Thursday, July 9, 2020
East Japanese Religion The Formation Of First Japan Emperor Kingdom - 550 Words
East Japanese Religion: The Formation Of First Japan Emperor Kingdom (Essay Sample) Content: Student Name:Instructor:Subject:Submission Date:AmaterasuScott Littleton mythology of the East Japanese religion of Shinto reveals how a sun goddess ruled with wisdom in ancient times until the formation of first Japan emperor kingdom. The story begins with Amaterasu, the sun goddess being put to the test by her brother Susano after their father Izanagi no Mikoto had left all sovereignty of cosmos under the sun goddess (Littleton 1). Susano called the raging male put his sister, Amaterasu into a context of divinity upon which, they spat out deities that are believed to be the ancestors of modern Japan Emperor rule. So Amaterasu used Susanos sword, and Susano used Magatama, Amaterasus jewel where they chewed them and let out jewels. Susano let out more children, but Amaterasu had more male kids than Susano, and therefore, she became victorious from the contest. He refused to accept defeat and threw a piebald horse into the path of, Amaterasu killing one of her handmaid ens. At that point, she decided to hide in the cave of darkness, and the whole cosmos became dark. She was then tricked to come out by her fellow deities, and Susano was thrown to earth. As the story unfolds, it brings some resemblance with ancient European stories of a hero killing a monster and getting a sword, which then, becomes the symbol of a new nations nobility and the power of women in the established kingdoms.The story resembles those of ancient Europe where a sword is either obtained from a rock or a dragon and it is then used as a symbol of authority for a new nation. In ancient Arthurian tradition, King Arthur got a massive sword called the Excalibur which he used to wage battles until becoming the King of England. Arthur pulled the first sword from a rock but the second sword he obtained it from a lady of the lake (Littleton 1). The story of the magical swords is also evident in the old mythical story of Amaterasu where Susano obtains Mura-Kumo, a magical sword from th e tail of the dragon and later surrenders it to his sister through Honinigi, the grandson before going to the underworld.The role of women in the establishment of the new kingdom of Japan is well intensified in the tale of Amaterasu and even that of ancient European countries. Just as Amaterasus brother had no option but to surrender the magical sword, he found in the dragons tail to his sister during the divination test, and the time of his grandsons reign on earth, the same can be attributed to ancient indo-European mythologies. In Arthurs case, he surrendered the swords to the lady of the lake who became his wife. In the story of Yamato Takeru, the sword is surrendered to the same woman who gave and later became his wife (Littleton 1). These ladies are said to have a duty of becoming the leading founders of the respective monarchies, both in England and also in Japan.Just like Beowulf killed the monster, Grendel and her mother to claim kingship authority in ancient Gaet, the sam e can be attributed to how Susano killed the eight-headed dragon to claim the magical sword. In all the cases, the swords used were magical and were gold in color and stature. But what remains clear is that monsters ...
Tuesday, May 19, 2020
Security Issues Of Hadoop Services - 3238 Words
SECURITY ISSUES IN HADOOP SERVICES 10 Security Issues in Hadoop Services Jogendra Chowdari Achanta Adv Web App Using Web Services - CS 525 Professor Kihyun Kim 04/10/2016 Running head: SECURITY ISSUES IN HADOOP SERVICES 1 Abstract Big Data is creating great opportunities for businesses, companies and many large scale and small scale industries. Hadoop is an open-source cloud computing and big data framework, is increasingly used in the IT world. The rapid growth of Hadoop and Cloud Computing clearly indicates its importance as a Big Data enabling technology. Due to the loopholes of security mechanism, the security issues introduced through adaptation of this technology are also increasing. Hadoop services do not authenticateâ⬠¦show more contentâ⬠¦With the use of more sophisticated pattern analysis and with the use of multiple data sources it is easy to detect the threats in early stages of the project itself. Many organizations are fighting with the remaining issues like private issues with the usage of big data. Data privacy is a liability; thus companies must be on privacy defensive. When compared to security, Privacy should consider as a profit making asset because it results in the selling o f unique product to customers which results in making money. We need to maintain balance between data privacy and national security. Visualization, controlling and inspection of the network links and ports are required to ensure security. Thus, there is a need to put the ones in insight the loop holes, conflicts, and the contents ready for attacks with respect to cloud computing, and we need to develop a platform and infrastructure which are less protected in attacks. Literature Work Hadoop is one of the open source frameworks, is used as extension to big data analytics framework which are used by a large group of vendors. This type of framework makes work easy for the companies how they?re going to store and can use the data within the digital products as well as physical products (James, M. et al. 2011). We can analyze data using Hadoop, which is emerging as solution toShow MoreRelatedSecurity Issues Of Hadoop Services3239 Words à |à 13 PagesSECURITY ISSUES IN HADOOP SERVICES 11 Security Issues in Hadoop Services Jogendra Chowdari Achanta Adv Web App Using Web Services - CS 525 Professor Kihyun Kim 04/10/2016 Running head: SECURITY ISSUES IN HADOOP SERVICES 1 Abstract Big Data is creating great opportunities for businesses, companies and many large scale and small scale industries. Hadoop is an open-source cloud computing and big data framework, is increasingly used in the IT world. The rapid growth of Hadoop and CloudRead MoreCloud Computing : Services, Security, And Resilience1587 Words à |à 7 Pages Cloud Computing: Services, Security and, Resilience Sai Prasad Setty Department of Computer Science, Florida State University, Tallahassee E-mail: ss14ak@my.fsu.edu Abstract Eciency is one of the essential metrics that determines the acceptability of an operational system. In computing too experts have had to tackle the issue of eciency in terms of space and time; and striking a balance between the two. With the rapid advancement in technology over the past few decades, this exchange has evolvedRead MoreThe Development And Support Of Apache Hadoop1684 Words à |à 7 Pagessupport of Apache Hadoop, a framework that allows for the distributed processing of large data sets across clusters of computers. Architected, developed, and built completely in the open, Hortonworks Data Platform (HDP) provides Hadoop designed to meet the needs of enterprise data processing.HDP is a platform for multi-workload data processing across an array of processing methods from batch through interactive to real-time - all supported with solutions for governance, integration, security and operationsRead MoreA Analysis On The Computer Services1078 Words à |à 5 PagesNumerous users can utilize the modern computer services which require the identity of the users to be checked precisely. Authentication is the procedure of checking the identity of the users and it produces a critical information that can be used in securing the PC frameworks. In conventional frameworks, secret word based validation was utilized for confirmation, yet these passwords can be intercepted by hackers when sent across the PC systems. Kerberos is a solid validation strategy where verificationRead MoreChallenges Faced With Big Data1731 Words à |à 7 PagesAlready some success is achieved from big data in some fields like Sloan digital sky survey so itââ¬â¢s mean there is some potential in big data and benefits are also real but still some challenges like scalability, heterogeneity, integration, privacy, security etc. need to be addressed for realizing full potential of big data. One of the major challenge is transformation of unstructured data to structured form for accurate and timely processing. Challenges with big data starts with very first phase ofRead MoreHow Big Data Impact On Enterprise Data Governance And Security1726 Words à |à 7 PagesHow does Big Data impact on Enterprise Data Governance and Security Introduction: Big data is nothing but collecting of datasets. Organizations in current world demands data to be broken down which can used to get more high effectiveness and benefit. Big data refers to the large amounts of data which collected from various devices such as mobiles, sensors and social media etc. Generally, large amount of data have been regenerating by IT industry such as satellite data, mobile devices and etc. Read MoreA Study On Big Data1643 Words à |à 7 Pagesdata and good solutions also been proposed by the researchers by developing new techniques and efficient algorithms. In this paper, a detailed study about big data, its basic concepts, history, technique, tools and cloud services are discussed. In addition to this, research issues in big data also discussed. Keywords: Big data INTRODUCTION Big data refers to large data sets whose size is beyond the ability of typical database software tools to capture, store, manage and analyze. Big data is usedRead MoreNotes On Hadoop And Mark Logic1638 Words à |à 7 PagesJyoti rana Professor Savidrath By IT 440/540 4/26/2016 How To: Hadoop and Mark logic Before talking about Hadoop and Mark Logic, it is very important to understand Big Data. What is big data, whatââ¬â¢s the consequence and how it is linked with Hadoop and Mark Logic? ââ¬Å"Large set of data, unstructured and structured which is created everyday over the internet via different devices is known as Big Dataâ⬠. For example: ââ¬Å"if the user has 7 accounts and creates multipleRead MoreA Database Problem Before Recommending Sql, Nosql Or Bigdata838 Words à |à 4 Pagesoffers better performance in data collection. â⬠¢ SQL offers data compression techniques so that data size can be reduced. â⬠¢ SQL offers strong authentication and access protection and has better password management too. â⬠¢ SQL automatically updates security patches to reduce maintenance costs. 3. Describe in a few sentences a business or computational problem you would want to solve with a NoSQL database, and what makes NoSQL a better choice in this case? Ans) NoSQL database are better choice whenRead MoreBenefits Of Using Predictive Analytics Software1098 Words à |à 5 Pagesâ⬠¢ Enhanced use of freely available data. â⬠¢ Building new products and services supplemented with Big Data analytics and privacy by design, developing products adapted to European privacy standards . The power and opportunity of big data applications used well, big data analysis can improve economic productivity, drive improved consumer and government services, prevent terrorists, and save lives. Examples include: â⬠¢ Big data and the rising ââ¬Å"Internet of Thingsâ⬠have made it possible to merge the manufacturing
Wednesday, May 6, 2020
The Case of the Omniscient Organization - 1207 Words
Case Analysis: The Case of the Omniscient Organization Introduction In this case study, Dominion-Swann (DS) has implemented a ââ¬Å"radical restructuring of the work environmentâ⬠in order to regain control of its employees. By 1990, DS had been suffering from a number of business woes. It was not keeping pace with its competition, employee turnover had increased substantially, health costs and work-related accidents were rising, and employee theft was at an all-time high. Instead of identifying and addressing the underlying business and management problems, DS decided to treat the symptoms by turning to SciexPlan Inc. to help radically restructure the work environment through the use of employee monitoring technology. Backgroundâ⬠¦show more contentâ⬠¦Off-duty conduct may be relevant to employment if the misconduct negatively impacts the employee s work performance or the company s mission. However, the systematic monitoring employed by DS raises serious privacy concerns. Monitoring all employeesââ¬â¢ activities, rather than just the activities of employees under suspicion of specific misconduct, constitutes a blanket search that brings enormous privacy concerns. Recommendations DS would be better off with no employee monitoring rather than scrutinizing its employees every move. Once the employee monitoring creates a morale problem, all of the value it has created will be diminished. If DS is to continue with employee monitoring systems, it must create and clearly communicate a monitoring policy for employees. DS needs to start with human-oriented policies, then use technology to enforce them. As it stands right now, DS is exerting too much power in its invasion of employee privacy in the workplace. DS is exploiting the lack of regulation in this area in order to implement extremely invasive methods of employee surveillance. Until employees are protected by regulation to protect their rights to privacy in the workplace, DS should assume responsibility to self regulate by limiting the amount of surveillance, implementing it only when it achieves specific goals for success. Monitoring should beShow MoreRelatedFinding An Agent Should Be The Step Before Polishing Your Manuscript886 Words à |à 4 Pagessynopsis explains your plot and entices an agent to read your full manuscript. If you want to avoid your submission being disregarded, there are certain conventions that must be followed; in this report, you will learn about the typical voice, format, organization, and style conventions. The first convention, voice, is intended to ensure the agent requests a full manuscript and subsequently offers to represent your novel. To promote follow-through, your synopsis should be written in the same voice as yourRead MoreDeposit Mobilization in Banks1071 Words à |à 5 Pagesrecognizable number of individuals whom I have not mentioned here, but who have visibly or invisibly facilitated in transforming this research into a success saga. Above all, I would like to conscientiously thank the Omnipotent, Omnipresent and Omniscient God for His priceless blessings. Name and Signature of Student Read MoreThe And Non Market Decision Making Essay1640 Words à |à 7 Pageskept internal? Williamson is supportive of case-by case marketing being used alongside relationship specific contracts depending on the needs of the consumer. Some clients will expect higher levels of control or higher levels of attention. Public agencies and government are treated as ââ¬Å"omnipotent, omniscient, and benevolent (Williamson O. E., 1999a, p. 306).â⬠These characteristics set public agencies and government apart from private organizationsââ¬âa topic that will be discussed in detail laterRead MoreNarrative Structure In Ernest J. Gainess A Lesson Before Dying909 Words à |à 4 PagesNarrative Structure: In his novel, A Lesson Before Dying, Ernest J. Gaines leaves the readers with a clear message. His writing style and organization throughout the novel make the story easy to understand. Gaines utilizes point of view, style and setting in order to construct a genuine story which reflected many nonfiction events. Gaines uses Grant Wiggins to narrate the novel. Through the first person point of view, the reader gets to see everything through Grantââ¬â¢s eyes. The point of viewRead MoreAnalysis Of The Book The Scarlet Letter 1141 Words à |à 5 Pageswho follows many of the same principles as Governor Bellingham. 5. Three main settings and one sentence description of each. a. Scaffold- Placed in the center of the town it sits up high and is used for the punishment of ones crime, which in the case of Hester is public humiliation. b. Hesterââ¬â¢s Home- Hester and Pearl live in a small cottage with a thatched roof on the outskirts of town near the waterfront. c. Forest- The forest is symbolized as the Devilââ¬â¢s playground; however, it is filledRead MoreThe Democratic Republic Of Congo1487 Words à |à 6 Pagesand even cases of patronage along ethnic lines. Like the chewas and Tumbukas are allies and Zambia and adversaries in Malawi based on the ethnic polarization effect( the size of the ethnic group influencing politics), there has been and still are cases of political instability in Eastern DRC with the Hutus and Tutsis ethnic groups. This ethnic conflict in eastern Congo has been the most deadly one since the second World War, and its social consequence have been disastrous. This case of instabilityRead MoreThe Rattler Essay1641 Words à |à 7 PagesDiction | Word Choice, Language, Figurative Language,Figures of Speech | Detail | Imagery | Point of View | Narrator, Perspective | Organization | Narrative Structure: chronological order, cause and effect, order of importance, flash-forward, flashback, problem-solution | Syntax | Sentence Structure | Please Note: Diction, detail, point of view, organization and syntax are all devices that the author uses to make the tone of the story evident to the reader. Your commentary should consistentlyRead MoreA Critique Of The Novel Candide 1238 Words à |à 5 Pagessince God is perfect, and he created the earth, the earth must be perfect. This ideology is called Philosophical Optimism, which gained popularity because it gave an answer to a question all Christians have to wonder about: if God is omnibenevolent, omniscient, and omnipotent, why does evil run rampant on earth, his greatest creation? Leibniz would argue that in the best of all possible worlds, every event is linked by a chain of cause and effect, so while humans may view something as evil or bad, theRead More 1984: The Control Of Reality For Control Of The Masses Essay1103 Words à |à 5 Pages1: History: Explain Revisionism Its Process How it affects the present Paragraph 2: Psychology: Artificial Scarcity: Affects human behavior Maslow Theory of Human behavior Paragraph 3: God: Big Brother has taken the place of God: Omnipotent and Omniscient, and under the control of the party Among the many themes express in the novel 1984 by George Orwell the most interesting and frightening is the concept of creating an alternative reality to control a mass population. The Inner Party stays inRead MoreThe Value of Digital Privacy in the Information Technology Age1283 Words à |à 5 Pageson capturing, analyzing, categorizing and using personal data that had been highly protected in the past for purposes of securing nations (Ottensmeyer, Heroux, 1991). Correspondingly, there has never been a time when every aspect of life in an organization is monitored, from personal computer and telephone use to the use of personal Wi-Fi and networking devices (Riedy, Wen, 2010). The first section of this analysis is to analyze three technologies that allow individuals to research other citizens
Effectiveness of Alternative Dispute Resolution free essay sample
Effectiveness of Alternative Dispute Resolution Business Law BUS415 University of Phoenix November 21, 2007 Effectiveness of Alternative Dispute Resolution Introduction Alternative Dispute Resolution (ADR) has drastically improved over the last several years including many areas adding to the traditional commercial dispute in the form of arbitration; therefore mediation is the most important and the first step in the dispute resolution process. In resolving disputes the arbitrators along with the mediators have the most important role.Acting as neutrals, the mediators work to reconcile the partiesââ¬â¢ differences before continuing to arbitration or litigation. The arbitrators also act as neutrals, but as a third party to hear evidence and decide upon the case, they can also be binding or non binding. ADR does also refer to any means of setting disputes outside of the courtroom. As stated ADR mainly includes arbitration, mediation, but is not limited to early neutral evaluation, a nd conciliation. Arbitration and meditation are the two most common forms of ADR in the court system today. We will write a custom essay sample on Effectiveness of Alternative Dispute Resolution or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page Discussion Many school districts encourage the employees to develop options for ADR which can be utilized at the local district level. Parents and staff members are also encouraged to submit information relating to methods of ADR which have been proved effective. References Cradler, John and Yrchik, John. The National Information Infrastructure: Requirements for Education and Training. Washington, DC: National Coordinating Committee on Technology in Education and Training (NCC-TET) (1994). Cradler, John and Bridgforth, Elizabeth.
Wednesday, April 22, 2020
Michael Collins free essay sample
This is a historical film review of the movie made about the Irish revolutionarys life. This paper is a historical film review that analyzes Michael Collins starring Liam Neeson and discusses the movies historical accuracy. The author includes specific details of the Irish patriots life, his major role in politics, his military strength, and the attacks he carried out as a member of Sinn Fein. The movie Michael Collins is the story of an Irish revolutionary and political leader. He was a leader within the Irish Republican Brotherhood, a leader in the Sinn Fein Movement and a member of its cabinet, a guerrilla leader, and eventually became the Commander in Chief of the Irish Free State Army. The film details the events of his political career, his love life, and ultimately, his death. Collins goal of course was to take Ireland back from the British after 700 years to form an independent republic for the Irish people. We will write a custom essay sample on Michael Collins or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page
Monday, March 16, 2020
buy custom Custom ECONOMIC TIGER Essay Sample
buy custom Custom ECONOMIC TIGER Essay Sample Economic Tiger The concept of economic tiger refers to the state, in which a country undergoes a rapid economic evolution, which is usually accompanied by a highly improved standard of living by the residents. Most of these tigers developed in Asia between 1960s and 1990s. Today the countries regarded as the economic tigers are considered to be rich. Examples include Ireland, Japan, South Korea, Singapore, Hong Kong and Taiwan. These countries were helped by the United States, which tried to guide them not to become the communist ones. They allowed industrial competition, which led to many exports to the developed nations; consequently, their economic growth remained at double digits for long periods of time. China is among the rising Tiger economies. For decades it has been using its geographical location to its advantage, since it is situated in the Southern part of the hemisphere, where it can easily access the Asian and African markets. Their core market is located exactly there. At the same time, Asia, being the largest producer of petroleum, gives China a geographical advantage, since there is little transportation of the raw material. Secondly, the economic factors, such as endowment with resources, are high, leading to an easy economic development. Finally, its high population has led to cheap and readily available labor force; thus, a relatively low cost of production of their exports. Transportation was the major factor that aided the economic development in Europe. They had elaborated road and water transportation systems, as they widened and deepened waterways for the easier navigation. They have made various inventions, such as the steam boat, and later the locomotive, that transported bulky goods. Chinas growth has come at a time, when there were many inventions in the transportation field. Therefore, they have had an easier time in developing their transport, since they only need to improve their infrastructure, such as roads, airports, railways among other economic-supporting transport developments. For instance, there was a total of 21800 km of railway before 1950, in comparison to about 91000 km in 2010. Political changes have influenced the economic development of Europe. Power was shared among the rich, who controlled economic evolution, where the wealthy merchants and rich landowners were the key heads. This resulted into a decision-making process that was geared towards the economic development of the region. The Chinese government has also been affected by the political trends. The government controls most of the processes, which has led to the centralization of power and its dispensation. Therefore, the policies were made by experts and industries that are not beneficial to the economy and are highly discouraged. As the citizens elect their political leader, he proves his ability to retain the high growth of the economy. Innovations were the key to the economic industrialization in Europe. Transport, communication and other infrastructures have led to the development of industries that would later become an axle in the actual development. Road making, as well as railway transport, were the result of innovations that eventually led to the economic development. In China, there were innovations that have resulted in a creation of the new industries. It happened because of the ventures into the new markets, such as the electronic one. It is ranked as one of the biggest exporter of electronics to the African market. Their innovations have led to the manufacturing of the low cost products that form a very important line of commodities to the developing economies. In conclusion, I believe that the economic tigers should be tamed. Their rapid growth can result into poor economic performances in comparison to other world economies. In this case, other economies should convince the tigers to align their economic growth with the rest of the world. For instance, China needs to rebalance their economic growth, as well as clear the allegations that they alter their currency to their advantage. Their growth model should be in line with the rest of the world, in order to ensure that there is enough evaluation of their economic performances.
Saturday, February 29, 2020
Architecture and Programming model of 8086
Architecture and Programming model of 8086 Intel 8086 is a 16 bit integer processor. It has a 16-bit Data bus and a 20-bit Address bus. Since 20-bit address lines are available that provide up to 1MB of storage. It consists of a powerful instruction set which makes it possible to carry out different operations easily.It supports 2 modes of operation, Maximum (multiple processors can be used) and Minimum (Single processor is used).Architecture of 8086 The internal architecture of 8086 is divided into 2 units, Bus Interface Unit (BIU) and Execution Unit (EU).A diagram of the architecture is shown below.Bus Interface Unit (BIU)BIU takes care of all data and address transfers on the buses for the EU like sending addresses, fetching instructions from the memory, reading data from ports, writing data into the memory ports and lastly it also generates the memory addresses. The EU and the BIU are connected by the Internal Bus.The BIU has the following functional parts: Instruction Queue- the BIU uses the concept of pipelining. This means while the current instruction is being executed the BIU gets up to 6 bytes of the next instruction (prefetching) and stores them in the instruction queue. Once execution is complete, the instruction queue is ready to provide the next instruction set which is simply read and executed. This results in increased execution speed. Instruction Pointer- It is a 16-bit register used to hold the address of the next instruction to be executed. Segment Register BIU has 4 segment buses, i.e. CS, DS, SS ES. It holds the addresses of instructions and data in memory, which are used by the processor to access memory locations. CS It stands for Code Segment. It is used for addressing a memory location in the code segment of the memory, where the executable program is stored. DS It stands for Data Segment. It consists of data used by the program and is accessed in the data segment by an offset address or the content of other register that holds the offset address. SS It stands for Stack Segment. It handles memory to store data and addresses during execution. ES It stands for Extra Segment. ES is additional data segment, which is used by the string to hold the extra destination data. Execution Unit (EU)EU gives instructions to BIU stating from where to fetch data, decode it and finally execute it. Its function is to control operations on data using the instruction decoder and ALU (Arithmetic Logic Unit). The data on which the operations are performed is brought in using the BIU.The EU has the following functional parts: ALU- It handles all arithmetic and logic operations, like +, -, Ãâ", /, OR, AND NOT. Flag Register- It is a 16-bit register that behaves like a flip-flop, i.e. it changes its status according to the result stored in the accumulator. It has 9 flags and they are divided into 2 groups Conditional Flags and Control Flags. Conditional Flags It represents the result of the last arithmetic or logic instruction executed. These flags are listed below: Carry Flag- This flag is set to ââ¬Ë1ââ¬â¢ when an addition causes a carry or a subtraction causes a borrow. Auxiliary Flag- This flag is set to ââ¬Ë1ââ¬â¢ when an addition causes a carry while moving from a lower nibble to the upper nibble in BCD addition. Parity Flag- This flag is set to ââ¬Ë1ââ¬â¢ if the low order 8 bits of the result contain an even number of ââ¬Ë1ââ¬â¢s. Zero Flag- This flag is set to 1 when the result of arithmetic or logical operation is zero. Sign Flag- This flag holds the sign of the result, i.e. when the result of the operation is negative, then the sign flag is set to 1 else set to 0. Overflow Flag- This is set to ââ¬Ë1ââ¬â¢ if the result is out of range or when the system capacity has exceeded. Conditional Flags These control the operations of the EU and can also be used by the user. These flags are listed below: Trap flag It is used for single step control and allows the user to execute one instruction at a time for debugging. If it is set, then the program can be run in a single step mode. Interrupt flag It is an interrupt enable/disable flag, i.e. used to allow/prohibit the interruption of a program. It is set to 1 for interrupt enabled condition and set to 0 for interrupt disabled condition. Direction flag It is used in string operation. As the name suggests when it is set then string bytes are accessed from the higher memory address to the lower memory address and vice-a-versa. General purpose register- There are 8 general purpose registers, i.e., AH, AL, BH, BL, CH, CL, DH, and DL. These registers can be used individually to store 8-bit data and can be used in pairs to store 16-bit data. The valid register pairs are AH and AL, BH and BL, CH and CL, and DH and DL. It is referred to the AX, BX, CX, and DX respectively. Their functionalities are listed below: AX register- It is also known as accumulator register. It is used to store operands for arithmetic operations. BX register- It is used as a base register. It is used to store the starting base address of the memory area within the data segment. CX register- It is referred to as counter. It is used in loop instruction to store the loop counter. DX register- This register is used to hold I/O port address for I/O instruction. Stack Pointer Register- It is a 16-bit register which holds the address from the start of the segment to the memory location, where a word was most recently stored on the stack.
Subscribe to:
Posts (Atom)