Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Q. How are comparisons done in 8086 assembly language?
There is a compare instruction CMP. Though this instruction just sets the flags on comparing two operands (both 16 bits and 8 bits). Compare instruction just subtracts value of source from destination without storing result however setting the flag at the time of the process. Normally only 3 comparisons are more important. These are:
Result of comparison Flag(s) affected
Destination < source Carry flag = 1
Destination = source Zero flag = 1
Destination > source Carry = 0, Zero = 0
Let us look at 3 illustration which show how flags are set when numbers are compared. In illustration 1 BL is less than 10 so carry flag is set. In illustration 2 the zero flag is set since both operands are equal. In illustration 3 the destination (BX) is greater than source so both zero and carry flags are clear.
Example 1:
MOV BL, 02h
CMP BL, 10h; Carry flag = 1
Example 2:
MOV AX, F0F0h
MOV DX, F0F0h
CMP AX, DX; Zero flag = 1
Example 3:
MOV BX, 200H
CMP BX, 0; Zero and Carry flags = 0
Q. Dynamic Configuration of parallel virtual machine? int pvm_addhosts( char **hosts, int nhost, int *infos ) Add hosts to virtual machine. hosts is an arra
explain associative mapping
Define Mapping and List mapping procedure? The transformation of data from main memory to cache memory is known as an Mapping. Associative mapping Direct mapping
What is the maximum size of a database that can be opened in Microsoft Access? Ans) 1 Gigabyte
Q. Explain Active Matrix or Thin Film Transistor technology? This is known as TFT (Thin Film Transistor) technology. In this there is a transistor at every pixel acting as a r
Q. Address - operand data types? Addresses : Operands residing in memory are specified by their memory address while operands residing in registers are specified by a re
How is basic authentication worked? When an exact resource has been protected using fundamental authentication, Apache sends a 401 Authentication needed header along with the r
Explain the term Progressive Control. Progressive Control: Step by step system is an illustration of progressive control. The connection is established in stages, in respo
The GNU Image Manipulation Program, or GIMP, is a raster graphics editor application with some support for vector graphics. GIMP is used to process digital graphics & photographs.
Primary objectives/details of Load Sharing Facility Resource Management Software (LSFRMS) are better resource utilisation by routing task to most suitable system as well a better u
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd