Xor-logical instruction-microprocessor, Assembly Language

XOR: Logical Exclusive OR: The XOR operation is again carried out in a similar way to the AND and OR operation. The constraint over operands are also similar. The XOR operation produces a high output, when the 2 input bits are not similar. Or else, the output is 0.

The example instructions are as follows:

Example:

754_XOR1.jpg

If the content of AX is 3FOFH, then the first instance instruction will be executed as described. The result 3F97H will be stored in AX.

1274_XOR2.jpg

Posted Date: 10/12/2012 2:37:19 AM | Location : United States





if (n<10)
n=n+1
else
n=n-1
n=0

how to write this command
Posted by nizam | Posted Date: 1/19/2013 8:59:23 PM


Related Discussions:- Xor-logical instruction-microprocessor, Assignment Help, Ask Question on Xor-logical instruction-microprocessor, Get Answer, Expert's Help, Xor-logical instruction-microprocessor Discussions

Write discussion on Xor-logical instruction-microprocessor
Your posts are moderated
Related Questions
code to add two matrices

The Pentium Pro    Introduced in the year 1995, the Pentium Pro reflected  still  more  design  breakthroughs.  The Pentium Pro may process 3 instructions in a single clock cy

DEC : A powerful new Alpha 64 bit RISC computer chip was introduced in the year 1977, as new VAX (Virtual Address Extension) Computer. The VAX was 32 bit computer line based on

Read Architecture : Look Aside Cache In "look aside" cache architecture the main memory is located conflictingthe system interface. Both the cache main memory sees a bus cycle

XOR: Logical Exclusive OR: The XOR operation is again carried out in a similar way to the AND and OR operation. The constraint over operands are also similar. The XOR operation pr

Flag Register : 8086 has a 16-bit flag register which is divided into 2 parts, viz. (a)machine control flagsand (b)condition code or status flags. The condition code flag regi

The Pentium   The next member of the Intel family of microprocessors was the Pentium, introduced in the year 1993. With the Pentium, Intel broke its custom of numeric model name

Write a program that allows a user to encrypt/decrypt a message using a shift cipher. The user should specify the key and the message. Your program should be able to handle messa

CMPS : Compare String Byte or String Word:-The CMPS instruction may be utilized to compare two strings of Words or byte. The length of the string ought to be stored in the CX. If

III rd Generation Microprocessor: The single 3rd generation microprocessor chip having 64-pins began with the introduction of 16-bit Intel 8086 in 1978. The other essential