explain data movement ?, Basic Computer Science

Assignment Help:
In any program it is essential to move the data in the memory and in the CPU registers; there are a number of ways to do this: it can copy data in the memory to a number of register, from register to register, from a stack to a register, from a register to a stack, to transmit data to external devices in addition to vice versa.
This group of data is subject to rules and restrictions. The next are some of them:
*It is not potential to move data from a memory locality to another unswervingly; it is essential to first move the data of the origin locality to a register and then from the register to the destiny area.
*It is not possible to move a constant straight to a segment register; it first must be moved to a register in the CPU then to segment register.
It is feasible to move data blocks through the movs instructions, which copies a chain of bytes or words; movsb which copies n bytes from a region to another; and movsw copies n words from a locality to another. The last two instructions take the values from the distinct addresses by DS:SI as a set of data to move and ES:DI as the new localization of the
data.
To move data there are also structures identified batteries, where the data is introduced with the push instruction and are removed with the pop instruction.
In a stack the first data to be introduced is the last one we can take, this is, if in our program we utilize these instructions:
PUSH AX
PUSH BX
PUSH CX
To return the accurate values to each register at the moment of taking them from the stack it is essential to do it in the following sequence:
POP CX
POP BX
POP AX
For the contact with external devices the in command to read the information received from a port and the out command is used to send information to a port.
The out command’s syntax is:
OUT DX,AX
The in command’s syntax is:
IN AX,DX

Related Discussions:- explain data movement ?

Paid Website Usability Testers, Assess the reliability of data gathered via...

Assess the reliability of data gathered via paid Internet users. Describe and assess the evaluation method being used by the testing company, i.e., nonvisual and verbal recording o

Heuristic search strategies-artificial intelligence, Heuristic Search Strat...

Heuristic Search Strategies-Artificial intelligence In general speaking, a heuristic search is one which utilizes a rule of thumb to improve an agent's performance in solving p

What is evaluating information system investments, 1. What is Evaluating In...

1. What is Evaluating Information System Investments? 2. Is IS evaluation different to evaluation of other investments? 3. What approaches are used to evaluate IS investments

If staement, if statement with explanation

if statement with explanation

Why we need data mining? Give an example to illustrate your, Why we need da...

Why we need data mining? Give an example to illustrate your answer.

How can we create a fcb file?, Creating a new file For the formation of fil...

Creating a new file For the formation of files the 21H interruption 16H function is used. DX must identify a control structure whose necessities are that as a minimum the logic uni

Rental model, Rental model: This has come into picture as Software as...

Rental model: This has come into picture as Software as a Service (SaaS) and Platform as a Service (PaaS) models have evolved over a period of time. Here, the buyer need not

Simulated annealing-artificial intelligence, Simulated Annealing One wa...

Simulated Annealing One way to answer the problem of local maxima and related problems like ridges and plateaux in hill climbing is to permit the agent to go downhill to some e

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd