Assembly Language Operations: 16-bit and 32-bit Processing

Bit Multiplication

1. Move the 16-bit value at memory address 3000 to AX.

MOV AX, [3000] loads the 16-bit value from memory address 3000 into the AX register.

2. Move the 16-bit value at memory address 3002 to BX.

MOV BX, [3002] loads the 16-bit value from memory address 3002 into the BX register.

3. Multiply AX by BX.

MUL BX performs the multiplication of AX and BX. The result is a 32-bit product in the DX:AX register pair, where DX holds the high word and AX holds the low word.

4. Move the low word of

Read More

Proxy Servers and Caching: Enhance Network Efficiency

Proxy Servers: Centralizing Internet Traffic

A proxy server centralizes traffic between the internet and a local network. This way, each computer on your local network does not need a direct internet connection. It is used to control unauthorized access from the internet to the local network.

How Does It Work?

The proxy transforms input and output directions. When a local network computer makes a web application request, the proxy intercepts and processes it. This hides the real IP address of the computer

Read More

Euclid’s Algorithm and Convex Hull Computation

Euclid’s Algorithm for Finding the Greatest Common Divisor

Euclid’s algorithm is an efficient method for finding the greatest common divisor (GCD) of two integers. The GCD of two numbers a and b is the largest integer that divides both a and b without leaving a remainder.

Steps of Euclid’s Algorithm

  • Base Case: If b=0, then GCD(a,b)=a.
  • Recursive Step: If b≠0, replace a with b and b with a mod b (the remainder when a is divided by b).
  • Repeat the process until b=0, at which point a is the GCD.

Algorithm

	Read More
	

C# Code Snippets: Common Tasks and Best Practices

Reflection and Type Information

D.

Type t = Type.GetType("CompanyClass");
MethodInfo m = t.GetMethod("MyMethod");
int i = (int)m.Invoke(this, new object[] { 1 });

D. Call the IsFamily property of the MethodInfo class.

Culture-Specific Formatting

B.

NumberFormatInfo culture = new CultureInfo("zh-HK").NumberFormat;
culture.CurrencyNegativePattern = 1;
return numberToPrint.ToString("c", culture);

A.

DateTimeFormatInfo dtfi = new CultureInfo("es-MX", false).DateTimeFormat;
DateTime dt = new DateTime(DateTime.
Read More

Database Management Systems: Concepts and Best Practices

Key Definitions

  • Data: Information that a computer stores and records.
  • Record: Discrete piece of information in a register.
  • Registration: Information related to a product, event, or person.
  • File or Data File: A collection of related information, stored like a file. A file is a set of records.
  • Query: The search for a specific record or a request to select records that meet a set of criteria. There are select, delete, table creation, and update queries.
  • Report: Ordered list of selected fields and records
Read More

Software Development: From Requirements to Deployment

Requirements Engineering Process: Key Steps

Requirements Elicitation

  • Purpose: To gather requirements from stakeholders.
  • Activities:
    • Conduct interviews, surveys, and workshops.
    • Observe existing systems or workflows.
    • Develop use cases and scenarios to understand functional requirements.
  • Importance: Ensures all user and system requirements are identified early.
  • Challenges:
    • Ambiguity: Requirements like “user-friendly” are unclear.
    • Conflicts: Stakeholders may have differing priorities.
  • Resolution: Use structured
Read More