Assembly directives and pseudo-ops, Computer Engineering

Assignment Help:

Assembly directives and pseudo-ops:

Assembly directives are which instructions that executed by the assembler at assembly time, not by the CPU at run time. They can build the assembly of the program dependent on parameters input by the programmer, so that 1 program can be assembled with different ways, may be for different type of applications. They also can be used to direct presentation of the program to make it simple for the programmer to read and maintain it.

(For instance, pseudo-ops would be used to reserve storage areas and optionally their primary contents.) The names of pseudo-ops frequently start with a dot to differentiate them from machine instructions. Some assemblers also take favor of pseudo-instructions, which produce two or more machine instructions. Symbolic assemblers permit programmers to connect arbitrary names (labels or symbols) with memory locations. Generally, every variable and constant is given a name so instructions can reference those locations by their name, therefore promoting self-documenting code.  In the executable code, the name of each subroutine is connected with its entry point, so any calls to a subroutine can use its name. In Inside the subroutines, GOTO destinations are given particular labels. Some assemblers support local symbols which are radically distinct from normal symbols (for example, the use of "10$" for a GOTO destination).

Most of the assemblers provide flexible symbol management, permit programmers to manage different type of namespaces, automatically calculate offsets within data structures, and assign labels that refer to literal values or the result of easy computations performed by the assembler. The labels can also be used to initialize variables and constants with re -locatable addresses.

Assembly languages, like most of the other computer languages, give permission to comments to be added to assembly source code that is avoided by the assembler. Good use of comments is even more significant with assembly code than with higher-level languages like c, c ++, etc., as the meaning and purpose of a sequence of instructions is difficult to decipher from the code itself.

Intelligent use of these facilities can simplify the problems of coding and maintaining low-level code. Raw assembly source code as produced by compilers or disassembles-code without any comments, data definitions, or meaningful symbols-is quite hard to read when changes must be made.


Related Discussions:- Assembly directives and pseudo-ops

Economic argument for good design, One way of demonstrating the importance ...

One way of demonstrating the importance of good ID is by showing tangible benefits that can be talked about in cash terms. Within a business, good ID can lead to benefits such as h

Define bcd, Define BCD. A binary code that distinguishes between 10 ele...

Define BCD. A binary code that distinguishes between 10 elements must contain at least 4 bits, but 6 combinations will remain unassigned. Numerous dissimilar codes can be obtai

Benefits of expert system to the user, a. It improves quality by providing ...

a. It improves quality by providing consistent advice and by making reduction in the error rate. b. Expert systems are reliable and they do not overlook relevant info

What is program controlled i/o, What is program controlled I/O? In prog...

What is program controlled I/O? In program controlled I/O the processor repeatedly checks a status flag to achieve the needed synchronization among the processor and an input a

What is a pre-processor, What is a pre-processor? A pre-processor is a ...

What is a pre-processor? A pre-processor is a program that procedure the source code before it passes by the compiler. It handles under the control of pre-processor directive.

What are the requirements of the user, This step of systems examination is ...

This step of systems examination is one of the most difficult. In this stage systems specifications are identified by asking what, who, when, where and how. A few questions address

Biometric systems for implementing client server network, Discuss password ...

Discuss password schemes and Biometric systems for implementing client server network security.          In cyberspace, buyers & sellers cannot see each other. Also in video con

Data bus is bidirectional, Why address bus is unidirectional and data bus i...

Why address bus is unidirectional and data bus is bidirectional? Ans) Because there is no require address transaction among processor and peripheral device but data bus is req

How the canvas class and the graphics class are linked, A Canvas object giv...

A Canvas object gives access to a Graphics object by its paint() method.

Why a computer expect to receive responses, Why a computer expect to receiv...

Why a computer expect to receive responses when it broadcast an ARP request? Response will be acquired only from the machine for that request is being sent not for the other ma

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd