Use 8086 assembly language by using the EMU8086 - assembler and microprocessor emulator solve the problems: Task 03 Write a program that takes an input (not from user) to check whether a year is leap year or not and print "Leap Day" Task 04
Q: >> a=[1;4;7]l; b=[2;-1;5]; >> c=dot (a,b) C = 33 >> d=cross (a, b) d = 27 6. -9 > x=a;y=Db'3; >> z=d...
A: Since you took transpose of a and b as x and y ,hence cross product is also transpose. But as dot pr...
Q: Create a function that takes the same group as number n and returns a list of two numbers from the a...
A: Step 1 : Start Step 2 : Define a function two_product() which accepts a list and a number n as param...
Q: What type of impact will artificial intelligence have in the future? What artificial intelligence-ba...
A: Introduction: The use of computerized reasoning: Artificial intelligence (AI) is a field of study wh...
Q: As a result of technological improvements, the vast majority of today's appliances are wirelessly en...
A: Introduction: Wireless data transfers are used to connect network nodes in Wi-Fi networks. Wireless ...
Q: In the future, what kind of calculations will be carried out totally by artificial intelligence led ...
A: Introduction: Artificial intelligence is capable of computing endlessly.
Q: Write a class called Name that has one instance variable to store the full name of a person. A name ...
A: public class Main{ public static void main(String[] args) { Name name = new Name(" Bartleby Expert...
Q: - Encrypt the plaintext message GOLD MEDAL using the RSA algorithm with key (2561,3).
A: The Answer is given below step.
Q: What was the process that led to the term "spool" being applied to printer output?
A: Introduction What was the process that led to the term "spool" being applied to printer output? ...
Q: 1. Solve T(n) - k T(n/3) + n where T(1) - 0. Note your solution will be a function of k. You need to...
A: Given questions are not interlinked. So, as per our guidelines only one question will be answered. S...
Q: Brieefly explains the multi-threading idea in Java. Please provide an execution diagram demonstratin...
A: Intro Concept of multi-threading in java. Execution diagram context switching between the main thr...
Q: Solve the problem in C++ (Financial application: compute the future investment value) Write a func...
A: #include <iostream>#include <math.h>using namespace std; double futureInvestmentValue(do...
Q: nent Analysis and Confirmator Factor Analysis? How each analysis differs to achieve that goal?
A: given - What is the common goal of Principal Component Analysis and Confirmator Factor Analysis? How...
Q: How can you make Internet Explorer operate in Standards mode?
A: Introduction: Actually, the internet is a global network of computers that works much like the posta...
Q: Network maintenance is an important task in organizations today who entirely rely on their network i...
A: In the third раrty mаintenаnсe (TРM) industry, netwоrk mаintenаnсe is essentiаlly whаt y...
Q: 2. Given the following format for the "Date" Bits 9-15 year Bits 5-8 month Bits 0-4 day Set the year...
A: Find the answer with calculation given as below :
Q: Which of the following statements are true? You may select more than one answer. A penalty applies f...
A: Debugging is to run the code, step by step on a debugging tool, in order to find the exact mistake o...
Q: Identify ten computer, network, and information security attacks and analyse how each of them affect...
A: Introduction An attack is any attempt to expose, alter, disable, destroy, steal or gain information ...
Q: Display a 64-bit instruction format with 64 instructions and the remaining bits reserved for address...
A: Introduction Instruction format depicts the inward constructions (format plan) of the pieces of in...
Q: What exactly is a Linux runlevel for a particular service or application? What command allows you to...
A: Introduction: A runlevel is a mode of operation in machine operating systems that implements Unix Sy...
Q: vi. Explain the distinction between authorization and authentication in web testing.
A: Introduction: Authorization: Authorization is the process of allowing an authenticated user to acces...
Q: Many companies pay time-and-a-half for any hours worked above 40 in a given week. Write a program to...
A: the python program is an given below :
Q: converting infix to postfix 1. if you encounter an operand, append it to the output string postfixEx...
A: ope = {'(', ')','+', '-', '*', '/', '^'} associativity = {'-':1, '*':2,'+':1,'^':3, '/':2} def infi...
Q: What exactly is A. I?
A: Introduction: Artificial intelligence is really a large field of computer science that deals wi...
Q: write a pseudocode and flowchart with comments mobile Phone Packages Dialog is a Mobile Phone compa...
A: // Pseudocode to compute and display the total monthly charges for a customer Module Main // decla...
Q: Please justify your answer: Some sorting algorithms require extra space, apart from the space neede...
A: An algorithm is a set of instructions and rules that are required to complete a task. It gives a rou...
Q: What does the following error message normally mean? IndexError: list index out of range Select one:...
A: Given error:IndexError: list index out of rangelets understand this error, using an examplelet list ...
Q: 6. Give an example of a text of length n and a pattern of length m that constitutes a worst-case inp...
A: Answer: suppose if we take a text of length n with one's,and the pattern of length m which has first...
Q: Discuss how the darknet and deep web have made it more difficult to investigate and prosecute cyberc...
A: Introduction: The "darknet" is a subset of the "deep web," where the material is inaccessible throug...
Q: Write a python program with two or more functions that uses three or more paramters and arguments in...
A: Find the required code in python given as below and output:
Q: ag Layout yout Layout T Lavout
A: The Java GridLayout class is used to arrange the components in a rectangular grid. One component is ...
Q: What are the two primary advantages of Software Defined Networks versus Hardware Based Networks?
A: Introduction: SDN, or Software Defined Network, is a network management technology that allows for p...
Q: Design a non-recursive algorithm in Java that checks whether an array is a heap and determine the ti...
A: import java.util.Scanner; class Main{ static boolean Heapornot(int A[], ...
Q: Encrypt the plaintext message GOLD MEDAL using the RSA algorithm with key (2561,3).
A:
Q: How is artificial intelligence explained in caret?
A: Introduction: The caret package (short for Classification And REgression Training) contains function...
Q: Name three different color spaces and describe what each of their coordinates represent.
A: According to the question we need to name three different color spaces and describe what each of the...
Q: Draw the logic diagram of a 4-bit register with mode selection inputs S, and S„The register is to be...
A: Hold Operation : When selection input S1S0 is 00 , current value of D flip flop Qi is redirected to...
Q: What are your thoughts on cyberbullying?
A: Introduction: Bullying online can be far more emotionally draining than bullying in person.
Q: ... Pl: tA = seq + 1; P2: seq = tA; Q1: tB Q2: seq = seq+ 2; = tB;
A: Here either of the process can execute first. Also a process can be preempted by another process. T...
Q: In a right triangle, the square of one side's length equals the sum of the squares of the other two ...
A: Introduction: A C++ program that prompts the user to enter length s of three sides of a triangle and...
Q: To what extent has computer technology and its applications had an impact up to this point?
A: Given: To what extent has computer technology and its applications had an impact up to this point?
Q: public class CircleAndSphereWhileLoop 3 { public static final doubl MAX_RADIUS = 500.0; 14 %3D 15 pu...
A: In this program we have to perform a mathematics calculation for Area of circle Circumference of c...
Q: ur objectives with the help of authentication? In this section, we'll look at the advantages and dis...
A: Is it possible to achieve any of our objectives with the help of authentication
Q: How can you ensure that the pathname of the current working directory is always displayed as part of...
A: Given: How can you ensure that the pathname of the current working directory is always displayed as ...
Q: Python code for Turtle Race Write the name of the winner turtle on the screen and on the console. Ad...
A: Code : from turtle import Screen, Turtle, mainloopfrom random import randint COLORS = ['red', 'blue'...
Q: TNB Berhad is creating a new human resource system that will record its new staffs' salary payment a...
A: I'm providing the data flow diagram with explanation. I hope this will meet your requirements...
Q: SWIFT's 'smart card technology: Multiple Choice O increases the likelihood of electronic fraud. adds...
A: automates the process by which banks exchange authentication keys
Q: What are hashes? Give an example.
A: Hashing is simply the process of running data through a formula that creates a result known as a has...
Q: One of the benefits of a Hadoop installation is the high level of compute redundancy. Why is this so...
A: Introduction: One of the benefits of a Hadoop installation is the high level of compute redundancy. ...
Q: What is the distinction between an object in an object-oriented language and a variable in a structu...
A: introduction of Object-Oriented Language Object-Oriented Programming (OOP) is a programming worldvie...
Q: Explain in your own words how we initialise weights in artificial neural networks. Why are activatio...
A: Introduction Initialization techniques in Artificial Neural Network: These techniques generally prac...
Answer task 3 and task 4 please.
Step by step
Solved in 2 steps
- MICROPROCESSOR EMULATOR CODESSolve all the given task through using assembly language code for emu8086Exmaple given on the picture Task 01 Swap two numbers using ADD/SUB instructions only.Task 02 (use add, sub, mul, div)If A, B and C are 3 variables, perform the given mathematical operation• A = C + (B – A) - 2 ;Task 03 (use add, sub, mul, div)If X, Y and Z are 3 variables, then perform the given mathematical operation• Y * Y / (4 * X * Z)Task 04 (use add, sub, mul, div)Perform the following arithmetic operation: 10 * 7 / (1 - 4) + 13 + 52 – 4 *using microprocessor 8086 not c++ write a code to do the following: 1. check if the number stored in AL is a capital english number between A to Z 2. convert the capital letter in AL to a small letterComputer Science Write an assembly language program for the 8085 Microprocessor to find the smallest of the given three numbers.Input: 2230H: 3AH2231H: A3H2232H: 18HStore the result in memory location 2250H.Note: Starting Address of the Program (Mnemonic) Code: 2200H
- This is Computer Architecture! Please give a working code! You are to write a program in MIPS that computes N! using recursion. Remember N! is the product of all the numbers from 1 to N inclusive, that is 1 x 2 x 3 x (N – 1) x N. It is defined as 1 for N = 0 and is undefined for values less than 0. The programs first requests the user to input the value of N (display a prompt first so the user knows what to do). If the input value is less than 0, the program is to display “N! undefined for values less than 0” and then requests the user to input the value of N again. If the value input is non-negative, it is to compute N! using a recursive function, that is one that calls itself. PLEASE DON'T FORGET TO INCLUDE COMMENTS Since this is an assembly language program, I expect to see comments on almost every line of code in the program. Also, make the code neat: line up the command fields, the register fields, and the comment fields.The difference between the results of two calls of the time function time() is an elapsed time. Because the operating system might use the CPU for part of this time, the elapsed time might not reflect the actual time that a Python code segment uses the CPU. Browse the Python documentation for an alternative way of recording the processing time and describe how this would be done.This is Computer Architecture! Instructions: Create a MIPS program that demonstrates that the associative law fails in addition for floating point numbers (single or double precision). You only need to demonstrate it for single precision. Remember the associative law is a + (b + c) = (a + b) + c. The key is to have two of the number large (one positively and one negatively but equal in magnitude) floating point numbers and the third floating point number very small in comparison. ***Please don't forget to include comments in this code, and also include a screenshot of the program working!***
- In MARIE assembly language: / This program reads a decimal array and outputs each/ number. The array is terminated with a zero./ Add the decimal numbers and store in sum and display sum at the end. ORG 100Get, LoadI ptr / Load the number found at address ptr.Skipcond 400 / If it is a zero, we are done.Jump Outp / Otherwise, proceed with operation.HaltOutp, Output / Output the number.Load ptr / Move pointer to next number.Add OneStore ptrJump GetOne, Hex 0001ptr, Hex 10BArray, Dec 072Dec 011Dec 018Dec 010Dec 119Dec 032Dec 110Dec 019Dec 000 Sum, Dec 000ENDDevelop an x86 assembly language program that performs the following: Perform all printing with black foreground color and a yellow background color Prompt the user to enter an integer value ("Enter a value: ") Allow the user to input their value If the value is odd then print "Odd Duck!" If the value is positive then print "Positivity!" If the value is not equal to 42 then print "Not The Answer!" If the value is greater than or equal to 16 then print "More Than One Hex Digit Needed!", else print "Only One Nibble Needed!" Call the WaitMsg function before exiting the programThis is Computer Architecture! *Please show a screenshot of the code working* You are to write a program in MIPS that computes N! using recursion. Remember N! is the product of all the numbers from 1 to N inclusive, that is 1 x 2 x 3 x (N – 1) x N. It is defined as 1 for N = 0 and is undefined for values less than 0. The programs first requests the user to input the value of N (display a prompt first so the user knows what to do). If the input value is less than 0, the program is to display “N! undefined for values less than 0” and then requests the user to input the value of N again. If the value input is non-negative, it is to compute N! using a recursive function, that is one that calls itself. *please have comments in the code* You are to have your name, the assignment number, and a brief description of the program in comments at the top of your program. Since this is an assembly language program, I expect to see comments on almost every line of code in the program. Also make the…
- How to write a function (count) in assembly language to perform the following task. Generate a counter (let's say 20,000) using the function. The function should have one integer argument (in this example, 20,000). Calculate the execution time of code by using the time command and redirect the output to the counter_fun.txt file. Append the counter in an already created text file (counter_fun.txt). How to write a function in assembly language that uses recursion to generate the same counter and that performs the following tasks. Use the same function (count), but will repeatedly call the same function (recursion) to generate the counter. Calculate the execution time of code by using the time command and redirect the output to the counter_rec.txt file. Append the counter in an already created text file (counter_rec.txt). If we compare both the time, which code (function or recursion) runs efficiently and why.microprocessor 8086 P=16F877A rewrite the previous example in class board but by using INCFSZ Push the button 10 times then go to ahmet by using ( INCFSZ )Your task is to write an assembly-language program that finds the most frequently occurring valuein a data array that starts at memory address $0 and contains $1 words. The most frequent value must be stored in register $2. If multiple distinct values have the maximum number of occurrences in the data array, returning any one of these values $2 will do. Hints: Recall that the study material for Round 5 contains example armlet programs that sort an array. You may want to sort the array first and then find the most frequent value in the sorted data. Indeed, once the data is sorted, it is easy to find out how many times each value occurs by making one scan through the data. You probably want to keep track of a value that occurs the maximum number of times in the array scanned so far, and update this value whenever a more frequent value occurs.