Other
Q: Suppose that a cache is 20 times faster than main memory and cache memory can be used 80% of the tim...
A: Given data, The cache in the system is 20 times faster than main memory. Cache memory can be used 80...
Q: Convert the following decimal numbers to binary: 11 65 100 255
A: The answer is
Q: line code fragment detailed model runtime 1 def horner (A,n,x): 2 result = A[n] 3 i = n - 1 21,+1+T.
A: Horner’s Method for Polynomial Evaluation First calculate xn, multiply the value with cn, repeat th...
Q: is caused by bad array indexes.
A: IOException - It occurs when the user inputs improper data into the program. ArithmeticException - I...
Q: Discuss how computer technology may help sectors including education, restaurants, shopping malls, a...
A: Here is the answer to the above question.
Q: 2- Write a C++ program to ask the user to enter his/her first and second name. After that, ask them ...
A: 2.
Q: the A* Search and give an example.
A: what is A* search algorithm?A* search algorithm is one of the first-rate and popular technique utili...
Q: 1. Use Karnaugh Maps to simplify the following Boolean Expressions c) F=ABC+ABC+ABC+ABC+ABC+ABC d) F...
A: Solving the given expression using K-map.
Q: What's the difference between a hacktivist and a cyberterrorist, in your opinion? Should a country's...
A: let us see the answer in detail. Hacktivism is the nonviolent use of illegal or legally ambiguous ...
Q: Find out whether your school library has computers and if so, whether they are workstations or termi...
A: 84.9 percent of students said that school library computers assist them in completing their schoolwo...
Q: Other name of DIVX is _______________ Express.
A: Given fill in the blank question wants other name of divx.
Q: Define in your own words: Intelligence Artificial intelligence Agent Rationality Logical reasoning
A: To Do: To define the terms
Q: Which among the following is true? Select one: O a. The private members can be accessed only by the ...
A: Access specifiers in a programming language defines the scope of a function, variable, constructor o...
Q: Using eight bits representation, perform subtraction on the give numbers using the 2's complement of...
A: To find subtraction of 2 8-bit binary number, follow the below steps:-Step 1- find the 8-bit binary ...
Q: Question 8: Which button class is used to create a large button? .btn-l .btn-xl .btn-lg .btn-l...
A: To be determine: Select right option
Q: MS Office that saves the document automatically after certain interval?
A: A feature of MS Word that saves the document automatically after certain interval is available on Sa...
Q: Mobile networks are solely wireless when it comes to the air interface between phones and antennas a...
A: The Back haul Network connects cell phone tower air interfaces to fixed line networks, which are sub...
Q: What is The Compressed form of Computer Aided Software Engineering?
A: This question wants compression of Computer Aided Software Engineering.
Q: Data processing and also write the Data processing steps? Own words
A: Given Data processing and also write the Data processing steps? Own words
Q: Which of this keyword can be used in a subclass to call the constructor of superclass? Select one: O...
A: The correct answer is option "b" super Explanation: ==> The extent keyword is invalid. ==> The...
Q: What is a seminar organizer system's non-functional requirement?
A: NON-FUNCTIONAL REQUIREMENT shows an item contraption consistency property. They evaluate the PC syst...
Q: 3- Suppose the cell A1 contain the today date, write suitable formula by that create the fallowing t...
A: Required: Suppose the cell A1 contain the today date, write suitable formula by that createthe fallo...
Q: DL code for designing (2-to-1) 1-bit Multiplexer us
A: Q.
Q: wo methods have same name but different parameter list then it is called elect one: a. Operator over...
A: Method overriding means giving a new definition to a pre existing method. This makes option (c) inc...
Q: Discuss the 10 software industry issues and their benefits/drawbacks.
A: Building a high-quality product is the end goal for any organization, but the software development p...
Q: Describe how certain online behaviors may make you more vulnerable to online victimization. Is the i...
A: Victimization is that someone is unjustly treated or made to feel as if they are in a wrong situatio...
Q: Discuss the different conversion method used when conversion to a new system. Under which circumstan...
A: Discuss the different conversion methods used when converting to a new system. so there are 5 types ...
Q: Sometimes a number is the same when you read it from front to back and from back to front. Two easy ...
A: GIVEN: Sometimes a number is the same when you read it from front to back and from back to front. Tw...
Q: Line code Detailed Model Runtime 1 i = 0 ? 2 while i < n: ? 3 k += 1 ? 4 i += 1 ? Total: ?
A: Tf T+ Ts T< In the above example time taken for initializing variables i=1, result =0 is Ts + Tf...
Q: Question#1: What is the output of the following programs? a) 1 Dim number1 As Integer =9 2 Dim numbe...
A: 1) Above program defines three variables number1 as integer and assign value 9 to it. number2 as do...
Q: Find the error in each of the following subcode segments, and explain how to correct it: 2.
A: As per answering guidelines, solving first 3 question. 1. Here the return datatype of each function...
Q: One of the most essential factors to consider when buying a PC in today's age of rapidly evolving co...
A: We need to find why the provision for self-upgradability is the most essential factor to consider wh...
Q: Complete the python code Find the mean, median, and mode of the column wt. Print the mean, median, ...
A: Here You haven't given data for the mtcars.csv file. so I have created this CSV file with dummy data...
Q: Write a for loop that will display 5 times the sentence The number of repetitions of this sentence i...
A: I have provided c++ code for given question.
Q: A- Write a program to input 5 numbers and then find its half
A: NOTE: Since the question doesn't mention the programming language use to code the program so I am us...
Q: A. Write a program in FORTRAN 90 to compute the value of s from the series below: s = x + x2 + x3+ +...
A: I have provided Fortan 90 code to find the sum of series for different values of x.
Q: Suppose that an algorithm has runtime 20 n3 for n 100, the slowest cases for each n take time 2 n2 l...
A: The question is on: finding worst-case runtime and average case runtime of the given algorithm.
Q: A C:\WINDOWS\system32\cmd.exe Enter the score for test 1: 95.4 Enter the score for test 2: 100 Enter...
A: CODE:- #include<iostream>using namespace std; int main(){ float mark[5]; int i...
Q: Question 1: The following algorithm takes an unsorted array of integer numbers as input and sorts i...
A: - According to the guidelines we can be engaged with only the first question. Kindly ask the remaini...
Q: If you want to expand the size of vector in the end, what is the correct command in MATLAB? by Z-[Z ...
A: y is a row vector and y' will be a column vector and thus y' can't be appended to row vector and thu...
Q: Design a protocol by which two mutually suspicious parties can authenticate each other. Your protoco...
A: Kerberos gives a unified verification worker whose capacity is to confirm clients to workers and wor...
Q: Write a program that find the output of F(x) sin(x)-x'| and x is read from the keyboard. Then print ...
A: The problem above does not mention any specific programming language to be used, so we have solved i...
Q: Please do 1NF, 2NF and 3NF for this question
A: A. The given relation is in 1NF since none of the attribute is multi valued attribute.
Q: Contrast the waterfall process model with a cross functional team (working in short development burs...
A: In general, when COVID-19 spread in Israel (February 2020), the government implemented a combination...
Q: nges the elements of x in order from the smallest to the larg
A:
Q: What will be the output of the following Java program? class dynamic_ initialization public static v...
A: Here in this question we have given a Java program.and we have asked to find the output of the progr...
Q: Write a program that computes and prints the value of the series f(x) using the following formula: x...
A: Since no programming language is mentioned, I am using python. Algorithm: Start Read X value Initia...
Q: ative cache r e blocks (0- ocks (0-127 nt in the cac of memory
A:
Q: Which of the following is a valid declaration of an object of class Box? Select one: O a. new Box ob...
A: In Java, Correct object declaration is class_name object_name = new class_name ();
Fill in the blanks:
Q. Other name of HTX is _______________ Expansion.
Step by step
Solved in 2 steps
- Which of the following are present in C but not in Assembly? A. A distinction between 32-bit numbers like int and 16-bit numbers like short B. Operations like multiplication and modulo C. The ability to store values directly or by addresses D. A distinction between (int *) and (short *)Write a general-purpose program that is able to add two 8 bytes length numbers. Numbers are saved in EBX: EAX and EDX: ECX Consider this sample call: Number1 QWORD = 1234567898765432h Number2 QWORD = 1234567898765432h Please write code in Masm (Microsoft assembly) No High-Level Assembly. And please don't separate the variables, keep it as it is. If you do split it please do it in the code part. If possible please use 1 loop anything more than inc, dec, mov, xchg, I don't know how to do that yet.you can use either vim or nano as text editor Implement the following code in ARM on Raspberry Pi, compile and run. g=12, h=8, i=2, j=5; f = (g + h) - (i + j); Your program displays the message: f = (g + h) – (i + j) = 13 Note: answer should be calculated not hardcoded
- I ran the updated code that you provide with li $v0, 34 for printing an unsigned integer. I got an error saying: Unknown system call: 34 This the the updated code that you provided: .data .globl main .textmain: # compute the next state of the LFSR for each input state li $a0, 0x00000001 jal lfsr_next_state move $t0, $v0 li $a0, 0xdeadbeef jal lfsr_next_state move $t1, $v0 li $a0, 0x200214c8 jal lfsr_next_state move $t2, $v0 li $a0, 0x00000000 jal lfsr_next_state move $t3, $v0 # print the output states li $v0, 34 # set system call for printing unsigned integer move $a0, $t0 syscall move $a0, $t1 syscall move $a0, $t2 syscall move $a0, $t3 syscall # exit the program li $v0, 10 syscall # Function to compute the next state of an LFSR# Input parameter: $a0 = current state# Output: $v0 =…Design a Read Only Memory (ROM) to implement the following, A097803, polynomial A=3(2x2 +1), with input (x): 0≤(x)≤7 (a) What is the size of the initial (unsimplified) ROM ? (b) What is the size of the final (simplified) ROM ? (c) Show in detail the final ROM layout, using LogiSim.can you do letter C using Logisim APPthank you!use nano as text editor --> provide the file or screenshot so I can see my problem Implement the following code in ARM on Raspberry Pi, compile and run. g=12, h=8, i=2, j=5; f = (g + h) - (i + j); Your program displays the message: f = (g + h) – (i + j) = 13 Note: answer should be calculated not hardcoded
- Write programs that will accomplish the desired tasks listed below, using as few lines of code as possible e) Divide the data in RAM location 3EH by the number 12H ; put the quotient in R4 and the remainderin R5.f) Divide the data in RAM location 15H by the data in RAM location 16H ; put the quotient inexternal RAM location 7CH and the remainder in in external RAM location 7DH.g) Double the number in register R2, and put the result in register R3 (high byte) and R4 (low byte).Use logic operations.h) OR the contents of ports 1 and 2 ; put the result in external RAM location 0100Hi) Set Port 0, bits 1, 3, 5 and 7 to one, set the rest to zero.j) Clear bit 3 of RAM location 22H without affecting any other bit.k) Invert the data on the port 0 pins and write the data to port 1.#include <stdio.h> #include <stdint.h> #include "qutyio.h" // Ex E3.0 // // In this week's tutorial we used some functions from a library // "qutyio.h" and from the <stdio.h> library to output data via // the serial interface. This can be a useful tool for debugging // your programme. To use the serial interface you first need to // initialise the required hardware by calling "serial_init()"; // this only needs to be done once at the beginning of your // programme. After this, you can use the function printf() from // <stdio.h> to output formatted strings via the serial interface. // // You will need to use printf() in few different ways in this // extension exercise: // // printf("foo") - prints the word 'foo' to the serial output. // printf("bar") - prints the word 'bar' to the serial output. // printf(" ") - prints a space to the serial output. // printf("%02X", x) - prints the 8-bit integer 'x' to the // serial output, formatted as two…Was there a significant difference between entering a memory cell with a value of 5 and entering a memory cell with an 8? cell number 6 and the 5 value to cell number 6? cell number 6 and the 5 value to cell number 6?
- need a new java .asm file and fill it with all of the required directives. Next, write a program that does the following: Create two variables with any names and initial values. One must be type "DWORD" and the other must be type "SBYTE". Set the value of the EAX and EBX registers to any numbers of your choice. Add EAX to your DWORD variable. The result should remain in the variable (not the register). Add EBX to your DWORD variable. The result should remain in the variable. Set the value of the CL register to any number of your choice (since it is only byte sized the upper limit for the number is 255) Subtract the CL register from your SBYTE variable three times. The result should remain in the variable. You can debug your program to verify that the arithmetic is performed correctly.I cant debug the code sucessfully there was a problem in the div ebx line please change the code to make it work, Im not sure what to do anymore the goal is to make a GCD greatest common divisor algorithm please rewrite it in following assembly coding INCLUDE Irvine32.inc .datamsg1 BYTE "Enter two integers: ",0msg2 BYTE "The GCD is ",0numberOne SDWORD ?numberTwo SDWORD ?remainder DWORD ? .codemain PROCcall Clrscrmov ecx,5 L1:call Integerscall GCDcall Displayloop L1 exitmain ENDP Integers PROCmov edx, OFFSET msg1call WriteString call readIntmov numberOne, eax call readIntmov numberTwo, eax call Crlfret Integers ENDP GCD PROCmov eax,numberOnemov ebx,eaxsar ebx,31add eax, ebxxor eax, ebxmov numberOne,eax mov eax,numberTwomov ebx,31add eax, ebx mov numberTwo,eax L2:mov eax,numberOnemov edx,0mov ebx,numberTwodiv ebx mov edi,numberTwomov numberOne,edi mov edi,remaindermov numberTwo,edi cmp numberTwo,0 jb L3loop L2 L3:mov eax,numberOneret GCD ENDP Display PROCcall WriteStringcall…NASM PROGRAM FOLLOWING THE CODE BELOW, modify it Write an assembly program for the family propcessor x86 in order to transform a temperature from the Celsius scale to the Fahrenheit scale according the transformation below; F=1.8*C +32 Use arithmetic of real numbers for the evaluation of the formula and get the result with two digit of precision in the decimal part. Insert the input by using the keyboard and show the output on the console. section .textglobal mainextern printfextern scanf section .datamessage: db "The temperture in Fahrenheits: %d.", 0msg2: db "%d", 10, 0request: db "Enter a temperature in Celsius: ", 0celsius: times 4 db 0 ; 32-bits integer = 4 bytesreminder: times 4 db 0 formatin: db "%d", 0 main:; Ask for an integerpush requestcall printfadd esp, 4 ; remove the parameter push celsius ; address of integer1, where the input is going to be stored (second parameter)push formatin ; arguments are right to left (first parameter)call scanfadd esp, 8 ;…