Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Q. Show a string in assembly language?
MOV AH, 09H
MOV DX, OFFSET BUFF
INT 21H
Here data in input buffer stored in data segment is intended to be displayed on monitor.
A complete program:
Input a letter from keyboard and respond. "The letter you typed is ___".
CODE SEGMENT
; set the DS register
MOV AX, DATA
MOV DS, AX
; Read Keyboard
MOV AH, 08H
; Save input
MOV BL, AL
; Display first part of Message
MOV DX, OFFSET MESSAGE
INT 21 H
; Display character of BL register
MOV AH, 02H
MOV DL, BL
; Exit to DOS
MOV AX, 4C00H
CODE ENDS
DATA SEGMENT
MESSAGE DB "The letter you typed is $"
DATA ENDS
END.
What is the use of buffer register? The buffer register is used to avoid speed mismatch among the I/O device and the processor.
The following are just a few return types of a controller action process. In common an action process can return an instance of an any class that derives from Action Result class.
Q. Describe about Digital Audio Tape? The most proper tape for backing up data from a disk today is Digital Audio Tape (DAT). It employs a 4mm tape covered in a cartridge. It e
Explain about unix file system architecture
Based on the variables, construct a design that haves only main effects of one categorical IV and at least 2 continuous DVs. Discuss what you think the relationship is among the de
What is the difference between VB6 and VB.Net? 1,Object-based Language 2,Doesnot support Threading 3 Not powerful Exception handling mechanism 4,Does not having suppor
Q. Define syntax of MPI_Bcast function? MPI_Bcast(msgaddr, count, datatype, rank, comm): This function is used by a process ranked rank in group comm to transmit messag
Mr. X seems to view himself in positive terms (MMPI-2: Ho=38) as a well-functioning person who is capable of dealing with his life and personal challenges (MMPI-2: LSE=41, TRT=39),
What are the disadvantages of Public Key Cryptography? Disadvantages of Public Key Cryptography are as given below: a) It is used to encrypt a secret key that is used to e
Objectives After examining this unit, learner's will be able to understand discuss the importance and needs of interconnection network; explain the part of interconn
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd