stack instructions, Basic Computer Science

Assignment Help:
These instructions permit the use of the stack to store or recover data.
POP
POPF
PUSH
PUSHF

POP INSTRUCTION
Purpose: It improves a portion of information from the stack
POPF INSTRUCTION
Purpose: It extracts the flags stored on the stack
POPF
This command moves bits of the word stored on the superior part of the stack to the flag register.
PUSH INSTRUCTION
Purpose: It puts a word on the stack.
Syntax:
PUSH source
The PUSH instruction reduces by two the value of SP and then transfers the data of the source operator to the new resulting address on the just modified register.
The decrement on the address is due to the fact that when adding values to the stack, this one raises from the greater to the smaller segment address, consequently by subtracting 2 from the SP register what we do is to raise the size of the stack by two bytes, which is the only amount of information the stack can handle on every input and output of information.
PUSHF INSTRUCTION
Purpose: It situates the value of the flags on the stack.
Syntax:
PUSHF
This command reduces by 2 the value of the SP register and then the content of the flag register is relocated to the stack, on the address indicated by SP.
The flags are gone stored in memory on the similar bits indicated on the POPF command.

Related Discussions:- stack instructions

Why assembly language is good?, Because it is enormously low level, assembl...

Because it is enormously low level, assembly language can be optimized enormously well. Therefore assembly language is used where the extreme performance is needed for applications

Micro-computer, explain the function of each block in the block diagram of ...

explain the function of each block in the block diagram of micro-computer

Optical disk storage and cd - rom, Optical disk storage and cd - ROM: ...

Optical disk storage and cd - ROM: Optical disk storage is relatively new alternative to magnetic storage. Digital data is burnt into the surface of a plastic disk coated with

Information security, can someone balance between information security and ...

can someone balance between information security and access, if yes,how can they balance?

10, constant key use for in calculator

constant key use for in calculator

Analogue to digital converter, Analogue to digital converter: In an ADC...

Analogue to digital converter: In an ADC a range of input values must correspond to a unique digital word.  The type of code used depends on the system but here only binary cod

Outline the five main steps in the web design process, QUESTION (a) Out...

QUESTION (a) Outline the five main steps in the Web Design Process (b) Draw an annotated diagram explaining how data is transmitted to web servers during a standard form sub

Define procedure of Building Assembler programs, In order to be able to mak...

In order to be able to make a program, quite a lot of tools are needed: Earliest an editor is used to create the source program. Next a compiler, which is nothing more than a progr

Z80 CPU STATUS FLAGS, function of each status flags Z80 status flags

function of each status flags Z80 status flags

What is i-node number, Question 1 Bring out the advantages of Linux Ope...

Question 1 Bring out the advantages of Linux Operating systems Question 2 Match the Symbols with their respective file types              Symbol               File N

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd