What is stack, Computer Engineering

Stack is a portion of RAM used for saving the content of Program Counter and common purpose registers.

LIFO stacks, also called as "push down" stacks, are the conceptually easiest way of saving information in a temporary storage location for such general computer operations as mathematical expression evaluation and recursive subroutine calling.

 

 

Posted Date: 4/6/2013 5:43:40 AM | Location : United States







Related Discussions:- What is stack, Assignment Help, Ask Question on What is stack, Get Answer, Expert's Help, What is stack Discussions

Write discussion on What is stack
Your posts are moderated
Related Questions
Algorithm to insert a key in B-tree is as follows: 1.  First search is completed for the place where the new record must be put. As the keys are inserted, they are sorted into

Problem: (a) What are the two main advantages of sound? (b) UTMDigitlab ltd, specialized in digitizing sound, converts an audio stream of the latest album of Britney Spea

INTEL ARCHITECTURE - 64 ( IA-64) IA-64 (Intel Architecture-64) is a 64-bit processor architecture developed in cooperation by Intel and Hewlett-Packard, executed by processors s

The linkage section is part of a known as program that 'links' or maps to data items in the calling program are working storage. It is the part of the called program where these sh

Discuss about Constrained-Random Verification Methodology Advent  of  constrained-random  verification  gives  verification  engineers  an  effective  method  to achieve covera

Find the Regular Grammar for the following Regular Expression: a(a+b)*(ab*+ba*)b.

Your task is to program software agents able to send and receive messages according to the two Gnutella protocols above. Your solution should have two types of agents:   A

What are the different types of parameters? Formal Parameters: Parameters, which are described during the definition of subroutine with the FORM statement.

In the case of Static call, the called program is a stand-alone program, it is an executable program. During run time we can call it in our called program. As about Dynamic call, t

Detail explanation of Cryptographic modules Physical security of the cryptographic modules is also built in order to provide total security of the whole system and protect from