Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Q. What is Assembler?
An assembly program is used to transfer assembly language mnemonics to binary code for every instruction after the complete program has been written with support of an editor it's then assembled with help of an assembler.
An assembler works in 2 stageswhich are: it reads your source code 2 times. In first pass the assembler gathers all the symbols defined in the program accompanied by their offsets in symbol table. On the 2ndpass through the source program it generates binary code for every instruction of the program and give all symbols an offset with respect to segment from symbol table.
The assembler produces three files. Object file, list file and cross reference file. The object file comprises the binary code for every instruction in program. It is created only when your program has been successfully assembled without errors. Errors which are detected by assembler are known as the symbol errors. For illustrationMOVE AX1, ZX1.
In the statement it reads the word MOVE and it attempts to match with mnemonic sets as there is no mnemonic with this spelling then it presumes it to be an identifier and searches for its entry in symbol table. It doesn't even find it there hence gives an error as undeclared identifier.
List file is optional and comprises the source code, binary equivalent of every instruction and offsets of symbols in the program. This file is for purelydocumentation purposes. A number of the assemblers available on PC are TURBO,MASM etc.
What is logical address space and physical address space? The set of all logical addresses generated by a program is known as a logical address space; the set of all physical a
Describe Real and protected mode: Operation of Real mode interrupt: When microprocessor completes executing the current instruction, it concludes whether an interrupt is act
What is the use of hypertext links in Internet access? Use of Hypertext links in Internet access: From the user’s view point, the Web comprised a vast, worldwide collecti
Define the Information System Growing sophistication in products and markets is driving the organisational requirement for increasing amounts of information. This req
Hazard (computer architecture): In the computer architecture, a hazard is a possible problem that can occurs in a pipelined processor. It concern to the possibility of erroneo
Your shell must accept a change directory command. This will be in the form: cd path where cd is the change directory command and the path is what you will change the direct
Q. When gravity is the merely force acting on an object the object is in what? Answer:- One respond is that it is in free-fall in a vacuum to eliminate atmospheric drag.
Program testing and debugging: Program testing is the method of checking program, to verify that it satisfies its needs and to detect errors. These errors can be of any type-
Q. Main strength of ASCII? One such standard code which enables language encoding that is popularly used is ASCII (American Standard Code for Information Interchange). This cod
INTEL ARCHITECTURE - 64 ( IA-64) IA-64 (Intel Architecture-64) is a 64-bit processor architecture developed in cooperation by Intel and Hewlett-Packard, executed by processors s
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +1-415-670-9521
Phone: +1-415-670-9521
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd