Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Within micro controller's software, it is very useful to be able to manipulate binary bits i.e. from ports etc. The ALU has command to shift data, rotate data, compare data, set/clear bits, test bits and logical operate on data.
LSLA i.e shift A one place to the left fill up with 0 LSLB i.e shift B one place to the left fill up with 0 LSRA i.e shift A one place to the right fill up with 0 LSRB i.e shift B one place to the right fill up with 0 ROLA i.e rotate A one place to the left through carry ROLB i.e rotate B one place to the left through carry RORA i.e rotate A one place to the right through carry RORB i.e rotate B one place to the right through carry CBA i.e A-B with no answer stored just flags set CMPA i.e compare A with memory i.e A-M CMPB i.e compare B with memory i.e B-M BSET $20,#$1 i.e set bit 1 of memory address 20 BCLR $20,#$1 i.e clear bit 1 of memory address 20 BITA $20 i.e Check bit mask found in A with address 20 BITB $20 i.e Check bit mask found in A with address 20 ANDA $20 i.e logical and A with data at address 20 EXORA $20 i.e logical exor A with data at address 20 COM $20 i.e logical invert data at address 20 ORRA $20 i.e logical OR A with data at address 20 MUL ;Multiplies axb and stores the answer in D i.e both FDIV ;Fractional divide using D/IX IDIV ;Integer divide using D/IX ADDD ;16 bit add to D DAA ;Decimal adjust add sum to BCD data
HOW TO SAVE YOUR FILE? Step 1: Click on FILE Step 2: Click on SAVE Step 3: Choose the folder in which you want to save Step 4: Provide a name to the file (with .htm /
What are the process states in Unix? As a process implements it changes state according to its circumstances. Unix processes have the following states: Running : The process
Write shorts notes on Digital Signature. This method is used to authenticate the sender of a message. For sign a message, the sender encrypts the message by using a key ident
What is Web Mail Services? Web-based email services are also called as web mail or HTTP email. Unlike traditional POP email, web mail can be accessed from any PC using any web
What is BSS(Block Started by Symbol)? A data showing at the machine level, that has initial values when a program begins and tells about how much space the kernel assigns for t
Explain about the network level in detail. Network Level Firewall/Packet Filters: At the Network level firewalls operate upon the mechanism of filtering individual IP pa
Question : (a) "Resolution refers to the sharpness and clarity of an image" (i) Explain what you understand by the above statement. (ii) What is the difference between D
Universal Elimination: Here for any sentence, there is A, containing a universally quantified variable, v, just for any ground term, g, so we can substitute g for v in A. Thus
Unencoded micro-instructions One bit is required for each control signal; so number of bits needed in a micro-instruction is high. It represents a detailed hardware vi
what is waterfall model
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd