Show a string in assembly language, Computer Engineering

Assignment Help:

Q. Show a string in assembly language?

MOV AH, 09H

MOV DX, OFFSET   BUFF

INT    21H

Here data in input buffer stored in data segment is intended to be displayed on monitor.

A complete program: 

Input a letter from keyboard and respond.  "The letter you typed is ___".

CODE SEGMENT 

; set the DS register

                        MOV AX, DATA

                        MOV DS, AX

; Read Keyboard

                        MOV AH, 08H

                        INT   21H

; Save input

                        MOV BL, AL

; Display first part of Message

                        MOV AH, 09H

                        MOV DX, OFFSET MESSAGE

                        INT 21 H

; Display character of BL register

                        MOV AH, 02H

                        MOV DL, BL

                        INT 21 H

; Exit to DOS

                        MOV AX, 4C00H

                        INT 21H

CODE ENDS

DATA SEGMENT

MESSAGE DB "The letter you typed is $"

DATA ENDS

END.


Related Discussions:- Show a string in assembly language

By which the excess-3 code of decimal 7 is represented , The excess-3 code ...

The excess-3 code of decimal 7 is represented by ? Ans. An excess 3 code of decimal 7 is equal to the binary code +3.

What is the purpose of guard bits, What is the purpose of guard bits used i...

What is the purpose of guard bits used in floating point operations? The guard bits are the extra bits which are used to retain the in-between steps to enhance the accuracy in

Affective functioning - integrated test result, Mr. X's MMPI suggests that ...

Mr. X's MMPI suggests that he either suppresses anger and hostility or has a naturally low level of anger and hostility (O-H=58, ANG=36, TPA=41, AGGR=36). His responses on the PAS

What are the type of internet connection, What are the type of Internet con...

What are the type of Internet connection When determining requirements for a VPN, carefully estimate the number of systems to be put behind the VPN, the number of concurrent u

Tools for performance measurement, Tools for Performance Measurement Th...

Tools for Performance Measurement The reason behind these algorithms has been to gain a speed up and improve the performance. After the parallel algorithm has been written and

What is a piconet in a bluetooth context, Problem: (a) IEEE802.11 supp...

Problem: (a) IEEE802.11 supports two types of network architecture, describe these architectures with the support of diagrams detailing the network components. (b) The MAC

Cross bar-various interconnection networks-fully connected, Cross Bar ...

Cross Bar The crossbar network is the easiest interconnection network. It has a two dimensional grid of switches.  It is a non-blocking network and give connectivity among inp

What do you understand by scan codes, Q. What do you understand by Scan Cod...

Q. What do you understand by Scan Codes? A scan code is a code produced by a microprocessor in keyboard when a key is pressed and is unique to key struck. When this code is rec

Pebble merchant, c programming code for pebble merchant

c programming code for pebble merchant

Loosely coupled systems, Loosely Coupled Systems These systems do not d...

Loosely Coupled Systems These systems do not distribute the global memory because shared memory concept gives rise to the difficulty  of memory conflicts, which in turn slows d

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd