SlideShare ist ein Scribd-Unternehmen logo
1 von 10
Downloaden Sie, um offline zu lesen
Lecture on
MS-DOS Functions and BIOS Calls
Application
Program

Command Processor
COMMAND.COM

MS-DOS Kernel
MSDOS.SYS
BIOS
ROM pulse IO.SYS
System Hardware

• BIOS is hardware specific
• BIOS is supplied by the computer manufacturer
• Resident portion which resides in ROM and nonresident portion IO.SYS
which provides a convenient way of adding new features to the BIOS
80x86 Interrupts
• An interrupt is an event that causes the processor to
suspend its present task and transfer control to a new
program called the interrupt service routine (ISR)
• There are three sources of interrupts
– Processor interrupts
– Software interrupts
– Hardware interrupts
• Each interrupt must supply a type number which is used
by the processor as a pointer to an interrupt vector table
(IVT) to determine the address of that interrupt’s service
routine
80x86 Interrupts
• Each entry in the IVT points to the location of the
corresponding ISR.
• Before transferring control to the ISR, the processor
performs one very important task
– It saves the current program address and flags on the stack
– Control then transfers to the ISR
– When the ISR finishes, it uses the instruction IRET to recover the
flags and old program address from the stack

• Many of the vectors in the IVT are reserved for the
processor itself and others have been reserved by MSDOS for the BIOS and kernel.
– 0 – 1F are used by the BIOS
– 20 – 3F are used by the MS-DOS kernel
Interrupts
• There are some extremely useful subroutines within BIOS
or DOS that are available to the user through the INT
(Interrupt) instruction.
• The INT instruction is like a FAR call; when it is invoked
– It saves CS:IP and flags on the stack and goes to the
subroutine associated with that interrupt.
– Format: INT xx ; the interrupt number xx can be 00-FFH
– This gives a total of 256 interrupts
– Two of them are widely used: INT 10H and INT 21H
– Before the services of INT 10H and 21H is requested,
certain registers must have specific values in them,
depending on the function being requested.
INT 10H
• INT 10H subroutines are burned into the ROM BIOS of
the 80x86-based PC and are used to communicate with
the computer’s screen

Cursor Locations

• INT 10H Function 06
– AL = number of lines to scroll (with AL=00, window will be cleared)
– BH = attribute of blank rows
– CH, CL = upper row, left column
– DH, DL = lower row, right column
INT 10H
INT 10H function 02; setting the cursor to a specific location
– Function AH = 02 will change the position of the cursor to any location.
– The desired cursor location is in DH = row, DL = column
EX. Write a program that clears the screen and sets the cursor at the center
of the screen
; clearing the screen
MOV AX, 0600H ;scroll the entire page
MOV BH, 07 ; normal attribute (white on black)
MOV CX, 0000 ; upper left
MOV DX,184FH ; lower right
INT 10H
;setting the cursor at the center
MOV AH,02 ; set cursor option
MOV BH, 00 ; page 0
MOV DL, 39 ;
MOV DH, 12 ;
INT 10H
INT 10H
• INT 10H function 03; get current cursor position
MOV AH, 03
MOV BH, 00
INT 10H

Registers DH and DL will have the current row and column
positions and CX provides info about the shape of the
cursor.
INT 21H
• INT 21H is provided by DOS to be invoked to perform extremely
useful functions.

• INT 21H Option 09: Outputting a string of data to the monitor
– Can be used to send a set of ASCII data to the monitor.
– AH = 09; DX = offset address of the ASCII data to be
displayed.
– Display the ASCII data string pointed to by DX until “$”.
DATA_ASC DB ‘The earth is one country’,’$’
MOV AH,09
MOV DX, OFFSET DATA_ASC
INT 21H
INT 21H
• INT 21H Option 02: Outputting a single character to
the monitor
– DL is loaded with the character first
MOV AH 02
MOVE DL,’J’
INT 21H

• INT 21H Option 01: Inputting a single character with echo
– This function waits until a character is input from the
keyboard, then echoes it to the monitor. After the interrupt,
the input character will be in AL.
INT 21H
• INT 21H Option 0AH: Inputting a string of data from
the keyboard with echo
– AH = 0AH
– DX = offset address at which the address is stored
– First byte specifies the size of the buffer, second byte is the
number of characters
ORG 0010H
DATA1 DB 6,?,6 DUP(FF)
MOV AH, 00H
MOV DX, OFFSET DATA1
INT 21H

Ex. What happens if one enters USA and then <RETURN>
0010 0011 0012 0013 0014 0015 0016 0017
06 03 55 53 41 0D FF FF

Weitere ähnliche Inhalte

Was ist angesagt?

Computer Organization and Architecture.
Computer Organization and Architecture.Computer Organization and Architecture.
Computer Organization and Architecture.CS_GDRCST
 
I Ointerface in mp
I Ointerface in mpI Ointerface in mp
I Ointerface in mpAisu
 
Stack and subroutine
Stack and subroutineStack and subroutine
Stack and subroutineAshim Saha
 
Ch8 (1) morris mano
Ch8 (1) morris manoCh8 (1) morris mano
Ch8 (1) morris manoKIRTI89
 
Key board interface
Key board interface Key board interface
Key board interface sree deepika
 
T imingdiagram
T imingdiagramT imingdiagram
T imingdiagrampuja00
 
5.6 Basic computer structure microprocessors
5.6 Basic computer structure   microprocessors5.6 Basic computer structure   microprocessors
5.6 Basic computer structure microprocessorslpapadop
 
Computer organisation
Computer organisationComputer organisation
Computer organisationMohd Arif
 
Sequential Logic Circuits
Sequential Logic CircuitsSequential Logic Circuits
Sequential Logic CircuitsDilum Bandara
 
05 instruction set design and architecture
05 instruction set design and architecture05 instruction set design and architecture
05 instruction set design and architectureWaqar Jamil
 
B.sc cs-ii-u-3.2-basic computer programming and micro programmed control
B.sc cs-ii-u-3.2-basic computer programming and micro programmed controlB.sc cs-ii-u-3.2-basic computer programming and micro programmed control
B.sc cs-ii-u-3.2-basic computer programming and micro programmed controlRai University
 
Addressing modes (detailed data path)
Addressing modes (detailed data path)Addressing modes (detailed data path)
Addressing modes (detailed data path)Mahesh Kumar Attri
 
A-LOOP: AMP system: 2-cores ARM Cortex A9/Linux OS and 4-cores Leon3/Linux OS...
A-LOOP: AMP system: 2-cores ARM Cortex A9/Linux OS and 4-cores Leon3/Linux OS...A-LOOP: AMP system: 2-cores ARM Cortex A9/Linux OS and 4-cores Leon3/Linux OS...
A-LOOP: AMP system: 2-cores ARM Cortex A9/Linux OS and 4-cores Leon3/Linux OS...Vittoriano Muttillo
 

Was ist angesagt? (19)

Computer Organization and Architecture.
Computer Organization and Architecture.Computer Organization and Architecture.
Computer Organization and Architecture.
 
I Ointerface in mp
I Ointerface in mpI Ointerface in mp
I Ointerface in mp
 
Stack and subroutine
Stack and subroutineStack and subroutine
Stack and subroutine
 
Ch8 (1) morris mano
Ch8 (1) morris manoCh8 (1) morris mano
Ch8 (1) morris mano
 
Key board interface
Key board interface Key board interface
Key board interface
 
T imingdiagram
T imingdiagramT imingdiagram
T imingdiagram
 
5.6 Basic computer structure microprocessors
5.6 Basic computer structure   microprocessors5.6 Basic computer structure   microprocessors
5.6 Basic computer structure microprocessors
 
Computer organisation
Computer organisationComputer organisation
Computer organisation
 
8279nptel
8279nptel 8279nptel
8279nptel
 
Sequential Logic Circuits
Sequential Logic CircuitsSequential Logic Circuits
Sequential Logic Circuits
 
Basic Computer Organization and Design
Basic  Computer  Organization  and  DesignBasic  Computer  Organization  and  Design
Basic Computer Organization and Design
 
05 instruction set design and architecture
05 instruction set design and architecture05 instruction set design and architecture
05 instruction set design and architecture
 
8279 d
8279 d8279 d
8279 d
 
8279 PKDI
8279 PKDI8279 PKDI
8279 PKDI
 
Lect11 organization
Lect11 organizationLect11 organization
Lect11 organization
 
Microcontroller part 4
Microcontroller part 4Microcontroller part 4
Microcontroller part 4
 
B.sc cs-ii-u-3.2-basic computer programming and micro programmed control
B.sc cs-ii-u-3.2-basic computer programming and micro programmed controlB.sc cs-ii-u-3.2-basic computer programming and micro programmed control
B.sc cs-ii-u-3.2-basic computer programming and micro programmed control
 
Addressing modes (detailed data path)
Addressing modes (detailed data path)Addressing modes (detailed data path)
Addressing modes (detailed data path)
 
A-LOOP: AMP system: 2-cores ARM Cortex A9/Linux OS and 4-cores Leon3/Linux OS...
A-LOOP: AMP system: 2-cores ARM Cortex A9/Linux OS and 4-cores Leon3/Linux OS...A-LOOP: AMP system: 2-cores ARM Cortex A9/Linux OS and 4-cores Leon3/Linux OS...
A-LOOP: AMP system: 2-cores ARM Cortex A9/Linux OS and 4-cores Leon3/Linux OS...
 

Ähnlich wie Files 3-handouts lecture-12

Assembly Language Lecture 2
Assembly Language Lecture 2Assembly Language Lecture 2
Assembly Language Lecture 2Motaz Saad
 
Part III: Assembly Language
Part III: Assembly LanguagePart III: Assembly Language
Part III: Assembly LanguageAhmed M. Abed
 
Introduction to Processor Design and ARM Processor
Introduction to Processor Design and ARM ProcessorIntroduction to Processor Design and ARM Processor
Introduction to Processor Design and ARM ProcessorDarling Jemima
 
Introduction of 8086 micro processor .
Introduction of 8086 micro processor .Introduction of 8086 micro processor .
Introduction of 8086 micro processor .Siraj Ahmed
 
Brief description of all the interupts
Brief description of all the interuptsBrief description of all the interupts
Brief description of all the interuptsSHREEHARI WADAWADAGI
 
Assembly lab up to 6 up (1)
Assembly lab up to 6 up (1)Assembly lab up to 6 up (1)
Assembly lab up to 6 up (1)ilias ahmed
 
Vintage Computing Festival Midwest 18 2023-09-09 What's In A Terminal.pdf
Vintage Computing Festival Midwest 18 2023-09-09 What's In A Terminal.pdfVintage Computing Festival Midwest 18 2023-09-09 What's In A Terminal.pdf
Vintage Computing Festival Midwest 18 2023-09-09 What's In A Terminal.pdfRichard Thomson
 
Pai unit 1_l1-l2-l3-l4_upload
Pai unit 1_l1-l2-l3-l4_uploadPai unit 1_l1-l2-l3-l4_upload
Pai unit 1_l1-l2-l3-l4_uploadYogesh Deshpande
 
Assembly Language Paper.docx
Assembly Language Paper.docxAssembly Language Paper.docx
Assembly Language Paper.docxwrite22
 
Arm device tree and linux device drivers
Arm device tree and linux device driversArm device tree and linux device drivers
Arm device tree and linux device driversHoucheng Lin
 
Instruction codes and computer registers
Instruction codes and computer registersInstruction codes and computer registers
Instruction codes and computer registersmahesh kumar prajapat
 
Assembly Language for Intel-Based Computers
Assembly Language for Intel-Based ComputersAssembly Language for Intel-Based Computers
Assembly Language for Intel-Based ComputersDanielPineda771524
 
Microprocessor (1)
Microprocessor (1)Microprocessor (1)
Microprocessor (1)Muhd Azlan
 
8086 MICROPROCESSOR
8086 MICROPROCESSOR8086 MICROPROCESSOR
8086 MICROPROCESSORAlxus Shuvo
 
Buffer Overflow - Smashing the Stack
Buffer Overflow - Smashing the StackBuffer Overflow - Smashing the Stack
Buffer Overflow - Smashing the StackironSource
 

Ähnlich wie Files 3-handouts lecture-12 (20)

Assembly Language Lecture 2
Assembly Language Lecture 2Assembly Language Lecture 2
Assembly Language Lecture 2
 
Part III: Assembly Language
Part III: Assembly LanguagePart III: Assembly Language
Part III: Assembly Language
 
8086 architecture
8086 architecture8086 architecture
8086 architecture
 
Introduction to Processor Design and ARM Processor
Introduction to Processor Design and ARM ProcessorIntroduction to Processor Design and ARM Processor
Introduction to Processor Design and ARM Processor
 
Introduction of 8086 micro processor .
Introduction of 8086 micro processor .Introduction of 8086 micro processor .
Introduction of 8086 micro processor .
 
Pentium processor
Pentium processorPentium processor
Pentium processor
 
Brief description of all the interupts
Brief description of all the interuptsBrief description of all the interupts
Brief description of all the interupts
 
Assembly lab up to 6 up (1)
Assembly lab up to 6 up (1)Assembly lab up to 6 up (1)
Assembly lab up to 6 up (1)
 
Vintage Computing Festival Midwest 18 2023-09-09 What's In A Terminal.pdf
Vintage Computing Festival Midwest 18 2023-09-09 What's In A Terminal.pdfVintage Computing Festival Midwest 18 2023-09-09 What's In A Terminal.pdf
Vintage Computing Festival Midwest 18 2023-09-09 What's In A Terminal.pdf
 
Pai unit 1_l1-l2-l3-l4_upload
Pai unit 1_l1-l2-l3-l4_uploadPai unit 1_l1-l2-l3-l4_upload
Pai unit 1_l1-l2-l3-l4_upload
 
Assembly Language Paper.docx
Assembly Language Paper.docxAssembly Language Paper.docx
Assembly Language Paper.docx
 
Arm device tree and linux device drivers
Arm device tree and linux device driversArm device tree and linux device drivers
Arm device tree and linux device drivers
 
Instruction codes and computer registers
Instruction codes and computer registersInstruction codes and computer registers
Instruction codes and computer registers
 
Assembly Language for Intel-Based Computers
Assembly Language for Intel-Based ComputersAssembly Language for Intel-Based Computers
Assembly Language for Intel-Based Computers
 
Microprocessor (1)
Microprocessor (1)Microprocessor (1)
Microprocessor (1)
 
8086 MICROPROCESSOR
8086 MICROPROCESSOR8086 MICROPROCESSOR
8086 MICROPROCESSOR
 
amba.ppt
amba.pptamba.ppt
amba.ppt
 
amba.ppt
amba.pptamba.ppt
amba.ppt
 
amba (1).ppt
amba (1).pptamba (1).ppt
amba (1).ppt
 
Buffer Overflow - Smashing the Stack
Buffer Overflow - Smashing the StackBuffer Overflow - Smashing the Stack
Buffer Overflow - Smashing the Stack
 

Mehr von Muhammad Aamir Rakhshani (20)

Tb writing book(1)
Tb writing book(1)Tb writing book(1)
Tb writing book(1)
 
Short reports
Short reportsShort reports
Short reports
 
Sentence structure
Sentence structureSentence structure
Sentence structure
 
Sentence structure
Sentence structureSentence structure
Sentence structure
 
Sentence structure
Sentence structureSentence structure
Sentence structure
 
Resume writing ppt
Resume writing ppt Resume writing ppt
Resume writing ppt
 
Report writing
Report writing Report writing
Report writing
 
Report writing (short version)
Report writing (short version)Report writing (short version)
Report writing (short version)
 
Oral presentation skills
Oral presentation skillsOral presentation skills
Oral presentation skills
 
Long reports
Long reportsLong reports
Long reports
 
Letterwriting types
Letterwriting typesLetterwriting types
Letterwriting types
 
Letter writing
Letter writingLetter writing
Letter writing
 
Letter writing(1)
Letter writing(1)Letter writing(1)
Letter writing(1)
 
Itroductions
ItroductionsItroductions
Itroductions
 
Guidelines
GuidelinesGuidelines
Guidelines
 
Grammar sentence-structure
Grammar sentence-structureGrammar sentence-structure
Grammar sentence-structure
 
Fs 10.2 how to write a cover letter
Fs 10.2 how to write a cover letterFs 10.2 how to write a cover letter
Fs 10.2 how to write a cover letter
 
English 2(buiseness and technical writing)
English 2(buiseness and technical writing)English 2(buiseness and technical writing)
English 2(buiseness and technical writing)
 
English 2 slides
English 2 slidesEnglish 2 slides
English 2 slides
 
Downward communication
Downward communicationDownward communication
Downward communication
 

Kürzlich hochgeladen

Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Infrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsInfrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsYoss Cohen
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...BookNet Canada
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Jeffrey Haguewood
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFMichael Gough
 
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...Karmanjay Verma
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 

Kürzlich hochgeladen (20)

Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Infrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsInfrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platforms
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDF
 
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 

Files 3-handouts lecture-12

  • 1. Lecture on MS-DOS Functions and BIOS Calls Application Program Command Processor COMMAND.COM MS-DOS Kernel MSDOS.SYS BIOS ROM pulse IO.SYS System Hardware • BIOS is hardware specific • BIOS is supplied by the computer manufacturer • Resident portion which resides in ROM and nonresident portion IO.SYS which provides a convenient way of adding new features to the BIOS
  • 2. 80x86 Interrupts • An interrupt is an event that causes the processor to suspend its present task and transfer control to a new program called the interrupt service routine (ISR) • There are three sources of interrupts – Processor interrupts – Software interrupts – Hardware interrupts • Each interrupt must supply a type number which is used by the processor as a pointer to an interrupt vector table (IVT) to determine the address of that interrupt’s service routine
  • 3. 80x86 Interrupts • Each entry in the IVT points to the location of the corresponding ISR. • Before transferring control to the ISR, the processor performs one very important task – It saves the current program address and flags on the stack – Control then transfers to the ISR – When the ISR finishes, it uses the instruction IRET to recover the flags and old program address from the stack • Many of the vectors in the IVT are reserved for the processor itself and others have been reserved by MSDOS for the BIOS and kernel. – 0 – 1F are used by the BIOS – 20 – 3F are used by the MS-DOS kernel
  • 4. Interrupts • There are some extremely useful subroutines within BIOS or DOS that are available to the user through the INT (Interrupt) instruction. • The INT instruction is like a FAR call; when it is invoked – It saves CS:IP and flags on the stack and goes to the subroutine associated with that interrupt. – Format: INT xx ; the interrupt number xx can be 00-FFH – This gives a total of 256 interrupts – Two of them are widely used: INT 10H and INT 21H – Before the services of INT 10H and 21H is requested, certain registers must have specific values in them, depending on the function being requested.
  • 5. INT 10H • INT 10H subroutines are burned into the ROM BIOS of the 80x86-based PC and are used to communicate with the computer’s screen Cursor Locations • INT 10H Function 06 – AL = number of lines to scroll (with AL=00, window will be cleared) – BH = attribute of blank rows – CH, CL = upper row, left column – DH, DL = lower row, right column
  • 6. INT 10H INT 10H function 02; setting the cursor to a specific location – Function AH = 02 will change the position of the cursor to any location. – The desired cursor location is in DH = row, DL = column EX. Write a program that clears the screen and sets the cursor at the center of the screen ; clearing the screen MOV AX, 0600H ;scroll the entire page MOV BH, 07 ; normal attribute (white on black) MOV CX, 0000 ; upper left MOV DX,184FH ; lower right INT 10H ;setting the cursor at the center MOV AH,02 ; set cursor option MOV BH, 00 ; page 0 MOV DL, 39 ; MOV DH, 12 ; INT 10H
  • 7. INT 10H • INT 10H function 03; get current cursor position MOV AH, 03 MOV BH, 00 INT 10H Registers DH and DL will have the current row and column positions and CX provides info about the shape of the cursor.
  • 8. INT 21H • INT 21H is provided by DOS to be invoked to perform extremely useful functions. • INT 21H Option 09: Outputting a string of data to the monitor – Can be used to send a set of ASCII data to the monitor. – AH = 09; DX = offset address of the ASCII data to be displayed. – Display the ASCII data string pointed to by DX until “$”. DATA_ASC DB ‘The earth is one country’,’$’ MOV AH,09 MOV DX, OFFSET DATA_ASC INT 21H
  • 9. INT 21H • INT 21H Option 02: Outputting a single character to the monitor – DL is loaded with the character first MOV AH 02 MOVE DL,’J’ INT 21H • INT 21H Option 01: Inputting a single character with echo – This function waits until a character is input from the keyboard, then echoes it to the monitor. After the interrupt, the input character will be in AL.
  • 10. INT 21H • INT 21H Option 0AH: Inputting a string of data from the keyboard with echo – AH = 0AH – DX = offset address at which the address is stored – First byte specifies the size of the buffer, second byte is the number of characters ORG 0010H DATA1 DB 6,?,6 DUP(FF) MOV AH, 00H MOV DX, OFFSET DATA1 INT 21H Ex. What happens if one enters USA and then <RETURN> 0010 0011 0012 0013 0014 0015 0016 0017 06 03 55 53 41 0D FF FF