1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Zinaida [17]
4 years ago
9

The code below uses the Space macro which simply displays the number of blank spaces specified by its argument. What is the firs

t number printed to the screen after this code executes? (ignore the .0000 from Canvas)main PROC push 4 push 10 call rcrsn exitmain ENDPrcrsn PROC push ebp mov ebp,esp mov eax,[ebp + 12] mov ebx,[ebp + 8] cmp eax,ebx jl recurse jmp quitrecurse: inc eax push eax push ebx call rcrsn mov eax,[ebp + 12] call WriteDec Space 2quit: pop ebp ret 8rcrsn ENDP
Computers and Technology
1 answer:
IceJOKER [234]4 years ago
6 0

Answer:

Code explained below

Explanation:

Include Irvine32.inc

INCLUDE Macros.inc               ;Include macros for space

.code

main proc

  push 4                   ;Push 4 to the stack

push 10                   ;Push 10 to the stack

  call rcrsn                   ;call the function  

  exit

  ;invoke ExitProcess,0           ;After return from the function

                      ;call exit function

  main ENDP               ;end the main

  rcrsn PROC               ;define the function

      push ebp               ;push the ebp into stack

      mov ebp,esp           ;set ebp as frame pointer

      mov eax,[ebp + 12]       ;This is for second parameter

      mov ebx,[ebp + 8]       ;This is for first parameter

      cmp eax,ebx           ;compare the registers

      jl recurse           ;jump to another function  

      jmp quit               ;call quit

      recurse:               ;Implement another function  

      inc eax               ;increment count value

      push eax               ;push the eax value into stack

      push ebx               ;push ebx into stack

      call rcrsn           ;call above function

      mov eax,[ebp + 12]       ;This is for second parameter

      call WriteDec           ;write the value on the screen

      mWritespace 2           ;Space macro print 2 spaces

                      ;pause the screen

      quit:               ;Implement quit function

      pop ebp               ;pop the pointer value from the stack

      ret 8               ;clean up the stack

 

  rcrsn ENDP          

end main

You might be interested in
A married man gets a new job in a company. After three months, he meets a younger woman in the finance department and they begin
pav-90 [236]

Answer:

False ( B )

Explanation:

Of  the seven IT  infrastructure domains The USER domain was not at risk because the User Domain is not task with handling the sharing of data or Mutual communication between users in a Typical IT infrastructure.

The domain charged with such responsibility is The LAN domain because the LAN domain is charged with the sharing of information between the USERS and maintaining good mutual communication, and since the relationship has become sour, the sharing of information between the users will suffer the most and it will be at a high risk

5 0
3 years ago
➪ How many types of Engineering are there in the world ?<br>⛄​​
aleksley [76]

There are mainly five types of engineers found in the world. Each of them has a different set of skills and knowledge concerning their relative field.

<h3>Who is called an Engineer?</h3>

An Engineer may be defined as an individual who formats, designs, modifies, and creates machinery or technical equipment like software programs, construction buildings, bridges, etc.

The five types of Engineers are as follows:

  • Civil Engineers.
  • Chemical Engineers.
  • Electrical Engineers.
  • Mechanical Engineers.
  • Computer Engineers.

Civil engineers deal with the construction of buildings, bridges dams, airports, etc. Chemical engineers are associated with developing the products such as medicines, petrochemicals, plastics, etc.

Electrical engineers design and develop the manufacturing of electrical equipment like navigation systems, radar, communication systems, electric motors, etc.

Mechanical engineers always maintain their focus on manufacturing power-producing and power-using machines like electric generators, gas turbines, refrigerators, air-conditioners, etc.

Computer engineers deal with designing, manufacturing, and examining all software operated within an institution's computer system.

All such types of engineers work in their respective fields for designing, and manufacturing products and their delivery which makes the life of an individual easy, efficient, and reliable.

Therefore, it is well described above.

To learn more about Engineers, refer to the link:

brainly.com/question/17169621

#SPJ1

5 0
2 years ago
Read 2 more answers
Given two input integers for an arrowhead and arrow body, print a right-facing arrow.
Zanzabum

Answer:

I don't know the language this is but here is something that will work for all lang

int num0 = 0;

int num1 = 0;

basically just print the ints in the right dimension

Explanation:

Sorry if I am wrong

I don't know much about this someone else's answer might be better than mine

3 0
3 years ago
Which describes the relationship between enterprise platforms and the cloud?
AlladinOne [14]

Answer:

All enterprise platforms are cloud based.

4 0
3 years ago
Which company developed Power Point ?​
ANTONII [103]
Forethought, Inc.

Explanation:


Microsoft PowerPoint, virtual presentation software developed by Robert Gaskins and Dennis Austin for the American computer software company Forethought, Inc. The program, initially named Presenter, was released for the Apple Macintosh in 1987.
4 0
3 years ago
Read 2 more answers
Other questions:
  • QUESTION 1 Someone may choose to own a car instead of leasing because: AThe car can be resold later to make some money back. BTh
    9·1 answer
  • The network layer, or osi layer 3, provides services to allow end devices to exchange data across the network. to accomplish thi
    15·1 answer
  • You recently purchased a new laptop for home. You want to ensure that you are safe from malware. You should install a personal _
    10·1 answer
  • The ______________________ are incident management personnel that the incident commander or unified command assign to directly s
    10·1 answer
  • A dictionary password attack is a type of attack in which one person, program, or computer disguises itself as another person, p
    5·1 answer
  • Do most good businesses have to deal with conflict
    7·1 answer
  • The information that’s displayed in a datalist control is defined by _____.
    10·1 answer
  • What is the web of trust
    7·2 answers
  • Six external parts of a computer system
    13·1 answer
  • In a non-price rationing system, consumers receive goods and services first-come, first served. Give me an example of a time whe
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!