Defining data definition, Computer Engineering

Assignment Help:

Defining Types of Data ?

The subsequent format is used for defining data definition: 

Format for data definition: 

{Name} 

Name -   a program references the data item through the name though it is non-compulsory.

Directive: Specifying data type of assembly.

Expression: Signify a value or evaluated to value.

All directives are listed below:

Directive                      Description                 Number of Bytes

 

DB                              Define byte                             1 

DW                             Define word                            2 

DD                              Define double word                4 

DQ                              Define Quad word                  8 

DT                              Define 10 bytes                       10 

DUP Directive is used to duplicate the fundamental data definition to 'n' number of times.

ARRAY                                  DB                              10 DUP (0)

In the above statement ARRAY is the name of data item that is of byte type (DB). This array comprises 10 duplicate zero values which is 10 zero values.

EQU Directive is used to define a name to a constant

  CONST                                 EQU                            20

Kinds of number employed in data statements can be Binary, octal, decimal, Hexadecimal and ASCII. Above statement states a name CONST to a value 20. 

Some other instances of employing these directives are:

TEMP                           DB                 0111001B                   ; Binary value in byte operand 

                                                                                                 ; named temp

VALI                                      DW                 7341Q                         ; Octal value assigned to word 

                                                                                     ; variable

Decimal                       DB                  49                                ; Decimal value 49 contained in 

                                                                                    ;  byte variable

HEX                            DW                 03B2AH                     ; Hex decimal value in word

                                                                                                ; operand

ASCII                                     DB                  'EXAMPLE'              ; ASCII array of values.


Related Discussions:- Defining data definition

Explain mutual-exclusion implementation with semaphores, Disadvantage and...

Disadvantage and Advantage of mutual-exclusion implementation with semaphores. Disadvantage: Mutual-exclusion solutions specified by semaphores require busy waiting. Tha

Salient features of direct addressing mode, Q. Salient features of direct a...

Q. Salient features of direct addressing mode? A number of salient points about this technique are: This scheme offers a limited address space since if address field has

How is network examined by intranets, How is network examined by intranets,...

How is network examined by intranets, extranets and Internet? When more and more businesses seek to build their mission critical business solutions onto IP networks, networking

Game playing - artificial intelligence, Game Playing: We have now disp...

Game Playing: We have now dispensed with the necessary background material for AI problem solving techniques, and we just considered to looking at particular types of problems

Combinational circuit for sorting the string, Every input line of combinati...

Every input line of combinational circuit represents a specific element of the string let's say xi and every output line results in the form of a sorted list. In order to get the a

Artificial intelligence agents, Artificial Intelligence Agents: We int...

Artificial Intelligence Agents: We introduced what we'll be conversation about in Artificial Intelligence and why those things are necessary. This discussion is of course abou

Security, We now consider the relation between passwords and key size. For ...

We now consider the relation between passwords and key size. For this purpose consider a cryptosystem where the user enters a key in the form of a password. Assume a password consi

How dreamweaver work in layout view, Q. How Dreamweaver Work in Layout View...

Q. How Dreamweaver Work in Layout View? Dreamweaver has two visual design views-Standard view and Layout view. You will start by working in Layout view, which allows you to dra

What is an algorithm, What is an algorithm The solution to any problem ...

What is an algorithm The solution to any problem that is stated by an exact number of well-defined procedural steps is known as an algorithm.

Multiple stack, how to implement the multiple stack

how to implement the multiple stack

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd