Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Q. Write an assembly function which hides the cursor?
Write an assembly function which hides the cursor. Call it from a C program.
. PUBLIC CUROFF
. MODEL small, C
. CODE
CUROFF PROC
MOV AH, 3 ; get the current cursor position
XOR BX, BX ; empty BX register
INT 10h ; use int 10hto do above
OR CH, 20h ; force to OFF condition
MOV AH, 01 ; set the new cursor values
INT 10h
RET
CUROFF ENDP
END
The C program to test this routine is as follows:
# include < stdio.h
void curoff(void);
void main()
{
printf("%s\n, "The cursor is now turning off);
curoff();
}
You can write another procedure in assembly language program to put cursor on. This can be done by replacing OR CH, 20h instruction by AND CH, 1Fh. You can call this new function from C program to put cursor on after curoff.
Convert binary number in two's compliment form 0100 1000. Converting the binary number into 2's compliment from 0100 1000 is given below: 01001000 => 10111000
Explain the Input Stage of an ADC. Ans. Input Stage- In ADC at the input stage, analog voltage can contain any value in a range although the digital output can contain
What are the authentication methods in .NET? 1. WINDOWS AUTHENTICATION 2. FORMS AUTHENTICATION 3. PASSPORT AUTHENTICATION The authentication option for the ASP.N
Determine the salient features of a parallel programmable interface, 8255. 24 I/O lines in 3 8-bit port groups - A, B, C A, B can be 8-bit input or output ports C
What is an operating system? An operating system is a program that handles the computer hardware. It acts as an intermediate among users of a computer and the computer hardwar
Types E-commerce generally based on advertising, selling, marketing and buying, but due to the differences in needs, e-commerce has been classified according to the parties of the
What is Virtual memory The term virtual memory signifies something that appears to be present though actually it is not. Virtual memory technique enables users to use more mem
Q. Example of asymptotic notations? The function f (n) belongs to the set (g(n)) if there exists positive constants c such that for satisfactorily large values of n we have 0
How do you control instructions like branch, cause problems in a pipelined processor? Pipelined processor gives the best throughput for sequenced line instruction. In branch in
Selective set The selective-set operation sets to 1 bits in register A where there can corresponding 1's in register B. It does not affect bit positions which have
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd