1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vitek1552 [10]
4 years ago
14

Use a loop with indirect or indexed addressing to reverse the elements of the integer array in place. Do not copy the elements t

o any other array. Use the SIZEOF, TYPEOF, and LENGHTOF operators to make the program as flexible as possible if the array size and type should be changed in the future. Optionally, you may display the modified array by calling the DumpMem method from the Irvine32 library.
Computers and Technology
1 answer:
finlep [7]4 years ago
4 0

Answer:

INCLUDE Irvine32.inc

.data

      ;declare and initialize an array

      array1 DWORD 10d,20d,30d,40d,50d,60d,70d,80d,90d

.code

main PROC

      ;assign esi value as 0

      mov esi,0

      ;find the size of array

      mov edi, (SIZEOF array1-TYPE array1)

      ;find the length of the array

      ;divide the length by 2 and assign to ecx

      mov ecx, LENGTHOF array1/2

;iterate a loop to reverse the array elements

L1:

      ;move the value of array at esi

      mov eax, array1[esi]

      ;exchange the values eax and value of array at edi

      xchg eax, array1[edi]

      ;move the eax value into the array at esi

      mov array1[esi], eax

      ;increment the value of esi

      add esi, TYPE array1

      ;decrement the value of edi

      sub edi, TYPE array1

      loop L1

;The below code is used to print

;the values of array after reversed.

      ;get the length of the array

      mov ecx, LENGTHOF array1

      ;get the address

      mov esi, OFFSET array1

L2:

      mov eax, [esi]

      ;print the value use either WriteDec or DumpMems

      ;call WriteDec

      ;call crlf

      call DumpMem

      ;increment the esi value

      add esi, TYPE array1

      LOOP L2

exit

main ENDP

END main

You might be interested in
Barry discovers that an attacker is running an access point in a building adjacent to his company. The access point is broadcast
qwelly [4]

Answer: Option (A) is correct

Explanation:

Evil twin is known as a fraudulent point of access in a Wi-Fi which tends to  appear to be honest and legitimate but is known as a set up to oversee on the wireless communications. Evil twin is referred to as the WLAN equal of a phishing scam.  This kind of attack is mostly used in order to steal passwords of an unsuspecting users, that is done either by by phishing or by monitoring the connection, this mostly involves developing a fake web site and thus luring people.

8 0
3 years ago
To rename a worksheet, you change the text on the ? HELP ASAP
prohojiy [21]
If this is Excel, it would be C. Sheet tab
5 0
3 years ago
Select the correct answer.
Veronika [31]
I think it’s c. llS....
6 0
3 years ago
Read 2 more answers
PLS HELP WITH MY PYTHON HW ILL GIVE YOU BRAINLIEST
Nezavi [6.7K]

Answer:

class Cat:

   isHungry = None

play = Cat().isHungry = True

eat = Cat().isHungry = False

if play:

   print("I am hungry, I cannot play")

else:

   play = Cat().isHungry = False

if eat:

   print("I am full, I cannot eat")

else:

   eat = Cat().isHungry = True

Explanation:

Just simple if and else statements.

4 0
3 years ago
Can you install Ubuntu on a hard drive by porting from the folder to the HDD?
Len [333]

No you can not. It will not allow you to

8 0
3 years ago
Other questions:
  • Microsoft windows is the least used operating system true or false?
    15·2 answers
  • Write a program whose input is two integers and whose output is the two integers swapped. Place the values in an array, where x
    12·1 answer
  • Which entity might hire a computer systems analyst to help catch criminals?
    14·2 answers
  • Name the months that have 30 days​
    6·2 answers
  • Why is it important to have at least one backup stored off-site?
    8·1 answer
  • Assume a TCP segment consisting of 1500 bits of data and 160 bits of header is sent to the IP layer, which appends 120 bits of h
    14·1 answer
  • Which of the following is not a valid variable name? 2 myInt 2. return 3. myInteger 4. total3
    6·1 answer
  • Which of the following is a negative effect of the rise in agricultural technology following World War II?
    5·1 answer
  • Write the following abbreviations in full next to the question number
    15·1 answer
  • A(n) ____________ calculator is a device that assists in the process of numeric calculations but requires the human operator to
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!