Short notes on displacement only addressing mode, Computer Engineering

Assignment Help:

(a) Write short notes on displacement only addressing mode.

(b) Explain the formats of a 80-bit floating point number.

(c) Given the following assembly program. Instructions affect the CPU status flags at several stages when the program is run. Show on which lines the flags ZF, CF and OF are triggered to 1.

TITLE Addition and Subtraction

INCLUDE Irvine32.inc

.data
Rval SDWORD ?
Xval SDWORD 26
Yval SDWORD 30
Zval SDWORD 40

.code
main PROC

; INC and DEC
mov ax,1000h
inc ax
dec ax

; Expression: Rval = -Xval + (Yval - Zval)
mov eax,Xval
neg eax
mov ebx,Yval
sub ebx,Zval
add eax,ebx
mov Rval,eax
mov cx,1
sub cx,1
mov ax,0FFFFh
inc ax

mov cx,0
sub cx,1
mov ax,7FFFh
add ax,2

mov al,0FFh
add al,1

mov al,+127
add al,1
mov al,-128
sub al,1
exit
main ENDP
END main

(d) Write a program in assembly to evaluate the sum of all the hexadecimal integer numbers of a 5-element array. Show the registers' contents.


Related Discussions:- Short notes on displacement only addressing mode

Define the working of flip flops, Define the working of Flip Flops? Fli...

Define the working of Flip Flops? Flip flop is the basic unit of storage this is used to store one bit of information. Flip-flops are the synchronous bistable devices. The term

Define the types of software life cycle, Define the types of software life ...

Define the types of software life cycle Any system progress refers to the initial part of the software life cycle: analysis, design, and implementation. During object oriented

Java''s layout managers give over traditional windowing syste, Java uses la...

Java uses layout managers to lay out components in a consistent manner across all windowing platforms. As Java's layout managers aren't tied to absolute sizing and positioning, the

Define password methods and biometric systems, Define the password methods ...

Define the password methods and Biometric systems for implementing client server network security. In cyberspace, buyers and sellers cannot notice each other. Also within video

Explain about the e-commerce over extranets, Explain about the e-commerce o...

Explain about the e-commerce over extranets. Extranets are regarding “joining up” the supply chain-suppliers, distributors, resellers and customers are enabling business-to bus

Determine 8-input multiplexer IC in the TTL family, The commercially availa...

The commercially available 8-input multiplexer integrated circuit in the TTL family is ? Ans. In TTL, MUX integrated circuit is 74153.

Register-to-register architecture, Register-to-Register Architecture : In t...

Register-to-Register Architecture : In this organization, results and operands are accessed not directly from the main memory by the scalar or vector registers. The vectors which a

Identify specific weaknesses in the design, Identify three specific weaknes...

Identify three specific weaknesses in the design of the websites, derived from your analyses within Questions Part (c) and/or Question Part (a). There should be at least one weakne

What is winchester technology, What is Winchester technology? The disk ...

What is Winchester technology? The disk and the read/write heads are placed in a sealed air-filtered enclosure known as Winchester technology.

What is supply chain management, What is Supply Chain Management? Suppl...

What is Supply Chain Management? Supply Chain Management: Supply Chain Management includes developing the performance of an organization's supply chain from its suppliers to

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd