Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Q. Define Keyword and Identifiers?
Keyword: A keyword is a statement which defines nature of that statement. If statement is a directive then keyword would be the title of that directive whereas if the statement is data-allocation statement then keyword would be a data definition type.
Some illustrations of keywords are: SEGMENT (directive), MOV (statement) etc.
Identifiers: An identifier is a name which you apply to an item in your program which you expect to reference. The 2 kinds of identifiers are label and name.
1. Name denotes to address of a data item like counter, arr etc.
2. Label denotes to address of our instruction or process or segment. For illustration
MAIN is the label for a process as below:
MAIN PROC FAR
A20: BL,45 ; defines a label A20.
Identifier may employ alphabet, digit or special character but it always starts with an alphabet.
In a DTMF phone a dialling of 8 generates (A) 1336 Hz- 770 Hz (B) 1209 Hz - 1477 Hz (C) 1209 Hz- 941 Hz (D) 1336 Hz-852 Hz
Specify the default alignment for the following field types: 'D' - Left, 'F'-Right, 'N'-Left, 'I'-Right, 'T'-Left.
Define the method of Implementation Once "final" system has been designed it is then essential to put together the software and hardware and introduce the new system. There ar
How are the applications of generic framework for electronic commerce performed? To perform applications, this is essential to have Supporting Information and Organizational In
Programmable read only memory (PROM) A PROM is a memory chip on which data can be written only one time. Once a program has been written onto a PROM, it's permanent. Unlike RAM
What is major difference between the Historic Unix and the new BSD release of Unix System V in terms of Memory Management? Historic Unix uses Swapping - Whole process is tran
What is Public Key Cryptography Public-key cryptography is a form of modern cryptography which permits users to communicate safely without lastly agreeing on a shared secret
FACSIMILE : This is often known as 'fax' and it represents the interface between reprographic and computer technology. By using fax, the contents of a sheet of paper (text or illu
Explain topology method used in LAN technology in detail. LAN Topologies: Network topology is a physical schematic that shows interconnection of the various users. There are
For the purposes of this assignment, you are the accountant for an industrial property development company, Devprop Leasing Co., that typically develops warehouse and industrial co
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd