Syntax of a Macro, Basic Computer Science

Assignment Help:
The divisions which make a macro are:
• Declaration of the macro
Code of the macro
Macro termination directive
The assertion of the macro is done the following way:
Name Macro [parameter1, parameter2...]
Though we have the functionality of the parameters it is possible to
make a macro which does not require them.
The directive for the extinction of the macro is: ENDM
To use a macro it is only required to call it by its name, as if it were
one more assembler instruction, given that directives are no longer essential as
in the case of the procedures.

Related Discussions:- Syntax of a Macro

C program , write a c program for below question

write a c program for below question

Information system and information technology, What is the difference betwe...

What is the difference between information technology and information systems? Describe some of the fuctions of information systems

Power point microsoft, what are slides how do you put slides on powerpoint

what are slides how do you put slides on powerpoint

REMOTE DESKTOP, I WANT TO CONNECT A PC WIYH MY PC THROUGH REMOTE DESKTOP. W...

I WANT TO CONNECT A PC WIYH MY PC THROUGH REMOTE DESKTOP. WHAT I DO TELL ME PLEASE

Ipx for lan, explain ipx for lan and spx

explain ipx for lan and spx

Introduction Assembly Language, This web page looks at assembly languages i...

This web page looks at assembly languages in a common method. Specific illustrations of addressing modes and instructions from a variety of processors are used to demonstrate the g

Logic instructions , They are used to act upon logic operations on the oper...

They are used to act upon logic operations on the operators. AND OR, NEG NOT TEST XOR AND INSTRUCTION Function: It acts upon the conjunction of the operators bit by bit. Syntax: A

What is the definition of instructiion set?, For a processor to be able ...

For a processor to be able to process an instruction, it requires to be able to determine what the instruction is asking to be carried out. For this to take place, the CPU requires

Cryptography, Consider the one-time pad encryption scheme to encrypt a 1-bi...

Consider the one-time pad encryption scheme to encrypt a 1-bit message m, and assume m is chosen with uniform distribution from message space M={0,1}. Let E1 be the event "message

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd