Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Q. What is Assembler?
An assembly program is used to transfer assembly language mnemonics to binary code for every instruction after the complete program has been written with support of an editor it's then assembled with help of an assembler.
An assembler works in 2 stageswhich are: it reads your source code 2 times. In first pass the assembler gathers all the symbols defined in the program accompanied by their offsets in symbol table. On the 2ndpass through the source program it generates binary code for every instruction of the program and give all symbols an offset with respect to segment from symbol table.
The assembler produces three files. Object file, list file and cross reference file. The object file comprises the binary code for every instruction in program. It is created only when your program has been successfully assembled without errors. Errors which are detected by assembler are known as the symbol errors. For illustrationMOVE AX1, ZX1.
In the statement it reads the word MOVE and it attempts to match with mnemonic sets as there is no mnemonic with this spelling then it presumes it to be an identifier and searches for its entry in symbol table. It doesn't even find it there hence gives an error as undeclared identifier.
List file is optional and comprises the source code, binary equivalent of every instruction and offsets of symbols in the program. This file is for purelydocumentation purposes. A number of the assemblers available on PC are TURBO,MASM etc.
Distortion caused on telephone line by an adjacent one is called (A) Cross Fire (B) Inductive Disturbance (C) Cross Talk (D) Non
It speeds execution of distributed applications. It runs on dissimilar platforms. It time independent. No loss for msg delivery i.e. guarantee delivery.
If for a short period of time circuits goes to some dissimilar logic level then it is assumed to have then it is known as static hazard e.g. If the final logic value of output of a
Determine the Define Byte - Assembler directives DB (Define Byte): DB directive defines a byte-type variable (i.e. a variable that occupies one byte of memory space). In a give
Protocol used to monitor and control network devices operates at? Protocol operates at application layer to monitor and control network devices operates.
The reason is, LINQ is used with C# or other programming languages, which needs all the variables to be declared first. From clause of LINQ query just describes the range or condit
Why a function can n ot call a task As functions doesn't consume time,it can do any operation which doesn't consume time. Mostly tasks are written that consumes time. So a ta
The maximum number of nodes in a binary tree of depth 5 is 31 is the maximum number of nodes in a binary tree
Functionality under load can be tested by running various Vusers concurrently. By enhancing the amount of Vusers, we can verify how much load the server can sustain.
Suppose that your team is then asked to expand the system. The publisher now wishes to make other computer science publications. As a team member, you are asked to make a class tha
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd