Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Q. How a Procedure define in Assembly ?
Procedure is defined within source code by placing a directive of form:
PROC
A procedure is terminated using:
ENDP
The is identifier used for calling the procedure and is either FAR orNEAR. A procedure can be defined in:
1. The same code segment as the statement which calls it.
2. A code segment which is different from one comprising the statement which calls it however in the same source module as calling statement.
3. A different source module and segment from calling statement.
In the first case code NEAR must be used as the procedure and code are in same segment. For latter two cases should be FAR.
Write a script that will first initialize a string variable that will kept x and y coordinates of a point in the form 'x 3.1 y 6.4'. Then, use string manipulating functions to ext
At a shop of marbles, packs of marbles are prepared. Packets are named A, B, C, D, E …….. All packets are kept in a VERTICAL SHELF in random order. Any numbers of packets with thes
Add +25 to -15 by using 2's complement ? Ans. Firstly convert the numbers 25 and 15 in its 8-bit binary equivalent and determine the 2's complement of 15, after that add +25 to -
Q. Define the Arithmetic Micro-operations? These micro-operations execute simple arithmetic operations on numeric data stored in registers. The fundamental arithmetic micro-ope
Propositional truth tables: There {X\t} is a substitution that replaces all occurances of variable X with a term representing an object t as: ∀X. A is true if and only
This is a high-level matrix/array language with control flow statements, functions, data structures, input/output, and object-oriented programming features. It permits both "progra
Q. How to define a Filename in DOS? Each file is given a name so that it can be referred to later. This name is termed as Filename. The filename in DOS can be up to eight alpha
What is Public Key Cryptography? Public-key cryptography is a type of modern cryptography that allows users to communicate safely without any previously agreeing on a shared
Explain the method to identify the Object Classes You would always be careful while identifying relevant object classes from application domain. Objects may include physical e
Question : Multimedia involves multiple modalities of text, audio, images, drawings, animation, and video (a) Describe three popular file formats for images (b) Most imag
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd