1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Volgvan
1 year ago
8

Write an assembly program to find the largest item in an array and store it in a variable named MAXIMUM. Hint: Use both Jump and

loop instructions to write the program. Logic: Assume that the first item of the array is the minimum and store it in variable MAXIMUM Write a loop. Inside the loop, compare the each array item with the minimum If the array item is less than the MAXIMUM, update MAXIMUM with that array item. . Data Array WORD 10, 2, 23, 45, 21, 11 MAXIMUM WORD
Computers and Technology
1 answer:
Gekata [30.6K]1 year ago
7 0

Use the knowledge of computational language in C++ to write the a code assembly program to find the largest item.

<h3>How to write a maximum function in C++?</h3>

To make it simpler the code is described as:

<em>#include<bitd/stdc++.h></em>

<em>Using namespace std;</em>

<em>Int main(){</em>

<em>Int arr[10]={10, 2, 23, 45, 21, 11};</em>

<em>Int min=INT_MAX;</em>

<em>Int max=INT_MIN;</em>

<em>for(int i=0;i<10;i++)</em>

<em>If(min<arr[i])min=arr[i];</em>

<em>for(int j=0;j<10;j++)</em>

<em>if(max>arr[j])max=arr[j];</em>

<em>Cout<<max<<” “<<min<<endl;</em>

<em>return 0;</em>

See more about C++ code at brainly.com/question/19705654

You might be interested in
Which of the following is NOT areserved word in Java?intpublicstaticnum
Rama09 [41]

Answer:

num

Explanation:

In java reserved words are also known as keywords, keywords are reserve words for a language that can't be used as an identifier(name of a class, name of a variable, name of an array etc.) int, public static, are reserve words.

In given question num is not a reserved word.

6 0
2 years ago
Direct Mapped Cache. Memory is byte addressable. Fill in the missing fields based upon the properties of a direct-mapped cache.
xz_007 [3.2K]

The question given is incomplete and by finding it on internet i found the complete question as follows:

Direct Mapped Cache.

Memory is byte addressable

Fill in the missing fields based upon the properties of a direct-mapped cache. Click on "Select" to access the list of possible answers Main Memory Size Cache Size Block Size Number of Tag Bits 3 1) 16 KiB 128 KiB 256 B 20 2) 32 GiB 32 KiB 1 KiB 3) 64 MiB 512 KiB 1 KiB Select] 4 KiB 4) 16 GiB 10 Select ] Select ] 5) 10 64 MiB [ Select ] 6) Select] 512 KiB 7

For convenience, the table form of the question is attached in the image below.

Answers of blanks:

1.  3 bits

2. 20 bits

3. 64 MB

4. 16 MB

5. 64 KB

6. 64 MB

Explanation:

Following is the solution for question step-by-step:

<u>Part 1:</u>

No. of Tag bits = No. of bits to represent

Tag bits = Main memory - cache size bits -------- (A)

Given:

Main memory = 128 KB = 2^7 * 2^{10} = 2^{17}

Cache Memory  = 16 KB = 2^4 * 2^{10}= 2^{14}

Putting values in A:

Tag bits = 17 - 14 = 3 bits

<u>Part 2:</u>

Tag bits = Main memory - cache size bits -------- (A)

Given:

Main memory = 32 GB = 2^5 * 2^{30} = 2^{35}

Cache Memory  = 16 KB = 2^5 * 2^{10}= 2^{15}

Putting values in A:

Tag bits = 35 - 15 = 20 bits

<u>Part 3:</u>

Given:

Tag bits = 7

Cache Memory = 512 KB = 2^9 * 2^{10}  = 2^{19}

So from equation A

7 = Main Memory size - 19

Main Memory = 7 + 19

Main memory = 26

OR

Main Memory = 2^6 * 2^{20} = 64 MB

<u>Part 4:</u>

Given that:

Main Memory Size = 2^4 * 2^{30} = 2^{34}

Tag bits = 10

Cache Memory Bits = 34 - 10 = 24

Cache Memory Size = 2^4 * 2^{20} = 16 MB

<u>Part 5:</u>

Given that:

Main Memory Size  = 64 MB = 2^6 * 2^{20}

Tag bits = 10

Cache Memory Bits = 26 - 10 = 16

Cache Memory Size = 2^{16} = 2^6 * 2^{10} = 64 KB

<u>Part 6:</u>

Cache Memory = 512 KB = 2^9 * 2^{10} = 2^{19}

Tag Bits = 7

Main Memory Bits = 19 + 7 = 26

Main Memory size = 2^{26} = 2^6 * 2^20 = 64 MB

i hope it will help you!

6 0
3 years ago
What are the People that make the goods called
Marina CMI [18]
Those people would be called producers
4 0
3 years ago
Windows stores information from the Credential Manager application in secure folders called
Delicious77 [7]

Windows stores information from the Credential Manager application in secure folders called<u> VAULTS.</u>

<u></u>

Explanation:

  • A credential vault is a database used to store passwords and similar cryptographic key material.
  • The most common data stored in a credential vault are current and historical passwords to privileged accounts.
  • All credentials are saved in special folders on the computer, a place called Vaults. Moreover, you can back up all credentials to a file and restore them on to different computer.
  • Vault is a shareware program that acts as a bank vault, or safe, where you can keep you private information or files hidden and secure.
  • Everything in the vault is protected with an advanced encryption, and requires a password (your password) to open the vault to access the information.
8 0
2 years ago
Which guideline should you follow when selecting the font for a presentation
Sladkaya [172]
My school requires us to use Arial and double space it but we have to use font size 30 for title and 24 for the paragraphs.
3 0
3 years ago
Other questions:
  • Dr. Patterson’s office calls to give patient Sara Martin her test results from her most recent visit. Her husband answers the ph
    8·2 answers
  • An individual is first with the network before they are authorized to access resources on the network A. countermeasure B. vulne
    11·1 answer
  • Your browsing the Internet and realize your browser is not responding which of the following will allow you to immediately exit
    14·2 answers
  • Ansel Adams education and special training
    14·1 answer
  • Using C++
    15·1 answer
  • The _________ unit, within the CPU, interprets software instructions and literally tells the other hardware devices what to do,
    5·1 answer
  • dr. olson likes to conduct research on the nature of prejudice and its effect on behavior. dr olson is probably a (n) - psycholo
    8·2 answers
  • Security Definition updates for windows defender are performed through the ——— function in windows server 2016
    7·2 answers
  • What is the easiest way to deploy a C++ program to a user’s computer? a. Copy the source code to the user’s computer and then co
    13·1 answer
  • What are some applications of computer in public administration?​
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!