logic instructions , Basic Computer Science

Assignment Help:
They are used to act upon logic operations on the operators.
AND
OR, NEG
NOT
TEST
XOR

AND INSTRUCTION
Function: It acts upon the conjunction of the operators bit by bit.
Syntax:
AND destiny, source
The outcome of this operation is stored on the destiny operator.
OR INSTRUCTION
Function: Logic inclusive OR
Syntax:
OR destiny, source

NEG INSTRUCTION
Function: It produces the complement to 2.
Syntax:
NEG destiny
This instruction produces the complement to 2 of the destiny operator and stores it on the similar operator.
NOT INSTRUCTION
Function: It carries out the turnaround of the destiny operator bit by bit.
Syntax: NOT destiny
The outcome is stored on the same destiny operator.

TEST INSTRUCTION
Function: It logically evaluates the operators
Function: TEST destiny, source
It executes a conjunction, bit by bit, of the operators, but differing from AND, this instruction does not place the result on the destiny operator, it only has effect on the state of the flags.
XOR INSTRUCTION
Function: OR exclusive
Syntax:
XOR destiny, source its function is to do the logic exclusive disjunction of the two operators bit by bit.

Related Discussions:- logic instructions

Comparison instructions , They are used to evaluate operators, and they hav...

They are used to evaluate operators, and they have an effect on the content of the flags. CMP CMPS (CMPSB) (CMPSW) CMP INSTRUCTION Idea: To measure up to the operators. Syntax: CMP

Explain public code archive, Question 1 Explain the various tools used for...

Question 1 Explain the various tools used for open source software development Question 2 Discuss the OSS licensing strategies Question 3 Explain the software developmen

Printers, Printers: Printers: Printers exist in a variety of forms:  ...

Printers: Printers: Printers exist in a variety of forms:  Line Printers: These have been widely used for many years in large computer installations. They are design

Network, Give a topology (network diagram) in which there is a link whose f...

Give a topology (network diagram) in which there is a link whose failure will change many routes. Give one in which there is a link whose failure will not change any routes

Constant bit rate atm theory, For the connections that request a static amo...

For the connections that request a static amount of bandwidth that is continuously available during the connection lifetime. Is intended to support real time applications requiring

History of e-mail, History of E-mail: Internet based E-mail system was...

History of E-mail: Internet based E-mail system was designed by a Computer engineer - Ray Tomlinson in late 1971 while working with ARPANET. Tomlinson used a file transfer pro

SOFTWARE, main task of sofware developper

main task of sofware developper

CAI, what is CAI? explain its pitfalls.

what is CAI? explain its pitfalls.

What is the difference between kernel mode and user mode fun, The differenc...

The difference between kernel mode and user mode gives a rudimentary form of security in the following manner. Convinced instructions could be executed only when the CPU is in kern

Why is the atm selected as a transport network in 3g, Why is the ATM select...

Why is the ATM selected as a transport network in 3G? Answer: ATM provides efficient support for transmission of voice, data, and video ATM provides QoS guarantee and reliability

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd