Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Q. Write an assembly function which hides the cursor?
Write an assembly function which hides the cursor. Call it from a C program.
. PUBLIC CUROFF
. MODEL small, C
. CODE
CUROFF PROC
MOV AH, 3 ; get the current cursor position
XOR BX, BX ; empty BX register
INT 10h ; use int 10hto do above
OR CH, 20h ; force to OFF condition
MOV AH, 01 ; set the new cursor values
INT 10h
RET
CUROFF ENDP
END
The C program to test this routine is as follows:
# include < stdio.h
void curoff(void);
void main()
{
printf("%s\n, "The cursor is now turning off);
curoff();
}
You can write another procedure in assembly language program to put cursor on. This can be done by replacing OR CH, 20h instruction by AND CH, 1Fh. You can call this new function from C program to put cursor on after curoff.
what are the different techniques of biasing a transistor?
Give some examples of malicious data. In May 2002, the Norton Anti-Virus software for Windows operating systems detects about 61000 malicious programs. Some of them are named
To work with Internet as well as to utilize its facilities we use certain tools. For illustration, Telnet is a tool, which is utilized for logging on remote computers on the Intern
Q. Components of magnetic disk? Disk itself is mounted in a disk drive that comprises arm which is a shaft that rotates disk and the electronics required for input and output b
Your shell should accept and execute the pipe "|" operator. This will look like the following: | The functionality of this operator is to execute command1 and send i
What are several issues for selecting best workarounds in multiple inheritances? Some restrictions methods are used. Use two approaches of delegations, which is an implementati
Multiple valued logics: Multiple valued logics, where altered types of truth value such as "unknown" are may be allowed. These have some of the particular advantages of fuzzy
Q. Signaling PVM process? int pvm_sendsig( int tid, int signum ) Transmits a signal to other PVM process. tid is task identifier of PVM process to receive signal.
What is WAP? WAP is stands for Wireless Application Protocol. It is a global, open standard which gives mobile users access to Internet services by handled devices. Wireless A
The extra key inserted at the end of the array is called a Sentinel is the extra key inserted at the end of the array
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd