What will the values of Carry Flag, Overflow Flag and Sign Flag after the execution of following operations in asssmebly: 1) 8-bit addition of following values using registers in ADD instruction SF =? CF = ? OF = ? SF =? CF = ? OF = ? 92+92 100+200 30-50 SF =? CF = ? OF = ? 50-30 SF =? CF = ? OF = ? -100-200 SF =? CF = ? OF = ? First do binary calculations on paper and then perform write and execute your answer in emu8086.
Q: A multinational firm creates a large number of branches throughout Pakistan. Suppose you were recrui...
A: INTRODUCTION: Business networking: It makes connections with other business people and people who mi...
Q: Many big corporations' database systems have been hacked, resulting in the theft of customer informa...
A: Introduction: The phrase "database security" refers to a collection of tools, rules, and processes f...
Q: Should Cache be transparent for users and programmers,give reason
A: Answer :
Q: Show the step-by-step process. Do not use shortcut methods. Make it as detailed as it can be. ENCOD...
A: Hey there, I am writing the required solution of the above stated question.Please do find the soluti...
Q: have a 70000x785 dataset (70000 instances and 785 features) consisting of 10 different types of clas...
A: Here as given,10 different classes , in which we have 7000 instances and 785 features. =============...
Q: "What happens if a process tries to visit a page that hasn't been cached? What are the steps in this...
A: In CPU, if a process wants to access the page then first it checks the cache. The access time of the...
Q: For each category of data owner, provide specifics on data security, data ownership types, and dutie...
A: Data security is the process of defending digital data against unauthorized access, corruption, or t...
Q: For the input line: 88.345 29.750 CSC103 What will be in the variables after executing the following...
A: Given input line is 88.345 29.750 CSC103 t1 is declared as int t2 and t3 are declared as double ts i...
Q: What is a digital security risk, and what causes it? Explain in a few words two digital security iss...
A: Given To know about the digital security risk and two digital security issues
Q: What are the steps in the scan-line algorithm?
A: Answer:
Q: undamental functionalities of a network operatin
A: Network operating system:- The networking role of the Network Operating System (NGO) is to allow fil...
Q: Computer science Is it possible to scale an Amazon instance vertically? How?
A: To vertically scale an AWS EC2 instance, it must first be paused, then the instance size modified, a...
Q: Show a simple disconnected graph with 6 vertices and 2 connected components.
A: The Answer is in step2
Q: What is the difference between raw data and an Excel table in an Excel spreadsheet?
A: Introduction: By default, a spreadsheet in Excel is a collection of rows and columns. Each box is re...
Q: scheme and with left-recursion infix-to-po
A: Below the Translation scheme and with left-recursion infix-to-postfix translator
Q: 1.list at least 10 ways to protect your network from malicious and harmful attacks. 2.Based on your ...
A: Solution: The attacker tries to harm your personal as well as your company network, there are certai...
Q: What is cryptography? What is cryptanalysis? What are the differences between them?
A: Cryptography is the art of hiding messages by converting them into hidden texts. It is generally don...
Q: What characteristics are essential in today's enterprise information systems?
A: Human capital is an term that refers to the value of Human capital. The monitoring of your employees...
Q: What are the five regions of databases where data security vulnerabilities are present?
A: Introduction: Database security refers to the many steps taken by businesses to secure their databas...
Q: ++ program for sphere
A: Sphere code : #include<iostream> using namespace std; int main() { int rad,vol; cout<<"E...
Q: o not provide any constructors, and (4) do not use three separate files. These are topics we will st...
A: We need to define the functions to produce the result as per the given description.
Q: What are the main characteristics of cloud computing?
A: Introduction: Cloud computing is a concept that refers to the omnipotent and omniscient, rapid, and...
Q: C++ PROGRAMMING EXERCISE Given an array of integers that contains 5 integers. Write a program to fin...
A: Answer :
Q: Prompt the user to enter a course number such as MA122 (assume it is always 5 characters long). Ver...
A: As it is always 5 characters long, we no need to check for the length of string and instead we can c...
Q: What happens if a process tries to visit a page that hasn't been cached? What are the steps in this ...
A: Goal: To talk about what occurs if the process attempts to access a page that hasn't been saved in m...
Q: Dualipa get a message 'unusual traffic detected' from Google, although she had not performed any mal...
A: answers are given below with explanation
Q: Describe the concept of Machine Language in a few words. Also, what are the factors that contribute ...
A: Introduction: The language that a computer uses is known as machine language's understands. It's qui...
Q: Question1: implement lab 3 by the two-dimensional array. ask the user to give you a number of rows a...
A: This given program will take a input as array elements and they define in two dimensional array the...
Q: Give two advantages of utilising virtualization as a network networking strategy.
A: Intro Give two advantages of using virtualization as a networking technique on a network.
Q: design an application for the ABC Company that will process inventory from a file called ABC_Invento...
A: Code: count=0summ=0 f = open("ABC_INVENTORY.txt", "r")for x in f: count=count+1 if(count%3==0)...
Q: Old-fashioned photographs from the nineteenth century are not quite black and white and not quite co...
A: Solution :: #code from images import Image def sepia(image): #initially converting image t...
Q: What types of networks are employed in educational institutions? Explain why and how it differs from...
A: The Answer is in given below steps
Q: Why is it necessary to have a cooling system in a computer? What are the various cooling procedures ...
A: Introduction: Computer cooling: Computer cooling is a method of removing waste heat created by compu...
Q: What are the differences and similarities between Object-Oriented Programming and Procedural Program...
A: Introduction: Procedural and Object-Oriented Programming: An Overview: Procedural programming is bas...
Q: What are the different logical gates? Include the truth table and logical symbol of each logic gate
A: There are seven basic logic gates and are as follows AND OR XOR NOT NAND NOR XNOR
Q: Many big corporations' database systems have been hacked, resulting in the the ft of customer inform...
A: Introduction: Customers' data has been stolen from several big corporations' database systems. Discu...
Q: In the event that a wireless signal comes into contact with a big obstruction, what occurs next?
A: Introduction; In response to the inquiry, Wireless networks are radio stations, not magic. Your wire...
Q: What is the connection between Vigenere cipher and Fibonacci sequence?
A: Answer :
Q: Discuss clusters since the purpose is to arrange comparable instances into clusters. Clustering is a...
A: Introduction:- Clustering, often known as cluster analysis, is a machine learning technique that gro...
Q: define and explain network administration and network maintenance and no plagiarism of definition an...
A: Answer :
Q: If encryption and hashing are not employed, what kind of security technique is used to avoid data fl...
A: Introduction: Information security refers to the process of the safeguarding data or information aga...
Q: ss the role of IAM in CC model. Give a real-time exampl
A: Lets see the solution.
Q: Please elaborate on why the primary information systems are so important to the business. Security m...
A: A sophisticated information system stores the data in a database, which simplifies the process of re...
Q: The following algorithm seeks to compute the number of leaves in a binary tree. ср Algorithm LeafCou...
A: We are given a logic of code in algorithm which calculate the number of leaf nodes in a binary tree....
Q: 24 Provide the most accurate number of subnets and hosts that could be created from the (classful) n...
A: The first subnet obtained after the network address is sub-netted is known as IP subnet zero.
Q: Is there a significant distinction between a hacktivist and a cyberterrorist, in your opinion. Wheth...
A: Hacktivist is the peaceful pursuit of political goals via the use of unlawful or legally ambiguous d...
Q: What are the fundamental roles of a network operating system?
A: Network Operating System is one of the significant sorts of working frameworks. Network Operating Sy...
Q: Computer science What is data profiling and how does it help to enhance data quality?
A: Introduction: Material profiling is a method for evaluating current news sources and generating stat...
Q: Q1 Direct proof is a method of mathematical proof. Name at least two other methods of proof: Us...
A: Direct proof example and to other method in below step
Q: Python: How do I get the total of bal of top4(which can be specified)) bal = { "bal": [ 3955,...
A: I have provided PYTHON CODE along with CODE SCREENSHOT and OUTPUT SCREENSHOT--------------...
microprocessor & Assembly Language
Step by step
Solved in 2 steps
- Code required in mips assembly language not a c code required Write a MIPS procedure that takes as its two parameters the starting address of a (zero-terminated) string, and a character c, and removes all instances of the character from the string. Also, write a main program to test your procedure. Your main program should input a string from the user (you can assume that the string will be at most 40 characters, not including the zero byte delimiter), and then prompt for input of a character c. If the character c that the user inputs is the newline character (ascii code 10), your program should terminate. Otherwise, your program should invoke your procedure, output the modified string, and then prompt for input of another character to be removed from the string, continuing in this manner until the input character is the newline character.Q1- Write a program in assembly language for the 8085 microprocessor to send one byte of data located at the memory address (3000H ) using SOD at a baud rate of 1200. Information: The 8085 processor operates at a frequency of 3.072 MHz . When sending the required byte, you must adhere to the following: The two high bits of the start bits(1 1) must be sent, after that the data bits are sent, after that the low bit of the stop bit (0) is sent. The following flowchart will help you. The solution must be integrated and include the calculation of the baudrate delay time• In string operations, register -- - is used to point to the source operand and register ----- is used to point to the destination operand. The-----flag is used to tell the CPU whether to or -- - the pointer in string operation. Your answer
- Q1- Write a program in assembly language for the 8085 microprocessor to send one byte of data located at the memory address (3000H) using SOD at a baud rate of 1200. Information: The 8085 processor operates at a frequency of 3.072 MHz. When sending the required byte, you must adhere to the following: The two high bits of the start bits must be sent, after that the data bits are sent, after that the low bit of the stop bit is sent. The following flowchart will help you. The solution must be integrated and include the calculation of the baud rate delay time Transmit Set up Character Bit Counter • Send Start Bit No Wait Bit Time Get Character in Accumulator Output Bit Using Do Wait Bit Time Rotate Next Bit in Do Decrement Bit Counter Is It Last Bit? Yes • Add Parity if Necessary Send Two Stop Bits Return (a)NO PSEUDOINSTRUCTIONS you can not use li or la. Write a MIPS assembly language subroutine called GetCode that asks the user to enter a 7 bit code consisting of ones and zeros. When the user is finished entering the data, they should hit the Enter key. The data should be stored in memory as a NULL terminated ASCII string at the address passed into the routine in register a1. The user should be prompted for the data by displaying a prompt to the console asking them to enter the data. These prompts can be stored in the beginning of the data segment, and should not reside outside of the range 0x10000000 through 0x1000FFFF in memory NO PSUEDOINSTRUCTIONSAn-Najah National University Department of Computer Engineering Microprocessors (10636322) Assignment # 1 Answer the following: 1- Write an 8086-assembly program that reads only vowels (a, e, i, o, u) from the keyboard (other characters are not excepted) and store them in a character array of 10 bytes long. Vowels entered after the array is full should be discarded. The program should stop reading characters when a 'S' is entered. When the 'S' character is entered, the program should output a new line, followed by the contents of the character array, with a space character between each vowel. 2- Write an assembly code to sort a word array of 50 numbers in ascending order. 3- The perfect number is defined as an integer which is equal to the sum of its divisors. Example: 28 is perfect number because 28 = 1+2+4 +7+ 14. Write an inline assembly e function that will takes an integer number as parameter and check whether it is a perfect number or not. Use the function in complete program. 4-…
- The following tables contains memory dump and contents of few registers, as follows: add cont reg cont Ox100 Oxff eax Ox100 Ox104 OXCD есх Ох1 Ох108 Ох22 edx 0x3 Ох10C Ох33 **** What is the value of the following operand 4[eax] ? Select one: a. OXFF b. Ox104 c. OXCD d. 0x103Consider the following procedure definition: MyProcedure PROC, val1: DWORD, val2: DWORD, val3: DWORD mov eax, val1 add eax, val2 sub eax, val3 ret 12 MyProcedure ENDP Show how you would call this procedure in another program. You need to show at least 2 lines of code: • Prototyping this procedure • Calling this procedure (you can use any values/registers for the parameters)Select all true statements. Segmentation always uses 32-bit logical addresses. The memory management unit utilizes the segment component of the logical address to get the segment table start address and adds the offset to obtain the physical address. Segmentation uses segment and offset logical addresses. Maximum segment number limits segment length. Segmentation restricts process memory access to respective segments. Segments may be granted privileges.
- Q1- Write a program in assembly language for the 8085 microprocessor to send 10 bytes of data located at the memory address (3000H to 3009H) using SOD at a baud rate of 1200. Information: The 8085 processor operates at a frequency of 3.072 MHz. When sending each of the required bytes, you must adhere to the following: The two high bits of the start bits must be sent, after that the data bits are sent, after that the low bit of the stop bit is sent. The following flowchart will help you, but you should notice that this flowchart deals with one byte, and you are required to deal with 10 bytes. The solution must be integrated and include the calculation of the baudrate delay time Transmit No Set up Character Bit Counter Send Start Bit Wait Bit Time Get Character in Accumulator Output Bit Using Do Wait Bit Time Rotate Next Bit in Do Decrement Bit Counter Is It Last Bit? Yes Add Parity if Necessary • Send Two Stop Bits Return (a)subject: microprocessor and assembly language Data transmission systems and file subsystems often use a form of error detection that relies on calculating the parity (even or odd) of blocks of data. Your task is to create a procedure that returns True in the EAX register if the bytes in an array contain even parity, or False if the parity is odd. In other words, if you count all the bits in the entire array, their count will be even or odd. Preserve all other register values between calls to the procedure. Write a test program that calls your procedure twice, each time passing it a pointer to an array and the length of the array. The procedure’s return value in EAX should be 1 (True) or 0 (False). For test data, create two arrays containing at least 10 bytes, one having even parity, and another having odd parity.Q3/ Fill blanks 1. MOV SI,DI is example of 2. MOV AL,'G’ is an example of --addressing mode. -----addressing mode. 3. MOV AL, [BX] is an example of 4. MOV CL,[DI]+20 is an example of 5. MOV CL,[BX][DI]+6 is an example of -addressing mode. ---addressing mode. ---addressing mode. 6. Physical address is -If (AL)=ED H, (DS)=200H and (BX)=1000 H.