a Procedure in assembly language, Get Answer, Expert's Help, Syntax of a Procedure in assembly language Discussions

Write discussion on Syntax of a Procedure in assembly language
Your posts are moderated
Related Questions
Another way of classifying a computer system is based upon its size and capabilities: Microcomputers: Microcomputers are systems based on the use of microprocessors. A Micr


how to measure marginal utility.?

Question 1 Explain the role of object oriented designers in developing a software system Question 2 What are the four essential elements of design patterns? Explain Question 3

i am currently studying my computer science engineering 2nd yr. i am unable to select what specification should i take please help me

Because it is enormously low level, assembly language can be optimized enormously well. Therefore assembly language is used where the extreme performance is needed for applications

Security threats on internet:  The Internet has many advantages; however, it also opens up security threat. In this section we just want to highlight some of the threats that

SOFTWARE EVOLUTION:  As you know that in a computer system both hardware and software complement each other  -  one is of hardly any use without the other. Hence, since the ve

Programs - programming language: Programs to implement algorithms on the computer must be written in a language that the computer can understand. It is fruitful, therefore, to

DATA AUTONOMOUS TRANSMISSION: This could be the possible replacement for the ARINC 429 standard and will be annotated the standard - ARINC 629. In the DATAC system, the contro