Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Q. Determine the use of LOOP instruction?
Program:This program prints the alphabets (A-Z)
; Register used: AX, CX, DX
CODE SEGMENT
ASSUME: CS: CODE.
MAINP: MOV CX, 1AH ; 26 in decimal = 1A in hexadecimal Counter.
MOV DL, 41H ; Loading DL with ASCII hexadecimal of A.
NEXTC: MOV AH, 02H ; display result character in DL
INT 21H ; DOS interrupt
INC DL ; Increment DL for next char
LOOP NEXTC ; Repeat until CX=0. (Loop automatically decrements
; CS and checks whether it is zero or not)
MOV AX, 4C00H ; Exit DOS
INT 21H ; DOS Call
CODE ENDS
END MAINP
Busy hour traffic is the (A) maximum average simultaneous traffic. (B) traffic during peak hour. (C) traffic when all subscribers are engaged. (D) the durat
Layout pages, can describe sections, which can then be overridden by particular views making use of the layout. Major and overriding sections is optional.
what is boundary filling explain with example
Q. Explain Physical Characteristics of magnetic disk? Figure below lists main features that differentiate among different types of magnetic disks. First head may either be fixe
Name the appliances which are controlled by micro-processor Many household appliances which are microprocessor-controlled do not have operating systems (for example microwave o
Name some Popular Internet Browsers There are many internet browers are available on internet. Some Popular Internet Browsers are: Internet Explorer, Netscape Navigato
reflection in 2d
What is Indexed addressing The location of data is calculated as sum of an address specified by one of previous methods, and value of an index register. This allows an array of
What are the different scheduling policies in Linux The Linux scheduler has three different scheduling policies: one for 'normal'Processes, and two for 'real time' processes
i wants to know the methods and process of substitution and transposition cipher with examples.
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd