Pointer(ptr)-assemblers directive-microprocessor, Assembly Language

Assignment Help:

PTR : Pointer:-

The pointer operator which is used to declare the type of a variable, label or memory operand. The operator PTR is prefixed by either WORD or BYTE. If the prefix is BYTE, then thespecific label, variable or memory operand is treated as an 8-bit quantity, whereas if WORD is the prefix, then it is treated as a 16-bit quantity.  In other terms, the PTR operator is used to mention the data type - byte or word. The examples of the PTR operator are following:

Example :

57_ptr.jpg

In particular case of JMP instructions, the PTR operator is used to mention the type of the jump, for example near or far, as describe in the examples given below.

JMP     WORD PTR [BX]-NEAR Jump

JMP     WORD PTR [BX]-FAR Jump

PUBLIC  As  already described,  the PUBLIC directive which is used along with the EXTRN  directive. This give information to the assembler that the variables, labels, constants, or procedures declared PUBLIC can be accessed  by other assembly modules to form their codes, but when using the PUBLIC declared variables, labels ,constants or procedures the user ought to declare them externals  by using the EXTRN directive. Instead, the data types declared EXTRN in a module of the program, can be declared PUBLIC in at least any one of the other modules of the similar program. (Refer to the explanation on EXTRN directive to get the clear idea of PUBLIC.)


Related Discussions:- Pointer(ptr)-assemblers directive-microprocessor

Assembly - Zombie Game using Irvine & Visual 2010, http://www.raritanval.ed...

http://www.raritanval.edu/uploadedFiles/faculty/cs/full-time/Brower/CISY256/2013Spring/CISY256%20Assembly%20Project.pdf

Write policy-microprocessor, Write Policy A write policy determines how...

Write Policy A write policy determines how the cache deals with a write cycle. The 2 common write policies areWrite-Throughand Write-Back. In Write-Back policy, the cache behav

Architecture of file transfer, Explain the architecture of the file transfe...

Explain the architecture of the file transfer protocol ftp in terms of clients, servers, sockets

StrNCpyAsm, ;StrNCpyAsm - copy zero terminated string2 to zero terminated s...

;StrNCpyAsm - copy zero terminated string2 to zero terminated string1, ; but copy no more than count (parameter) characters ; or the length of string2, whi

4 bit 2s complement multiplier, How to design 4 bit signed 2s complement m...

How to design 4 bit signed 2s complement multiplier?

Write an assembly program to find out largest number, Program :  Write an...

Program :  Write an assembly program to find out the largest number from a given unordered array of 8-bit numbers that stored in the locations starting from a known address. S

Tabular comparison for micro processors parameters, Tabular comparison for ...

Tabular comparison for µ PS' Parameters Tables (a) and (b) list the characteristic of Intel microprocessor. Table(a):   Table(b): It has a 64 bit da

Hold response sequence-microprocesssor, Hold Response Sequence The HOLD...

Hold Response Sequence The HOLD pin is examined at leading edge of each clock pulse. If it is received active line by the processor before T4 of the earlier cycle/during the T1

Selecting array elements, implement the following c++ code in assembly lang...

implement the following c++ code in assembly language using the block-structured .IF and .while directives

NASM assembly language programming, NASM assembly language program: Consid...

NASM assembly language program: Consider a sequence of 19 strictly positive decimal digits, most likely stored in an array. There are obviously duplicates, and the sequence is un

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd