logic instructions , Basic Computer Science

Assignment Help:
They are used to act upon logic operations on the operators.
AND
OR, NEG
NOT
TEST
XOR

AND INSTRUCTION
Function: It acts upon the conjunction of the operators bit by bit.
Syntax:
AND destiny, source
The outcome of this operation is stored on the destiny operator.
OR INSTRUCTION
Function: Logic inclusive OR
Syntax:
OR destiny, source

NEG INSTRUCTION
Function: It produces the complement to 2.
Syntax:
NEG destiny
This instruction produces the complement to 2 of the destiny operator and stores it on the similar operator.
NOT INSTRUCTION
Function: It carries out the turnaround of the destiny operator bit by bit.
Syntax: NOT destiny
The outcome is stored on the same destiny operator.

TEST INSTRUCTION
Function: It logically evaluates the operators
Function: TEST destiny, source
It executes a conjunction, bit by bit, of the operators, but differing from AND, this instruction does not place the result on the destiny operator, it only has effect on the state of the flags.
XOR INSTRUCTION
Function: OR exclusive
Syntax:
XOR destiny, source its function is to do the logic exclusive disjunction of the two operators bit by bit.

Related Discussions:- logic instructions

Pseudocode, How Much Insurance? Many financial experts advise that property...

How Much Insurance? Many financial experts advise that property owners should insure their homes or buildings for at least 80 percent of the amount it would cost to replace the st

What is heuristic evaluation, Question 1: (a) How would you describe h...

Question 1: (a) How would you describe human reasoning? (b) Describe the different types of human reasoning? Question 2: (a) What are the computational factors affec

Explain with diagram the internal components of alu, Problem 1. Explain...

Problem 1. Explain with diagram the internal components of ALU. Diagram Explaining Internal components 2. What is addressing mode? Explain any five addressing mo

Electronic educational resources, ELECTRONIC EDUCATIONAL RESOURCES: In...

ELECTRONIC EDUCATIONAL RESOURCES: In the present era, you can get access to a large number of electronic educational resources through the web. These resources may be on diffe

Keystroke logger and data-stealing, Keystroke logger and Data-stealing: ...

Keystroke logger and Data-stealing: Keystroke loggers: This is a program, once installed on the system, which intercepts the keys when entering the password or the Credit Ca

CAI, what is CAI? explain its pit falls.

what is CAI? explain its pit falls.

Explain need for model view controller(mvc), Question 1 What is HTTP? How ...

Question 1 What is HTTP? How does it work? Question 2 What are the various methods of HttpServletResponse interface? Question 3 What is Web server? What are the va

Project management, #Assignment 1: Project Management and Information Secur...

#Assignment 1: Project Management and Information Security Write a two to three (2-3) page paper that addresses the following: Explicate in detail the importance of project managem

Examples of online databases, Examples of Online Databases: The adopti...

Examples of Online Databases: The adoption of modern technology has resulted in the proliferation of machine readable databases. The National Library of Medicine (USA) designe

Describe the binary search algorithm, QUESTION 1 Describe the binary se...

QUESTION 1 Describe the binary search algorithm using an example of your own. QUESTION 2 (a) By showing all your workings, give a big-O estimate for f(x) = (x + 1)lo

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd