Dos function calls, Computer Engineering

Assignment Help:

INT 21H supports about 100 different functions. A function is recognised by putting the function number in AH register. For illustration if we want to call function number 01 then we place this value in AH register first by employing MOV instruction and after that call INT 21H:

Some significant DOS function calls are: 

DOS

Function Call 

Purpose

Example

AH = 01H

 

For reading a single character from keyboardand echo it on monitor. The input value is put inAL register.

To get one character input in a variable in data segment you may include the following in the code segment:

MOV AH,01

INT 21H

MOV X, AL 

(Please note that interrupt call will return value in AL which is being transferred to variable of data segment X. X must be byte type).

AH = 02H

This function prints 8 bit data (normally ASCII) that is stored in DL register on the screen.

To print a character let say '?' on the screen we may have to use following set of commands:

MOV AH, 02H;

MOV DL, '?'

INT 21H

AH = 08H

This is an input function for inputting one character. This is same as AH = 01H functions with the only difference that value does not get displayed on the screen.

Same example as 01 can be used only difference in this case would be that theinput character wouldn't get displayed

MOV AH, 08H

INT 21H

MOV X, AL

AH = 09H

This program outputs a string whose offset is stored in DX register and that is terminated using a $ character. One can print newline, tab character also. 

To print a string "hello world" followed by a carriage return (control character) we may have to use the following assembly program segment.

 

Example of

AH = 09H

CR EQU ODH 

; ASCII code of carriage return.

DATA SEGMENT 

STRING DB 'HELLO WORLD', CR, '$'

DATA ENDS

CODE SEGMENT

         :

      MOV AX, DATA

      MOV DS, AX

      MOV AH, 09H

      MOV DX, OFFSET STRING

; Store the offset of string in DX register.

      INT 21H

AH = 0AH

For input of string up to 255 characters. The stringis stored in a buffer.

Look in the examples given.

AH = 4CH

Return to DOS

 


Related Discussions:- Dos function calls

Modified digital clock, can you deign the schematic of a modified digital c...

can you deign the schematic of a modified digital clock at the gate as well as the IC level and then construct the circuit, lab spec and industral spec?

ip address and port number at the remote host, How many TCP connections ar...

How many TCP connections are in the "Established" state? Contain relevant output. For one of the established TCP connections, what are the IP address and port number at the remote

Explain the differences of casex and casez, Explain the differences of case...

Explain the differences of casex and casez over the case statement? casex operator has to be used when both high impedance value (z) and unknown (x) in any bit  has  to  be  t

Multiprogramming or multitasking, Multiprogramming or multitasking? An...

Multiprogramming or multitasking? Ans: The OS manages the concurrent execution of many application programs to make best possible use of computer resources. This pattern of si

Subtract the numbers using 1's complements, Subtraction 11001-10110 using 1...

Subtraction 11001-10110 using 1's complement Ans. 11001 - 10110 01001 is 1' s Compliment of 10110, so     1 1 0 0 1 +  0 1 0 0 1 ------------------    1 0 0 0 1 0    Add 1

Write hit policies, Write Hit Policies: Write through o   Upd...

Write Hit Policies: Write through o   Update next level on every write o   Cache is always clean o   A lots of traffic to next level (mostly write) Write

What is the function of a tlb, What is the function of a TLB (translation...

What is the function of a TLB (translation look-aside buffer)? A small cache called the TLB is interporated into MMU, which having of the page table entries that correspondi

Determine about the blocking suspicious behaviour, Determine about the bloc...

Determine about the blocking suspicious behaviour The response could be spontaneous and automatic, with an option to generate the alert message manually. The history recorded i

What are the disadvantages of public key cryptography, What are the disadva...

What are the disadvantages of Public Key Cryptography? Disadvantages of Public Key Cryptography are as given below: a) It is used to encrypt a secret key that is used to e

What are models and meta models, Model: It is a entire explanation of s...

Model: It is a entire explanation of something (i.e. system). Meta model: It shows the model elements, syntax and semantics of the notation that permits their manipulatio

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd