Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Q. What is Assembler?
An assembly program is used to transfer assembly language mnemonics to binary code for every instruction after the complete program has been written with support of an editor it's then assembled with help of an assembler.
An assembler works in 2 stageswhich are: it reads your source code 2 times. In first pass the assembler gathers all the symbols defined in the program accompanied by their offsets in symbol table. On the 2ndpass through the source program it generates binary code for every instruction of the program and give all symbols an offset with respect to segment from symbol table.
The assembler produces three files. Object file, list file and cross reference file. The object file comprises the binary code for every instruction in program. It is created only when your program has been successfully assembled without errors. Errors which are detected by assembler are known as the symbol errors. For illustrationMOVE AX1, ZX1.
In the statement it reads the word MOVE and it attempts to match with mnemonic sets as there is no mnemonic with this spelling then it presumes it to be an identifier and searches for its entry in symbol table. It doesn't even find it there hence gives an error as undeclared identifier.
List file is optional and comprises the source code, binary equivalent of every instruction and offsets of symbols in the program. This file is for purelydocumentation purposes. A number of the assemblers available on PC are TURBO,MASM etc.
Stack pointer is a particular purpose 16-bit register in the Microprocessor, which grasp the address of the top of the stack.
Unencoded micro-instructions One bit is required for each control signal; so number of bits needed in a micro-instruction is high. It represents a detailed hardware vi
Q. Explain about wildcard character in DOS? Sometimes you may like to list files having similar names. Let as suppose that these files are present in a root directory of drive
1- The Privacy Policy: The vendor must explain to the customer how all his information especially sensitive ones will be totally private, and no one can read them or use them i
Paged virtual memory: Mostly all implementations of virtual memory divide the virtual address space of an application program into pages; a page is a block that contains conti
A certain memory has a capacity of 4K × 8 (i) How many data input and data output lines does it have? (ii) How many address lines does it have? (iii) What is its capacity in bytes
How does an authentication system differ from a firewall in functioning? Authentication vs. firewall User Authentication and Authorization A significant advanced fi
What is the difference among "using System.Data;" and directly adding the reference from "Add References Dialog Box"? When you compile a program using command line, you add th
Testing Your Program All programs must be thoroughly tested before they are released to users. Create some sample input files of a small size and manually figure out what the o
How can a parent and child process communicate? A parent and child can communicate by any of the normal inter-process communication schemes (pipes, sockets, message queues, sha
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd