Assembly directives and pseudo-ops, Computer Engineering

Assignment Help:

Assembly directives and pseudo-ops:

Assembly directives are which instructions that executed by the assembler at assembly time, not by the CPU at run time. They can build the assembly of the program dependent on parameters input by the programmer, so that 1 program can be assembled with different ways, may be for different type of applications. They also can be used to direct presentation of the program to make it simple for the programmer to read and maintain it.

(For instance, pseudo-ops would be used to reserve storage areas and optionally their primary contents.) The names of pseudo-ops frequently start with a dot to differentiate them from machine instructions. Some assemblers also take favor of pseudo-instructions, which produce two or more machine instructions. Symbolic assemblers permit programmers to connect arbitrary names (labels or symbols) with memory locations. Generally, every variable and constant is given a name so instructions can reference those locations by their name, therefore promoting self-documenting code.  In the executable code, the name of each subroutine is connected with its entry point, so any calls to a subroutine can use its name. In Inside the subroutines, GOTO destinations are given particular labels. Some assemblers support local symbols which are radically distinct from normal symbols (for example, the use of "10$" for a GOTO destination).

Most of the assemblers provide flexible symbol management, permit programmers to manage different type of namespaces, automatically calculate offsets within data structures, and assign labels that refer to literal values or the result of easy computations performed by the assembler. The labels can also be used to initialize variables and constants with re -locatable addresses.

Assembly languages, like most of the other computer languages, give permission to comments to be added to assembly source code that is avoided by the assembler. Good use of comments is even more significant with assembly code than with higher-level languages like c, c ++, etc., as the meaning and purpose of a sequence of instructions is difficult to decipher from the code itself.

Intelligent use of these facilities can simplify the problems of coding and maintaining low-level code. Raw assembly source code as produced by compilers or disassembles-code without any comments, data definitions, or meaningful symbols-is quite hard to read when changes must be made.


Related Discussions:- Assembly directives and pseudo-ops

What is a kernel shell, A shell is a program that presents an interface to ...

A shell is a program that presents an interface to several operating system functions and services. The shell is so called because it is an outer layer of interface among the user

Associative memory organisations, Associative Memory Organisations The ...

Associative Memory Organisations The associative memory is organised in w words with b bits per word. In w x b array, every bit is known a cell. Each cell is made up of a flip-

What is metropolitan area network, Q. What is Metropolitan Area Network? ...

Q. What is Metropolitan Area Network? Metropolitan Area Network (MAN):  It is privately or public owned communication system that naturally covers a complete city. Speed is abo

Desirable characteristics of an electronic market place, What are the desir...

What are the desirable characteristics of an Electronic Market Place?  Characteristics of an Electronic Market Place:  a. Its electronic, the business center is not a phys

Difference among java beans & servlets, Java bean is a reusable component, ...

Java bean is a reusable component, where as the servlet is the java program which extends the server capability.

Internet programming, Futoshiki is a game played on an N by N (usually 5 by...

Futoshiki is a game played on an N by N (usually 5 by 5) grid and uses the symbols 1 .. N. The objective of the game is to place each symbol on the grid so that it only occurs once

Environment of the packet flow, Q. Environment of the Packet Flow? Prot...

Q. Environment of the Packet Flow? Protocol stack used on Internet is referred to as TCP/IP protocol stack. If we were to follow the path that message "Hello computer 5.6.7.8!"

Explain about zip drive, Q. Explain about Zip Drive? Zip Drive: Loads...

Q. Explain about Zip Drive? Zip Drive: Loads of files, Volumes of data have definitely increased onus on today's computer user and protection of this data is what bugs every

Interaction between the dynpro and the abap/4, How does the interaction bet...

How does the interaction between the Dynpro and the ABAP/4 Modules takes place? -A transaction is a collection os screens and ABAP/4 routines , controlled and implemented by a

Mapping, what is transform mapping and transaction mapping?

what is transform mapping and transaction mapping?

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd