Computer Systems: Program... -Access
Computer Systems: Program... -Access
3rd Edition
ISBN: 9780134071923
Author: Bryant
Publisher: PEARSON
Expert Solution & Answer
Book Icon
Chapter 2, Problem 2.60HW

Explanation of Solution

Function definition for “replace_byte()” function:

The implementation for “replace_byte()” function is given below:

//Header file

#include <stdio.h>

#include <assert.h>

//Function definition for replace byte function

unsigned replace_byte(unsigned x, int i, unsigned char b)

{

//Check if value of "i" is less than "0", then

if (i < 0)

{

//Display error message

printf("error: value of i is negetive\n");

return x;

}

/* Check if value of "i" is greater than "sizeof(unsigned)-1", then */

if (i > sizeof(unsigned)-1)

{

//Display error message

printf("error: value of i is too high");

return x;

}

/* Assign the value of mask that is for byte

in general, 1 bye = 8 bits and then << implies *8 */

unsigned m = ((unsigned) 0xFF) << (i << 3);

//Defines the byte position

unsigned bytePosition = ((unsigned) b) << (i << 3);

//Return given value

return (x & ~m) | bytePosition;

}

//Main function

int main(int argc, char *argv[])

{

/* Call replace_byte function for replace byte 2 in given "x" by byte "0xAB" */

unsigned replaceByte2  = replace_byte(0x12345678, 2, 0xAB);

/* Call replace_byte function for replace byte 0 in given "x" by byte "0xAB" */

unsigned replaceByte0 = replace_byte(0x12345678, 0, 0xAB);

/* Check if the replaced byte equals to given value using "assert" function */

assert(replaceByte2  == 0x12AB5678);

assert(replaceByte0  == 0x123456AB);

return 0;

}

The given code is used to return an unsigned value in which byte “i” of argument “x” has been replaced by “b”...

Blurred answer
Students have asked these similar questions
Suppose we number the bytes in a w-bit word from 0 (least significant)to w/8 −1 (most significant).Write code for the following C function, which will return an unsignedvalue in which byte i of argument x has been replaced by byte b:unsigned replace byte (unsigned x, int i, unsigned char b);Examples:replace byte(0x12345678, 2, 0xAB) → 0x12AB5678replace byte(0x12345678, 0, 0xAB) → 0x123456AB
Write C expressions, in terms of variable x, for the following values. Your codeshould work for any word size w > 8. For reference, we show the result of evaluatingthe expressions for x = 0x196a45c7, with w = 32.A. The least significant byte of x, with all other bits set to 0. [0x000000c7]B. All but the least significant byte of x complemented, with the least significant byteleft unchanged. [0xe695bac7 ].C. The least significant byte set to all ls’, and all other bytes of x left unchanged[0x196a45ff].
implement anyEvenBit(x) Return 1 if any even bit in x is set to 1   you are only allowed to use the following eight operators: ! ~ & ^ | + << >>   “Max ops” field gives the maximum number of operators you are allowed to use to implement each function   /* * anyEvenBit - return 1 if any even-numbered bit in word set to 1* Examples anyEvenBit(0xA) = 0, anyEvenBit(0xE) = 1* Legal ops: ! ~ & ^ | + << >>* Max ops: 12*/int anyEvenBit(int x) {return 2;}

Chapter 2 Solutions

Computer Systems: Program... -Access

Ch. 2.1 - Prob. 2.11PPCh. 2.1 - Prob. 2.12PPCh. 2.1 - Prob. 2.13PPCh. 2.1 - Prob. 2.14PPCh. 2.1 - Prob. 2.15PPCh. 2.1 - Prob. 2.16PPCh. 2.2 - Prob. 2.17PPCh. 2.2 - Practice Problem 2.18 (solution page 149) In...Ch. 2.2 - Prob. 2.19PPCh. 2.2 - Prob. 2.20PPCh. 2.2 - Prob. 2.21PPCh. 2.2 - Prob. 2.22PPCh. 2.2 - Prob. 2.23PPCh. 2.2 - Prob. 2.24PPCh. 2.2 - Prob. 2.25PPCh. 2.2 - Practice Problem 2.26 (solution page 151) You are...Ch. 2.3 - Prob. 2.27PPCh. 2.3 - Prob. 2.28PPCh. 2.3 - Prob. 2.29PPCh. 2.3 - Practice Problem 2.30 (solution page 153) Write a...Ch. 2.3 - Prob. 2.31PPCh. 2.3 - Practice Problem 2.32 (solution page 153) You are...Ch. 2.3 - Prob. 2.33PPCh. 2.3 - Prob. 2.34PPCh. 2.3 - Practice Problem 2.35 (solution page 154) You are...Ch. 2.3 - Prob. 2.36PPCh. 2.3 - Practice Problem 2.37 solution page 155 You are...Ch. 2.3 - Prob. 2.38PPCh. 2.3 - Prob. 2.39PPCh. 2.3 - Practice Problem 2.40 (solution page 156) For each...Ch. 2.3 - Prob. 2.41PPCh. 2.3 - Practice Problem 2.42 (solution page 156) Write a...Ch. 2.3 - Practice Problem 2.43 (solution page 157) In the...Ch. 2.3 - Prob. 2.44PPCh. 2.4 - Prob. 2.45PPCh. 2.4 - Prob. 2.46PPCh. 2.4 - Prob. 2.47PPCh. 2.4 - Prob. 2.48PPCh. 2.4 - Prob. 2.49PPCh. 2.4 - Prob. 2.50PPCh. 2.4 - Prob. 2.51PPCh. 2.4 - Prob. 2.52PPCh. 2.4 - Practice Problem 2.53 (solution page 160) Fill in...Ch. 2.4 - Practice Problem 2.54 (solution page 160) Assume...Ch. 2 - Compile and run the sample code that uses...Ch. 2 - Try running the code for show_bytes for different...Ch. 2 - Prob. 2.57HWCh. 2 - Write a procedure is_little_endian that will...Ch. 2 - Prob. 2.59HWCh. 2 - Prob. 2.60HWCh. 2 - Prob. 2.61HWCh. 2 - Write a function int_shifts_are_arithmetic() that...Ch. 2 - Fill in code for the following C functions....Ch. 2 - Write code to implement the following function: /...Ch. 2 - Write code to implement the following function: /...Ch. 2 - Write code to implement the following function: / ...Ch. 2 - You are given the task of writing a procedure...Ch. 2 - Prob. 2.68HWCh. 2 - Write code for a function with the following...Ch. 2 - Write code for the function with the following...Ch. 2 - You just started working for a company that is...Ch. 2 - You are given the task of writing a function that...Ch. 2 - Write code for a function with the following...Ch. 2 - Write a function with the following prototype: /...Ch. 2 - Prob. 2.75HWCh. 2 - The library function calloc has the following...Ch. 2 - Prob. 2.77HWCh. 2 - Write code for a function with the following...Ch. 2 - Prob. 2.79HWCh. 2 - Write code for a function threefourths that, for...Ch. 2 - Prob. 2.81HWCh. 2 - Prob. 2.82HWCh. 2 - Prob. 2.83HWCh. 2 - Prob. 2.84HWCh. 2 - Prob. 2.85HWCh. 2 - Intel-compatible processors also support an...Ch. 2 - Prob. 2.87HWCh. 2 - Prob. 2.88HWCh. 2 - We are running programs on a machine where values...Ch. 2 - You have been assigned the task of writing a C...Ch. 2 - Prob. 2.91HWCh. 2 - Prob. 2.92HWCh. 2 - following the bit-level floating-point coding...Ch. 2 - Following the bit-level floating-point coding...Ch. 2 - Following the bit-level floating-point coding...Ch. 2 - Following the bit-level floating-point coding...Ch. 2 - Prob. 2.97HW
Knowledge Booster
Background pattern image
Similar questions
SEE MORE QUESTIONS
Recommended textbooks for you
Text book image
C++ for Engineers and Scientists
Computer Science
ISBN:9781133187844
Author:Bronson, Gary J.
Publisher:Course Technology Ptr