Loading instructions, Basic Computer Science

Assignment Help:
They are particular register instructions. They are used to load bytes or sequences of bytes onto a register.
LODS (LODSB) (LODSW)
LAHF
LDS
LEA
LES
LODS (LODSB) (LODSW) INSTRUCTION
Goal: To load sequences of a byte or a word into the accumulator.
Syntax:
LODS
This instruction takes the sequence found on the address specified by SI, loads it to the AL (or AX) register and adds or subtracts , depending on the state of DF, to SI if it is a bytes transfer or if it is a words transfer.
MOV SI, OFFSET VAR1
LODS
The first line loads the VAR1 address on SI and the second line receives the content of that locality to the AL register.
• The LODSB and LODSW commands are used likewise, the first one loads a byte and the second one a word (it uses the whole AX register).
LAHF INSTRUCTION
Goal: It transfers the full content of the flags to the AH register.
Syntax:
LAHF
This instruction is helpful to make sure the state of the flags through the execution of our program.
LDS INSTRUCTION
Goal: used to load the register of the data segment
Syntax:
LDS destiny, source
The source operator must be a dual word in memory. The word related with the largest address is transferred to DS, in other words it is taken as the segment address. The word associated with the lesser address is the displacement address and it is deposited in the register indicated as destiny.
LEA INSTRUCTION
Goal: To load the address of the source operator
Syntax:
LEA destiny, source
The source operator must be situated in memory, and its displacement is placed on the index register or specified pointer in destiny.

Related Discussions:- Loading instructions

Algorithm writing, algorithm to simulate railway reservation process

algorithm to simulate railway reservation process

What are the Software interruptions, Software interruptions can be thoroug...

Software interruptions can be thoroughly activated by the assembler invoking the number of the preferred interruption with the INT instruction. The use of interruptions aids us in

Computer architecture, Write control sequence for adding the content of the...

Write control sequence for adding the content of the memory location whose address is at memory location pointed by immediate number NUM to register R1. Assume the number NUM is pr

Types of browsers, Types of Browsers: Line Mode Browsers : The initia...

Types of Browsers: Line Mode Browsers : The initial browsers were line mode text browsers. These browsers were simple and used to display text line by line. They used to prov

Cpu, what is cpu

what is cpu

Database design, Build a database application for a sports league. Assume y...

Build a database application for a sports league. Assume your application is to keep track of teams and equipment that is checked out to teams. Explain the steps that is needed and

Telecommunication protocols, TELECOMMUNICATION PROTOCOLS: The two majo...

TELECOMMUNICATION PROTOCOLS: The two major components relating to a WAN are the Protocol and the Media. The media are the actual path ways that the protocol travels on. The ne

Q1, Write a half-page summary explaining IP spoofing.

Write a half-page summary explaining IP spoofing.

Data mining analysis, Using Weka 3.6 (basketball or cloud data set). Using ...

Using Weka 3.6 (basketball or cloud data set). Using the EM clustering method, how many clusters did the algorithm decide to make? If we change from "Use Training Set" to "Percenta

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd