define segments in assembly process?, Basic Computer Science

Assignment Help:
The architecture of the x86 processors forces with the use of memory segments to direct the information, the size of these segments is of 64kb.
The cause of being of these segments is that, allowing for that the maximum size of a number that the processor can direct is given by a word of 16 bits or register, it would not be possible to access more than 65536 localities of memory using only one of these registers, other than at the present, if the PC''s memory is separated into groups or segments, each one of 65536 localities, and we use an address on an limited register to discover each segment, and then we make each address of a particular slot with two registers, it is likely for us to access a quantity of 4294967296 bytes of memory, which is, in the present day, additional memory than what we will observe installed in a PC.
In sort for the assembler to be able to manage the data, it is essential that each piece of information or instruction be found in the area that corresponds to its individual segments. The assembler accesses this information taking into account the localization of the segment, specified by the DS, ES, SS and CS registers and inside the register the address of the specified part of information. It is because of this that when we make a program using the Debug on each line that we assemble.

Related Discussions:- define segments in assembly process?

Hardware basics, HARDWARE BASICS In the foregoing section of this Unit...

HARDWARE BASICS In the foregoing section of this Unit, an attempt has been made to explain to you the historic perspective relating to the development of computer from its ear

Write a long note on computer languages, Question 1 Explain the importan...

Question 1 Explain the importance of graphics in multimedia. What are few of the tips to keep in mind while using graphics for the web? Question 2 Write a long note on co

Deadlocks, What is methods For handling Deadlocks?

What is methods For handling Deadlocks?

What is the difference between kernel mode and user mode fun, The differenc...

The difference between kernel mode and user mode gives a rudimentary form of security in the following manner. Convinced instructions could be executed only when the CPU is in kern

HACKER, Briefly explain who a hacker is and what the activities of a hacker...

Briefly explain who a hacker is and what the activities of a hacker are?k question #Minimum 100 words accepted#

Trap doors and Logic Bombs, Trap doors:  This is a way of bypassing normal...

Trap doors:  This is a way of bypassing normal authentication procedure (windows/ operating system user name  and password) to access a system. Once a system is compromised (impac

COMPUTER SYSTEM ARCHITECTURE, PLEASE HELP ME TO CONSTRUCT THE XOR GATE USIN...

PLEASE HELP ME TO CONSTRUCT THE XOR GATE USING ONLY NAND GATE

Sequential writing in fcb files, Previous to we can perform writing to the...

Previous to we can perform writing to the disk it is essential to define the data transfer region using for this end the 1AH function of the 21H interruption. The 1AH function does

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd