Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Q. Define the ADDRESSING MODES?
The elementary set of operands in 8086 can reside in memory, register and immediate operand. How can these operands be retrievedby various addressing modes? The answer to the question above is provided in the subsequent sub-section. Large number of addressing modes assists in addressing complex data structures with ease. A number of specific Terms and registers roles for addressing:
Base register (BX, BP): These registers are employed for pointing to base of a stack, array etc.
Index register (SI, DI): These registers are employed as index registers in data and/or extra segments.
Displacement: It signifies offset from the segment address.
Addressing modes of 8086
Mode
Description
Direct
Effective address is the displacement of memory variable.
Register Indirect
Effective address is the contents of a register.
[BX]
[SI]
[DI]
[BP]
Based
Effective address is the sum of a base register and a displacement.
LIST[BX]
(OFFSET LIST + BX)
[BP + 1]
Indexed
Effective address is the sumof an index register and a displacement.
LIST[SI]
[LIST +DI]
[DI + 2]
Based Indexed
Effective address is the sum of a base and an index register.
[BP + DI]
Based Indexed with
displacement
Effective address is the sum of a base register, an index register, and a displacement.
[BX + SI + 2]
What is interactive reporting? A classical non-interactive report having of one program that makes a single list. Instead of one extensive and detailed list, with interactive
Hazard (computer architecture): In the computer architecture, a hazard is a possible problem that can occurs in a pipelined processor. It concern to the possibility of erroneo
What is clause form and resolution?
There should be 1 server thread and N client threads, where N is supplied by the user as a command line argument. The server opens a file called "all_requests.dat", the file has
For this exercise you have to gather and report some linguistic data. Make sure your data are accurate by checking them with a native speaker if you yourself are not a native speak
Explain dissimilar security protocols used for e-commerce applications. The e-commerce systems of today are composed of a number of components including: a commerce server, d
Explain Three-Way Handshake Mechanism used by TCP to terminate a Session reliably. Just to guarantee that connection is sets up or terminated reliably, transfer control protoco
How physical addressing is performed in WAN? WAN networks operate as similar to a LAN. All WAN technology classifies the exact frame format a computer uses while sending and re
What is time multiplexed space switching? Explain w ith a neat diagram. Time division switches, an inlet or an outlet corresponded to a particular subscriber line with one s
What are the advantages of electronic payment system? Advantages of the electronic payment system are illustrated below: This gives good security schemes. Four important sec
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd