Inherent addressing, Computer Engineering

Assignment Help:

Inherent addressing

  Here the address is already built in to the instruction i.e. inherent to the code
 
  ABA  ; Add A to B and store the answer in A 

Simple programs using the 68HC11 language

  This section of functions include instructions such as ALU functions, simple movement and logically operations .Let us consider the addition of two 8 bit numbers

Program One: Data is immediate
 
  LDAA #$fe  ; Load hex fe into accumulator A
  ADDA #$1  ; Add 1 hex to A i.e total = ff hex
 
Program two:  Direct addressing and extended addressing

  Assume the data is stored at the following Ram address

Address Data
501    fe     Number One
502    01    Number Two
503            Result
 
LDAA $501  ;Load fe from address 501 into A
ADDA $502  ;Add 01 from address 502 into A
STAA $503  ;Store the answer ff at address 503
 
Program three: Index addressing

  Assume the data is stored at the following Ram address

Address Data
500     fe    Number One
501    01    Number Two
502             Result
  
LDX #$500    ;Load IX with 500 base address
LDAA  $0,X    ;Load data from 500 + 0 into A i.e fe
ADDA  $1,X    ;Add data from 500+1  to A i.e ff
STAA  $2,X    ;Store A at address 500+2


Related Discussions:- Inherent addressing

What is an imperative statement, What is an imperative statement? Ans. ...

What is an imperative statement? Ans. Shows an action to be performed throughout execution of assembled program is an imperative statement.

Authorization bypass, Authorization Bypass is a frighteningly easy process ...

Authorization Bypass is a frighteningly easy process which can be employed with poorly designed applications or content management frameworks. You know how it is... you run a small

Explain the following the address instruction, Explain the following the ad...

Explain the following the address instruction?  Three-address instruction-it can be represented as add a,b,c Two-address instruction-it can be shown as Add a,b

Define http, Http Hyper Text Transfer Protocol: The WWW protocol that...

Http Hyper Text Transfer Protocol: The WWW protocol that performs the request and regain functions of a server. Generally seen as the first part of a website address. It is t

What is sap locking, What is SAP locking? It is a mechanism for describ...

What is SAP locking? It is a mechanism for describing and applying logical locks to database objects.

Basic architecture of computer system, Q. Basic Architecture of computer sy...

Q. Basic Architecture of computer system? Replacing the ALU and CU (i.e., CPU) of Figure by a microprocessor, and storing instructions and data in the same memory, one arrives

Basic computer, The use of Information Technology (IT) is well known. IT ha...

The use of Information Technology (IT) is well known. IT has turn into a must for survival of all business houses with growing information technology trends. Computer is main compo

Safety argument for good design, So far we have considered the problems of ...

So far we have considered the problems of poor ID in terms of the loss of productivity and efficiency to business. There is another important aspect to consider: the issue of safet

What is unordered lists, Q. What is Unordered Lists? First, we will bui...

Q. What is Unordered Lists? First, we will build an unordered list. Many times, these lists are also termed as bulleted lists. These lists are characterized by list items which

What is the cih, CIH, also known  as Chernobyl or Spacefiller, is a Microso...

CIH, also known  as Chernobyl or Spacefiller, is a Microsoft Windows computer virus which first emerged in 1998. It is one of the most damaging viruses, overwriting critical inform

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd