stack instructions, Basic Computer Science

Assignment Help:
These instructions permit the use of the stack to store or recover data.
POP
POPF
PUSH
PUSHF

POP INSTRUCTION
Purpose: It improves a portion of information from the stack
POPF INSTRUCTION
Purpose: It extracts the flags stored on the stack
POPF
This command moves bits of the word stored on the superior part of the stack to the flag register.
PUSH INSTRUCTION
Purpose: It puts a word on the stack.
Syntax:
PUSH source
The PUSH instruction reduces by two the value of SP and then transfers the data of the source operator to the new resulting address on the just modified register.
The decrement on the address is due to the fact that when adding values to the stack, this one raises from the greater to the smaller segment address, consequently by subtracting 2 from the SP register what we do is to raise the size of the stack by two bytes, which is the only amount of information the stack can handle on every input and output of information.
PUSHF INSTRUCTION
Purpose: It situates the value of the flags on the stack.
Syntax:
PUSHF
This command reduces by 2 the value of the SP register and then the content of the flag register is relocated to the stack, on the address indicated by SP.
The flags are gone stored in memory on the similar bits indicated on the POPF command.

Related Discussions:- stack instructions

Java Assignment, Hi? are you conversant with Java that is J2SE 6 coz i have...

Hi? are you conversant with Java that is J2SE 6 coz i have assignments on this area?

Trap doors and Logic Bombs, Trap doors:  This is a way of bypassing normal...

Trap doors:  This is a way of bypassing normal authentication procedure (windows/ operating system user name  and password) to access a system. Once a system is compromised (impac

Discuss the attributes of speech codec, Question 1 What is mobile telephon...

Question 1 What is mobile telephone initialization? Explain the three main goals of this procedure Define GSM system operations Introduction to mobile telephone initializ

Computer security, concepts and components of computer security

concepts and components of computer security

Computer Networking Scenario help, The project designs a school computer la...

The project designs a school computer lab with the necessary hardware and software components along with the IP address for different components. The computer lab consists of one I

Data transmission, #quesetion..explain the concept of data transmission giv...

#quesetion..explain the concept of data transmission giving details of the transmission rate and bandwidth with details explanation of the transmission media

Flowchart, create a flowchart showing average score for the 3 quizzes assum...

create a flowchart showing average score for the 3 quizzes assume that there are 3 sections each having 5 students the only valid number to be entered is 1-100 for the quizzes shou

Input and output devices, Input and Output Devices : The most common input...

Input and Output Devices : The most common input devices that you will see in your PC are the keyboard and the mouse. The keyboard of the computer looks like the keyboard o

Short program to practice assembly language loops, Purpose of Code This...

Purpose of Code This is a short program to practice assembly language loops and if/else statements. You will use various jump commands and the cmp instruction.  The progra

Discuss about the descriptor classes, Question 1 List down any six feature...

Question 1 List down any six features of a Smartphone Question 2 Give a brief note on a) Internal Flash Disk. b) Use of C++ in Symbian OS Question 3 What are the naming

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd