Write an assembly function which hides the cursor, Computer Engineering

Assignment Help:

Q. Write an assembly function which hides the cursor?

Write an assembly function which hides the cursor. Call it from a C program.

            . PUBLIC CUROFF

            . MODEL small, C

            . CODE

CUROFF PROC

MOV                        AH, 3                 ; get the current cursor position

XOR                         BX, BX             ; empty BX register

INT                           10h                     ; use int 10hto do above  

OR                            CH, 20h             ; force to OFF condition

MOV                        AH, 01               ; set the new cursor values

INT                           10h  

RET   

CUROFF ENDP

END 

The C program to test this routine is as follows:

# include < stdio.h 

void curoff(void);

void main()

 {

printf("%s\n, "The cursor is now turning off);

curoff();

 }

You can write another procedure in assembly language program to put cursor on. This can be done by replacing OR CH, 20h instruction by AND CH, 1Fh. You can call this new function from C program to put cursor on after curoff.


Related Discussions:- Write an assembly function which hides the cursor

Find the physical address of instruction, Q. Find the Physical address of i...

Q. Find the Physical address of instruction? Value of Instruction Pointer and holding address of instruction = 1234h Value of code segment register (CS) = 448Ah Physical

Define device interface, Define device interface. The buffer registers ...

Define device interface. The buffer registers DATAIN and DATAOUT and the status flags SIN and SOUT are part of circuitry commonly called as a device interface.

What are the different phases of consumer mercantile model, What are the di...

What are the different phases of consumer mercantile model? There are three different phase of consumer mercantile model like listed as in below: • Pre-purchase interaction

Explain public key encryption, Public Key Encryption A cryptographic sy...

Public Key Encryption A cryptographic system that uses two-keys-a public  key known to everyone and a private or secret key known only to the recipient of the message. An si

Show the fundamental process of instruction execution, Q. Show the fundamen...

Q. Show the fundamental process of instruction execution? The fundamental process of instruction execution is:  1. Instruction is fetched from memory to CPU registers (calle

Change to palindrome, given a string S convert it to palindrome by doing ch...

given a string S convert it to palindrome by doing character replacement.convert S to palindrome with minimum character replacements

State about movable joystick, State about movable joystick In another t...

State about movable joystick In another type of movable joystick, the stick is used to activate switches that cause the screen cursor to move at a constant rate in the selected

How do subroutines help in program writing, How do subroutines help in prog...

How do subroutines help in program writing? Some of the significant characteristics of Subroutine that help in program writing are: A subroutine is named, each have a

How to select a table, Q. How to select a table? The easiest way to sel...

Q. How to select a table? The easiest way to select a table in Standard view is by using tag selector, which displays HTML tags of elements in document. You will use tag sel

Determine the signed numbers are used in binary arithmetic, When signed num...

When signed numbers are used in binary arithmetic, then which one of the notations would have unique representation for zero ? Ans. When signed numbers are utilized in binary ar

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd