1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nookie1986 [14]
3 years ago
14

Translate the following C program to Pep/9 assembly language. It multiplies two integers using a recursive shift-and-add algorit

hm. mpr stands for multiplier and mcand stands for multiplicand.A recursive integer multiplication algorithm#include int times(int mpr, int mcand) { if (mpr == 0) { return 0; } else if (mpr % 2 == 1) { return times(mpr / 2, mcand * 2) + mcand; } else { return times(mpr / 2, mcand * 2); }}int main() { int n, m; scanf("%d %d", &n, &m); printf("Product: %d\n", times(n, m)); return 0;}
Computers and Technology
1 answer:
Artemon [7]3 years ago
3 0

Answer:

Explanation:

Data BP

You might be interested in
Sometimes news organizations have biasis because
elena55 [62]
Every person has their own personal beliefs, we are all human, so sometimes the news can include biasis because someone put their personal opinion in what they say/write.
5 0
3 years ago
The Freeze Panes feature would be most helpful for which situation?
sergiy2304 [10]

Answer:

i think a but not so sure

Explanation:

6 0
3 years ago
Do like TikTok??????
OlgaM077 [116]

Answer: you should it’s addicting

!!!! ?”!!!!

Explanation:

8 0
3 years ago
Read 2 more answers
___________ is some danger that can exploit a vulnerability.
andreyandreev [35.5K]

<u>Threat </u>is some danger that can exploit a vulnerability.

<h3>What is Threat?</h3>

Threat  is seen as Anything that can be able to take advantage of a vulnerability, intentionally as well as  accidentally, and take or damage, the  asset of a person.

Note that a threat is that which a person or firm is protect against and Vulnerability is seen as Weaknesses.

Therefore, <u>Threat </u>is some danger that can exploit a vulnerability.

Learn more about vulnerability from

brainly.com/question/25633298

#SPJ1

8 0
2 years ago
Write smallest to largest: Byte, bit, MB, PB, GB, nibble
OlgaM077 [116]

Answer:

  1. bit
  2. nibble
  3. byte
  4. MB
  5. GB
  6. PB

Explanation:

this is it!!!

3 0
3 years ago
Read 2 more answers
Other questions:
  • What is life all about?
    15·2 answers
  • Which of the following cannot be performed from the windows task manager?
    15·2 answers
  • Give a recursive implementation for the function: def is_sorted(lst, low, high) This function is given a list of numbers, lst, a
    10·1 answer
  • Create a program that generates a report that displays a list of students, classes they are enrolled in and the professor who te
    11·1 answer
  • What is the importance of human flourishing to science and technology?​
    8·1 answer
  • Julie is purchasing new shoes on a website for her favorite store. Which of the following would indicate that a website is a sec
    6·1 answer
  • Select the correct answer from each drop-down menu. What are the effects of emerging technology? has brought the internet to alm
    10·1 answer
  • Escribe 10 ejemplos de lo que consideras un byte
    5·1 answer
  • Your customer said that understanding the directions is difficult. This is an aspect of
    6·1 answer
  • Functions are used to _________
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!