Solved

A full list/document of all C and ASM functions and limitations

Posted on 1999-01-21
4
237 Views
Last Modified: 2010-04-15
I am looking for good infomation about C programing and ASM programing...Already have the DJGPP kit.  But a document that supplies all/most infomation on C and ASM
0
Comment
Question by:dac0w
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
4 Comments
 
LVL 10

Accepted Solution

by:
viktornet earned 70 total points
ID: 1258296
Download this file and you'll have perfect help on ASM, and C/C++'s all functions... and lots more,...hardware, and some other stuff also...

http://sunsite.lanet.lv/ftp/mirror/x2ftp/msdos/programming/docs/helppc21.zip

-Viktor
--Ivanov
0
 

Author Comment

by:dac0w
ID: 1258297
thanx, exactly what i was looking for !
0
 
LVL 10

Expert Comment

by:viktornet
ID: 1258298
No problem :)
0
 
LVL 10

Expert Comment

by:viktornet
ID: 1258299
btw- How old are you?
0

Featured Post

Technology Partners: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
memory leak detection 9 111
How to issue a linefeed, pause, and clear screen in UNIX enviroment 3 85
Memory going from 12gb to 64gb or 96gb. worth it? 15 222
Fill Null values 5 54
This tutorial is posted by Aaron Wojnowski, administrator at SDKExpert.net.  To view more iPhone tutorials, visit www.sdkexpert.net. This is a very simple tutorial on finding the user's current location easily. In this tutorial, you will learn ho…
Examines three attack vectors, specifically, the different types of malware used in malicious attacks, web application attacks, and finally, network based attacks.  Concludes by examining the means of securing and protecting critical systems and inf…
Video by: Grant
The goal of this video is to provide viewers with basic examples to understand and use while-loops in the C programming language.
The goal of this video is to provide viewers with basic examples to understand and use conditional statements in the C programming language.
Suggested Courses

734 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question