logic instructions , Basic Computer Science

Assignment Help:
They are used to act upon logic operations on the operators.
AND
OR, NEG
NOT
TEST
XOR

AND INSTRUCTION
Function: It acts upon the conjunction of the operators bit by bit.
Syntax:
AND destiny, source
The outcome of this operation is stored on the destiny operator.
OR INSTRUCTION
Function: Logic inclusive OR
Syntax:
OR destiny, source

NEG INSTRUCTION
Function: It produces the complement to 2.
Syntax:
NEG destiny
This instruction produces the complement to 2 of the destiny operator and stores it on the similar operator.
NOT INSTRUCTION
Function: It carries out the turnaround of the destiny operator bit by bit.
Syntax: NOT destiny
The outcome is stored on the same destiny operator.

TEST INSTRUCTION
Function: It logically evaluates the operators
Function: TEST destiny, source
It executes a conjunction, bit by bit, of the operators, but differing from AND, this instruction does not place the result on the destiny operator, it only has effect on the state of the flags.
XOR INSTRUCTION
Function: OR exclusive
Syntax:
XOR destiny, source its function is to do the logic exclusive disjunction of the two operators bit by bit.

Related Discussions:- logic instructions

Memory hierarchy, Memory hierarchy: There is another type of high spee...

Memory hierarchy: There is another type of high speed memory, known as Cache memory, which is used to increase the speed of processing by making current programs and data avai

Define CISC and RISC ?, Two competing architectures were developed for impr...

Two competing architectures were developed for improving the architecture of the central processing unit, and different processors are conventional to each one. Both had their powe

What are the uses of the internet, Question 1 What are many of the modern ...

Question 1 What are many of the modern browsers in use today? Describe all in detail Question 2 Write a long note on the uses of Domain Names Question 3 What are the use

Cryptography, Question 1 Consider the one-time pad encryption scheme to e...

Question 1 Consider the one-time pad encryption scheme to encrypt a 1-bit message m, and assume m is chosen with uniform distribution from message space M={0,1}. Let E1 be the ev

Application programming, Do you offer application programming? Please sugge...

Do you offer application programming? Please suggest?

Powerpoint presentation of qualitative analysis approaches, Compare and con...

Compare and contrast two qualitative analysis approaches. You must select two that are a true contast eg  CAQADS (say leximancer ) v discourse analysis or thematic analysis by hand

Geometric mean - algorithm, The geometric mean is obtained by multiplying a...

The geometric mean is obtained by multiplying all the four numbers and taking the fourth root of the product. Let x 1 ,x 2 ,x 3  and x 4  be the given four numbers then geometric

Assembly, can you help me to do my assembly program homework

can you help me to do my assembly program homework

Features of python, • Easy-to-learn: Python has comparatively few keywords,...

• Easy-to-learn: Python has comparatively few keywords, easy structure, and a clearly distinct syntax. This permits the student to pick up the language in a comparatively short per

Computer, identify application software from the list? ms excel linux inter...

identify application software from the list? ms excel linux internet explorer adobe photshop sound card driver window disk manger adobe dream weaver windows file explorer

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd