COMPREHENSIVE MICROSOFT OFFICE 365 EXCE
1st Edition
ISBN: 9780357392676
Author: FREUND, Steven
Publisher: CENGAGE L
expand_more
expand_more
format_list_bulleted
Question
error_outline
This textbook solution is under construction.
Students have asked these similar questions
174.
Load instruction that are requested moves
a.
from memory
b.
to memory
c.
in memory
d.
on memory
Describe what each instruction from the following program will actually do:
TITLE Task
INCLUDE Irvine32.inc
.data
str1 BYTE "The array sum is: ",0
start BYTE "Enter the Starting Index: ",0
endinx BYTE "Enter the Ending Index: ",0
array DWORD 4, 6, 2, 5, 6, 7, 8, 4
sum DWORD ?
j DWORD ?
k DWORD ?
.code
main PROC
mov esi, OFFSET array
mov ecx, LENGTHOF array
mov edx, OFFSET start
call WriteString
call ReadInt
mov j, eax
mov esi, j
mov edx, OFFSET endinx
call WriteString
call ReadInt
mov k, eax
mov ecx, k
call ArraySum
mov sum,eax
call WriteInt
main ENDP
ArraySum PROC
push esi
push ecx
mov eax, 0
L1:
add eax, array[esi]
add esi, TYPE DWORD
loop L1
pop ecx
pop esi
ret
ArraySum ENDP
END main
Here, each instruction receives its own data independently of how other instructions get theirs. We utilize: A Multiple Data/Instruction B Multiple Data/Instruction C Singular Data Single Inst D Singe Inst Multiple
Knowledge Booster
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.Similar questions
- Your task is to write an assembly-language program that finds the most frequently occurring valuein a data array that starts at memory address $0 and contains $1 words. The most frequent value must be stored in register $2. If multiple distinct values have the maximum number of occurrences in the data array, returning any one of these values $2 will do. Hints: Recall that the study material for Round 5 contains example armlet programs that sort an array. You may want to sort the array first and then find the most frequent value in the sorted data. Indeed, once the data is sorted, it is easy to find out how many times each value occurs by making one scan through the data. You probably want to keep track of a value that occurs the maximum number of times in the array scanned so far, and update this value whenever a more frequent value occurs.arrow_forwardWrite a PEP/8 machine language simulator that simulates the PEP/8 computer and instruction set for only the following instructions Here are some specifics. 1. Use an array to represent the memory. 2. Use variables or arrays for the PEP8 registers. I recommend putting it all into a structure. I also recommend using an array of 16 bit values for A, X, PC, SP so that you can use the r bit from the instructions to point directly to A or X. You do NOT have to include the Status bits. 3. Use unions of structures to break up the registers and instructions into the correct bits (for example, use a structure that can be unioned to break up the 8 bit specifier into the following bit combos (4, 1, 3), (5, 3), (7, 1), (8). This will allow you to instantly extract the instruction, register and addressing modes from each instruction. Also use a union to break up the 16 bit operand into two 8 bit values. 4. Have the instructions be inputted either through the command line or better yet,…arrow_forward354. Virtual Memory can be implemented via __________ a. Demand Paging b. Logical paging c. Structural way d. Simple divisionarrow_forward
- _____ is a CPU design technique in which instruction execution is divided into multiple stages and different instructions can execute in different stages simultaneously.arrow_forwardMost Intel CPUs use the __________, in which each memory address is represented by two integers.arrow_forwardP1:Given the following memory values and a one-address machine with an accumulator,whatvalues do the following instructions load into the accumulator?·Word 20 contains 40.·Word 30 contains 50.·Word 40 contains 60.·Word 50 contains 70.a. LOAD IMMEDIATE 20b. LOAD DIRECT 20c. LOAD INDIRECT 20d. LOAD IMMEDIATE 30e. LOAD DIRECT 30f. LOADINDIRECT 30arrow_forward
- Imagine we have a small computer which contains a simplified version of a CPU and RAM. The CPU can execute a single program that is stored in the RAM, and while running the program it can access 3 memory locations: its internal register AL, and two RAM locations that we'll call address 1 and address 2. Since this is a simplified computer it is able to skip some of the steps to access memory that are in our textbook, but accessing RAM still takes longer than accessing AL. The only values this computer is capable of storing in memory are unsigned bytes (8 bit binary numbers), and when it starts running a program all 3 of its memory locations initially contain the value 00000000. Here is a list of all of the instructions our imaginary computer can perform: Write [number] to AL This instruction takes the operand [number], which must be an 8-bit binary number, and puts it into AL. This overwrites whatever was in AL previously. It takes 3 cycles to complete: 1 cycle each to fetch, decode,…arrow_forwardCreate a code (assembly language) that allows PIC18 microprocessor, which is connected to 7-segment display, to repeatedly count down from 100 to 00. The commands which are allowed are MOVLW, ADDLW, MOVWF, ADDWF, MOVFF, DECF, COMF, GOTO. No loops are allowed please. eg. of increment code: CLRF TRISCCOUNT EQU 0x25MOVLW 00HRND1MOVWF PORTCINCF PORTC, FMOVF PORTC, WDAWGOTO RND1arrow_forwardA fragment of code is given to compare text in the field alpha with a text in the field beta: .data alpha db 12 dup(?) beta db ’abrakadabra’, 0 ; ::: .code ; ::: mov esi, 0 mov ecx, 12 ns: mov dl, alpha[esi] cmp dl, beta[esi] jne wrong ;=====MISSING==== loop ns ; ::: wrong: Choose missing instruction to insert in the code line marked by the comment “MISSING”.arrow_forward
- Generate a listing file for the AddTwoSum program and write a description of the machine codebytes generated for each instruction. You might have to guess at some of the meanings of thebyte values.arrow_forwardUse the PEP/8 assembely machine language simulator to write a program that simulates the PEP/8 computer and instruction set for only the following instructions (the following instructions are in the image attached) Here are some specifics. 1.Use an array to represent the memory. 2.Use variables or arrays for the PEP8 registers. I recommend putting it all into a structure. I also recommend using an array of 16 bit values for A, X, PC, SP so that you can use the r bit from the instructions to point directly to A or X. You do NOT have to include the Status bits.arrow_forwardQuestion1: Multiple Choice : (please leave it to other tutors who can answer all my sub-question since this is my last question for this month) 1-If for some inputs, a procedure never terminates, the procedure lacks a. computability b. definiteness c. finiteness d. scalability 2-The elements of the ISA for a particular type of CPU include a. addressing modes b. data types c. instructions d. a and b e. a, b and c Question 2: Perform the following logical operations and express your answers in hexadecimal notation. x3487 AND x7254 xABCD or x3234 xF098 XOR x3344arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- COMPREHENSIVE MICROSOFT OFFICE 365 EXCEComputer ScienceISBN:9780357392676Author:FREUND, StevenPublisher:CENGAGE LMicrosoft Visual C#Computer ScienceISBN:9781337102100Author:Joyce, Farrell.Publisher:Cengage Learning,Programming Logic & Design ComprehensiveComputer ScienceISBN:9781337669405Author:FARRELLPublisher:Cengage
- Systems ArchitectureComputer ScienceISBN:9781305080195Author:Stephen D. BurdPublisher:Cengage Learning
COMPREHENSIVE MICROSOFT OFFICE 365 EXCE
Computer Science
ISBN:9780357392676
Author:FREUND, Steven
Publisher:CENGAGE L
Microsoft Visual C#
Computer Science
ISBN:9781337102100
Author:Joyce, Farrell.
Publisher:Cengage Learning,
Programming Logic & Design Comprehensive
Computer Science
ISBN:9781337669405
Author:FARRELL
Publisher:Cengage
Systems Architecture
Computer Science
ISBN:9781305080195
Author:Stephen D. Burd
Publisher:Cengage Learning
Instruction Format (With reference to address); Author: ChiragBhalodia;https://www.youtube.com/watch?v=lNdy8HREvgo;License: Standard YouTube License, CC-BY