Inherent addressing, Computer Engineering

Assignment Help:

Inherent addressing

  Here the address is already built in to the instruction i.e. inherent to the code
 
  ABA  ; Add A to B and store the answer in A 

Simple programs using the 68HC11 language

  This section of functions include instructions such as ALU functions, simple movement and logically operations .Let us consider the addition of two 8 bit numbers

Program One: Data is immediate
 
  LDAA #$fe  ; Load hex fe into accumulator A
  ADDA #$1  ; Add 1 hex to A i.e total = ff hex
 
Program two:  Direct addressing and extended addressing

  Assume the data is stored at the following Ram address

Address Data
501    fe     Number One
502    01    Number Two
503            Result
 
LDAA $501  ;Load fe from address 501 into A
ADDA $502  ;Add 01 from address 502 into A
STAA $503  ;Store the answer ff at address 503
 
Program three: Index addressing

  Assume the data is stored at the following Ram address

Address Data
500     fe    Number One
501    01    Number Two
502             Result
  
LDX #$500    ;Load IX with 500 base address
LDAA  $0,X    ;Load data from 500 + 0 into A i.e fe
ADDA  $1,X    ;Add data from 500+1  to A i.e ff
STAA  $2,X    ;Store A at address 500+2


Related Discussions:- Inherent addressing

What is test factory, Rational Test Factory is a component-based testing to...

Rational Test Factory is a component-based testing tool that automatically produces TestFactory scripts according to the application's navigational structure. TestFactory is integr

Explain circular dependencies, Explain Circular Dependencies. Circul...

Explain Circular Dependencies. Circular Dependencies: To know the problem of circular dependencies consider a file server which uses a timeserver to acquire the current

Write a program that finds the minimum total number of shelv, Write a progr...

Write a program that finds the minimum total number of shelv, C/C++ Programming

NETWORK ADMIN, Ask qDiscuss the risks of having a single root user and how ...

Ask qDiscuss the risks of having a single root user and how more limited management abilities can be given to others users on Linux/UNIX systems.uestion #Minimum 100 words accepted

Explain the matlab language, This is a high-level matrix/array language wit...

This is a high-level matrix/array language with control flow statements, functions, data structures, input/output, and object-oriented programming features. It permits both "progra

What are compilers and interpreters, What are compilers and interpreters? ...

What are compilers and interpreters? Compiler and Interpreter: These are two types of language translators. A compiler changes the source program (user-written program) int

Show SNMPs representation in ASN.1 syntax, An SNMP integer whose value is 2...

An SNMP integer whose value is 200 has to be transmitted. Show its representation in ASN.1 syntax. An ASN.1 transfer syntax describes how values of ASN.1 types are unambiguousl

Computer network architecture, A protocol is a formal description of messag...

A protocol is a formal description of message formats and the rules two or more machines must follow to exchange those messages. Because TCP (transmission control protocol) and IP

Compute the coefficient for classifier, Consider the data with categorical ...

Consider the data with categorical predictor x 1 = { green or red } and numerical predictor x 2 and the class variable y shown in the following table. The weights for a round

Emergence of computer network, Which Technologies of this age had tended to...

Which Technologies of this age had tended to the emergence of computer network? Ans: The technologies are Communication technology and Computer technology with the support of V

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd