Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Q. Write an assembly function which hides the cursor?
Write an assembly function which hides the cursor. Call it from a C program.
. PUBLIC CUROFF
. MODEL small, C
. CODE
CUROFF PROC
MOV AH, 3 ; get the current cursor position
XOR BX, BX ; empty BX register
INT 10h ; use int 10hto do above
OR CH, 20h ; force to OFF condition
MOV AH, 01 ; set the new cursor values
INT 10h
RET
CUROFF ENDP
END
The C program to test this routine is as follows:
# include < stdio.h
void curoff(void);
void main()
{
printf("%s\n, "The cursor is now turning off);
curoff();
}
You can write another procedure in assembly language program to put cursor on. This can be done by replacing OR CH, 20h instruction by AND CH, 1Fh. You can call this new function from C program to put cursor on after curoff.
The output of SR flip flop when S=1, R=0 is ? Ans. When for the SR flip-flop S=set i/p R=reset i/p, as S=1, R=0, Flip-flop will be set means output will be one.
Question: (a) A computer network can be a LAN or a WAN. Using appropriate diagrams and examples, explain what you understand by the term LAN. Your answer should also explain
What are the mapping techniques? a)Direct mapping b) Associative mapping c) Set associative mapping
Which of the memory is volatile memory ? Ans. A volatile memory is RAM. Term Volatile memory implies the contents of the RAM get erased as soon as the power goes off.
Give some examples of malicious data. In May 2002, the Norton Anti-Virus software for Windows operating systems detects about 61000 malicious programs. Some of them are named
Chaining: In this method, instead of hashing function value as location we use it as an index into an array of pointers. Every pointer access a chain that holds the element having
Artificial intelligence ("AI") can mean a lot of things too many people. Much confusion arises that the word 'intelligence' is ill-defined. The phrase is so broad that people have
Explain about the Acoustic tablet Acoustic (or sonic) tablet use sound waves to detect a stylus position. Either strip microphones or point microphones can be used to detect th
What is the purpose of IOP. The purpose of IOP is to given an independent path way for transfer of information among external and internal memory.
A project having of a set of jobs and a set of precedences, where precedence (i; j) show that job j cannot begin before job i is completed. Let c i be the duration of job i. We wi
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd