Defining data definition, Computer Engineering

Assignment Help:

Defining Types of Data ?

The subsequent format is used for defining data definition: 

Format for data definition: 

{Name} 

Name -   a program references the data item through the name though it is non-compulsory.

Directive: Specifying data type of assembly.

Expression: Signify a value or evaluated to value.

All directives are listed below:

Directive                      Description                 Number of Bytes

 

DB                              Define byte                             1 

DW                             Define word                            2 

DD                              Define double word                4 

DQ                              Define Quad word                  8 

DT                              Define 10 bytes                       10 

DUP Directive is used to duplicate the fundamental data definition to 'n' number of times.

ARRAY                                  DB                              10 DUP (0)

In the above statement ARRAY is the name of data item that is of byte type (DB). This array comprises 10 duplicate zero values which is 10 zero values.

EQU Directive is used to define a name to a constant

  CONST                                 EQU                            20

Kinds of number employed in data statements can be Binary, octal, decimal, Hexadecimal and ASCII. Above statement states a name CONST to a value 20. 

Some other instances of employing these directives are:

TEMP                           DB                 0111001B                   ; Binary value in byte operand 

                                                                                                 ; named temp

VALI                                      DW                 7341Q                         ; Octal value assigned to word 

                                                                                     ; variable

Decimal                       DB                  49                                ; Decimal value 49 contained in 

                                                                                    ;  byte variable

HEX                            DW                 03B2AH                     ; Hex decimal value in word

                                                                                                ; operand

ASCII                                     DB                  'EXAMPLE'              ; ASCII array of values.


Related Discussions:- Defining data definition

What are the limitations of traditional payment instruments, What are the l...

What are the limitations of traditional payment instruments? The limitations of traditional payment system are that they take a lot of time.  These systems needs manual work to

Inter suffer buffer and execute an instruction, What are the basic steps ne...

What are the basic steps needed to execute an instruction by the processor? Ans: The basic steps needed to execute an instruction by the processor are: A)    First fetch th

Object-oriented program and cell controlled class architectu, Object-Orient...

Object-Oriented Program And Cell Controlled Class Architecture To the variety of scenarios, generic cell control architecture can be applied. An object oriented programming lan

Constructor, what is meant by private copy constructor

what is meant by private copy constructor

What is called when network address prefixed by 1110, Network address prefi...

Network address prefixed by 1110 is a? Network address prefixed through 1110 is a multicast address.

Control flow diagram, creating a control flow question for atm system

creating a control flow question for atm system

Define step by step procedure in computer programming, Define Step by Step ...

Define Step by Step Procedure in Computer Programming? The Computer programming is the skill and art of creating a computer program a defined set of instructions in source code

State the benefits of encapsulation, State The Benefits of Encapsulation ...

State The Benefits of Encapsulation To hide the details of a class, you can declare that data or implementation in the private part of class so that other class clients will n

Define security protocols used for e-commerce applications, Define various ...

Define various security protocols used for e-commerce applications. The e-commerce systems of today are composed of very many components as like: a commerce server, client soft

IEEE802.4 Token Bus Network, en a five station token bus LAN with station a...

en a five station token bus LAN with station addresses of 3000, 500, 100, 70, and 50. Stations with addresses of 5000, 4000, 400, 90, and 60 are waiting to enter the ring. Assume a

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd