1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kolbaska11 [484]
3 years ago
12

Explain the function of different flags in the 8086​

Computers and Technology
1 answer:
posledela3 years ago
5 0

Answer:

A flag is a piece of fabric (most often rectangular or quadrilateral) with a distinctive design and colours. It is used as a symbol, a signalling device, or for decoration.8086 has 16-bit flag register, and there are 9 valid flag bits.The FLAGS register is the status register in Intel x86 microprocessors that contains the current state of the processor. This register is 16 bits wide. Its successors, the EFLAGS and RFLAGS registers, are 32 bits and 64 bits wide, respectively. The wider registers retain compatibility with their smaller predecessors.

You might be interested in
What, if anything, is returned by the method call rearrange ("apple")?
Otrada [13]

Answer:

\boxed{E} \to  \boxed{nothing \: is \: returned \: due \: to \: run \: tie \: error}

7 0
3 years ago
Among the many DTP software tools available today, which is regarded as the industry standard for DTP?
nexus9112 [7]

Answer:

bland1 InDesign    Blank2 typesetting

Explanation:

4 0
4 years ago
Read 2 more answers
Kiko loves to surf the internet and check on different websites. One day he received an email from unknown source. When he opens
Angelina_Jolie [31]

He experienced phishing

Phishing is a method of trying to gather personal information using deceptive e-mails and websites.

Here are some measures to avoid phishing. You can pick up the one you liked the most

  • Always check the spelling of the URLs in email links before you click or enter sensitive information
  • Watch out for URL redirects, where you're subtly sent to a different website with identical design
  • If you receive an email from a source you know but it seems suspicious, contact that source with a new email, rather than just hitting reply.
  • Don't post personal data, like your birthday, vacation plans, or your address or phone number, publicly on social media
5 0
3 years ago
What is the general term for programs that act without a user’s knowledge and deliberately alter the computer’s operations?
noname [10]

Answer:

Malware, short for malicious software, consists of programs that act without a user's knowledge and deliberately alter the operations of computers and mobile devices

Explanation:

7 0
3 years ago
Binary divide 1101011 by 111​
denis-greek [22]

is this computer subject

5 0
3 years ago
Read 2 more answers
Other questions:
  • Write a switch statement that tests the value of the char variable response and performs the following actions: if response is y
    9·1 answer
  • What is an example of CT SO?
    9·1 answer
  • Whats the best way to get into a computers programming to get past firewalls
    15·2 answers
  • When sending an email to work colleagues you should NOT use ____________.
    8·1 answer
  • Interface elements include but are not limited to:
    8·1 answer
  • When should you stop where you are, drop to the
    11·1 answer
  • guys look at this https://brainly.com/app/profile/17971193/answers i need help and tips to get this cute girl to give me her num
    14·2 answers
  • ______ controls are information security safeguards that focus on the application of modern technologies, systems, and processes
    12·1 answer
  • What is the role of UPS in Computer security?<br>4 marks answer​
    12·1 answer
  • Why are women more exposed to mass media?
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!