Loading instructions, Basic Computer Science

Assignment Help:
They are particular register instructions. They are used to load bytes or sequences of bytes onto a register.
LODS (LODSB) (LODSW)
LAHF
LDS
LEA
LES
LODS (LODSB) (LODSW) INSTRUCTION
Goal: To load sequences of a byte or a word into the accumulator.
Syntax:
LODS
This instruction takes the sequence found on the address specified by SI, loads it to the AL (or AX) register and adds or subtracts , depending on the state of DF, to SI if it is a bytes transfer or if it is a words transfer.
MOV SI, OFFSET VAR1
LODS
The first line loads the VAR1 address on SI and the second line receives the content of that locality to the AL register.
• The LODSB and LODSW commands are used likewise, the first one loads a byte and the second one a word (it uses the whole AX register).
LAHF INSTRUCTION
Goal: It transfers the full content of the flags to the AH register.
Syntax:
LAHF
This instruction is helpful to make sure the state of the flags through the execution of our program.
LDS INSTRUCTION
Goal: used to load the register of the data segment
Syntax:
LDS destiny, source
The source operator must be a dual word in memory. The word related with the largest address is transferred to DS, in other words it is taken as the segment address. The word associated with the lesser address is the displacement address and it is deposited in the register indicated as destiny.
LEA INSTRUCTION
Goal: To load the address of the source operator
Syntax:
LEA destiny, source
The source operator must be situated in memory, and its displacement is placed on the index register or specified pointer in destiny.

Related Discussions:- Loading instructions

Microprocessor, what is computer mapped input / output

what is computer mapped input / output

Keystroke logger and data-stealing, Keystroke logger and Data-stealing: ...

Keystroke logger and Data-stealing: Keystroke loggers: This is a program, once installed on the system, which intercepts the keys when entering the password or the Credit Ca

Help with this question, In a certain word game a player can buy vowels and...

In a certain word game a player can buy vowels and consonants. The first vowel is free; each additional vowel cost $1. The first two consonants are free; each additional constant c

Software engineering, how will a poorly conducted feasibility study affect ...

how will a poorly conducted feasibility study affect an implemented system

Define jumps and loops , The unconditional jumps in a written program in a...

The unconditional jumps in a written program in assembler language are specified by the jmp instruction; a jump is to moves the flow of the execution of a program by sending the co

Binary codes, Binary Codes: We have seen earlier that digital computer...

Binary Codes: We have seen earlier that digital computers use signals that have two distinct values and there exists a direct analogy between binary signals and binary digits.

Oop, evolution of oop

evolution of oop

Briefly explain the types of textures, Question 1 Describe the four compon...

Question 1 Describe the four components of light source Question 2 Briefly explain the types of textures Question 3 Explain the standard settings used to adjust th

Command processor and user interface, Command Processor and User Interface:...

Command Processor and User Interface: To the user, the most important and visible services provided by the OS is the user interface and the capabilities that it provides to ex

What is the importance of using digital certificates, QUESTION a) Crypt...

QUESTION a) Cryptography is a set of techniques and mathematical algorithms. Describe four important areas where cryptography must be applied b) What is the importance of us

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd