1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vinvika [58]
3 years ago
13

Create a procedure named FindLargest that receives two parameters: a pointer to a signed doubleword array, and a count of the ar

ray's length. The procedure must return the value of the largest array member in EAX. Use the PROC directive with a parameter list when declaring the procedure. Preserve all registers (except EAX) that are modified by the procedure. Write a test program that calls FindLargest and passes three different arrays of different lengths. Be sure to include negative values in your arrays. Create a PROTO declaration for FindLargest.
Computers and Technology
1 answer:
Kay [80]3 years ago
6 0

Answer:

See explaination

Explanation:

FindLargest PROC,

array_num: PTR DWORD,

arraySize: DWORD

mov esi, array_num

mov ecx, arraySize

mov eax, [esi]

dec ecx

scan_array:

add esi, 4

mov ebx, [esi]

cmp ebx, eax

JLE check_number

mov eax, ebx

check_number:

loop scan_array

ret

FindLargest ENDP

END

You might be interested in
The key to security policy is being able to measure compliance against a set of controls. Security controls define _____ ______
Virty [35]

Answer:

The correct words for the blank spaces are: how; why.

Explanation:

In computer science, security control implies all the efforts of how organizations prevent, detect, and attack risks to safeguard sensitive information. Security policies establish why those actions are taken and set a list of all the assets that must be protected in front of a breach.

8 0
4 years ago
Relieved to have survived ,henry rolled off the rink________.giving alex a grateful look
Marina86 [1]

Answer:

simultaneously might be the answer

8 0
3 years ago
Which file types have .exe and .png as their extensions?
uysha [10]
.png are for photos and .exe are for programs.
6 0
3 years ago
Read 2 more answers
Which sentence best descibes an activity stream
Marina CMI [18]

Answer: a list of recent activities performed by an individual, typically on a single website.

Explanation:

7 0
3 years ago
17. Ano ang tawag sa pahina ng Excel?
kompoz [17]

D

Explanation:

D.spread sheet

........,,............:-)

5 0
3 years ago
Other questions:
  • Brainliest to whoever can guess what year this corvette logo is from. Make your guesses
    11·1 answer
  • How do I only give 5 points and not 10?
    7·1 answer
  • Which of the following is a valid format symbol in Microsoft Excel? Dollar Sign, Comma, Percent Sign or all of them? I can't fig
    14·1 answer
  • Learning in a digital environment is also called learning.
    6·2 answers
  • Which of the following things should you do first when planning your career?
    15·2 answers
  • Answer ASAP and I'll give brainliest.
    10·2 answers
  • Remember partially filled arrays where the number of elements stored in the array can be less than its capacity (the maximum num
    14·1 answer
  • Which pane in PowerPoint contains images of the slides in the order they appear in the presentation
    8·2 answers
  • (Find the number of uppercase letters in a string) Write a recursive function to return the number of uppercase letters in a str
    12·1 answer
  • The different languages that follow specific RULES. These languages use commands
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!