Defining data definition, Computer Engineering

Assignment Help:

Defining Types of Data ?

The subsequent format is used for defining data definition: 

Format for data definition: 

{Name} 

Name -   a program references the data item through the name though it is non-compulsory.

Directive: Specifying data type of assembly.

Expression: Signify a value or evaluated to value.

All directives are listed below:

Directive                      Description                 Number of Bytes

 

DB                              Define byte                             1 

DW                             Define word                            2 

DD                              Define double word                4 

DQ                              Define Quad word                  8 

DT                              Define 10 bytes                       10 

DUP Directive is used to duplicate the fundamental data definition to 'n' number of times.

ARRAY                                  DB                              10 DUP (0)

In the above statement ARRAY is the name of data item that is of byte type (DB). This array comprises 10 duplicate zero values which is 10 zero values.

EQU Directive is used to define a name to a constant

  CONST                                 EQU                            20

Kinds of number employed in data statements can be Binary, octal, decimal, Hexadecimal and ASCII. Above statement states a name CONST to a value 20. 

Some other instances of employing these directives are:

TEMP                           DB                 0111001B                   ; Binary value in byte operand 

                                                                                                 ; named temp

VALI                                      DW                 7341Q                         ; Octal value assigned to word 

                                                                                     ; variable

Decimal                       DB                  49                                ; Decimal value 49 contained in 

                                                                                    ;  byte variable

HEX                            DW                 03B2AH                     ; Hex decimal value in word

                                                                                                ; operand

ASCII                                     DB                  'EXAMPLE'              ; ASCII array of values.


Related Discussions:- Defining data definition

Techniques are used to increase the clock rate r, What techniques are used ...

What techniques are used to increase the clock rate R? Ans: The 2 techniques used to increase the clock rate R are: 1. We can reduce the amount of processing done in one basi

External program components, How does the system handle roll areas for exte...

How does the system handle roll areas for external program components? Transactions run in their own roll areas. Reports run in their own roll areas. Dialog modules run

Define rules for reducing karnaugh maps, Define Rules for Reducing Karnaugh...

Define Rules for Reducing Karnaugh Maps? The rules for reducing Karnaugh Maps (k- maps) are as follows: All of the 1's in the Karnaugh Map are called as minterms. The

Message passing programming, Message passing is possible the most widely us...

Message passing is possible the most widely used parallel programming paradigm these days. It is the most portable, natural and efficient scheme for distributed memory systems. It

Pc configuration and troubleshooting, You have been asked to become the con...

You have been asked to become the consulting technician for MobTex, a local auto servicing centre. The general manager (Jo) realises that the IT system has evolved over time with l

What is analysis iteration, Analysis Iteration   To understand any prob...

Analysis Iteration   To understand any problem completely you have to repeat task which implies that analysis requires repetition. First, just get overview of problem, make a r

Explain dead code elimination, Explain briefly Dead code Elimination of the...

Explain briefly Dead code Elimination of the commonly used code optimization techniques Dead code Elimination: Code which is unreachable or which does not influence the pr

Explain concurrent sharing, Explain Concurrent Sharing Here a number of...

Explain Concurrent Sharing Here a number of programs that may share a file simultaneously. While this is the case, it is necessary to prevent mutual interference among them. Th

Fundamental differences between risc and cisc architecture, Q. Fundamental ...

Q. Fundamental differences between RISC and CISC architecture? Fundamental differences between RISC and CISC architecture. The following table lists following differences:

Discuss the 5-level switching hierarchy recommended by ccitt, Discuss the 5...

Discuss the 5-level switching hierarchy recommended by CCITT. Hierarchical networks are able of handling heavy traffic where needed, and at similar time use minimal number of t

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd