1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
RoseWind [281]
3 years ago
9

Use the following data definitions data myBytes BYTE 10h,20h,30h,40h myWords WORD 3 DUP(?),2000h myString BYTE "ABCDE" What will

be the value of EAX after each of the following instructions execute? mov eax,TYPE myBytes ; a. mov eax,LENGTHOF myBytes ; b. mov eax,SIZEOF myBytes ; c. mov eax,TYPE myWords ; d. mov eax,LENGTHOF myWords ; e. mov eax,SIZEOF myWords ; f. mov eax,SIZEOF myString ; g.
Computers and Technology
1 answer:
Elena-2011 [213]3 years ago
8 0

Answer:

<em>Given Data:</em>

<em>myBytes BYTE 10h, 20h, 30h, 40h </em>

<em>myWords WORD 3 DUP(?), 2000h </em>

<em>myString BYTE "ABCDE"</em>

<em />

Based on the data that we are given we can conclude that:

(a).     a. EAX = 1

         b. EAX = 4

         c. EAX = 4

         d. EAX = 2

         e. EAX = 4

         f. EAX = 8

         g. EAX = 5

You might be interested in
______ is an example of unauthorized access to your computer or accounts.
pychu [463]
Well, it wouldn't be Adware because that just has to do with ads and stuff...
It wouldn't be cookies either because they just store things to make life easier.

It would be between Phishing and Hacking. I don't think it's Phishing because that's tricking someone into giving them your account information.

I think it would be hacking.

I hope that this helps. If it does, please rate it as Brainliest :D


4 0
3 years ago
Jeffrey works with a huge database of spreadsheet records each day. To organize and identify these spreadsheets, he wants to ass
mariarad [96]

Answer:

A. Document Properties

B. Permission

C. Document Options

D. File Details

The answer to this question is "File Details " . This will help Jeffrey works efficiently with a huge database of spreadsheet records each day. He can assign names to these File Details which represents each spreadsheet records. This will help his report more organized and easy to identity.

8 0
3 years ago
Derek is working at the help desk when he receives a call from a client about an issue with the company's email. The customer is
jeka57 [31]

Answer:

Give the customer time to express his/her anger and then restart the conversation.

Explanation:

A person working as a help desk executive is meant to be equipped with customer service skills and experience. They are the mediator between the customers and the actual service providers in a company.

A good help desk executive should have good communication skills, they should have the ability to diffuse tension which it needed in this context.

7 0
3 years ago
When you pass an argument to a method, the argument's data type must be ____________ with the receiving parameter's data type?
Sedbober [7]
Any time you pass an argument to a method, the data type arguments must be assignment compatible with data type receiving parameter.
<span />
6 0
3 years ago
This is a bit confusing to me. Could someone please help me! I have to use CSS to Design a Web Page. I will mark Brainliest!
GrogVix [38]

Answer:

CSS is easy

Explanation:

CSS is like the color or your sylte for a webpage.

6 0
3 years ago
Other questions:
  • Marie uses a browser to visit a blog. What is the unique identifier of the blog?
    5·1 answer
  • Which keyboard feature is a form feed character?
    14·1 answer
  • true /falseCompression of entries in the term-document matrix can be used to reduce run-time storage and execution-time requirem
    10·1 answer
  • Why it’s important to keep the standard internet protocol TCP/IP?
    11·1 answer
  • Arrays are described as immutable because they are two dimensional. are arranged sequentially. can be reordered. cannot be chang
    11·1 answer
  • If your database is in archivelog mode, how can you force an archive?
    7·1 answer
  • Voice authentication requires speech to text capability Facial recognition may be used for authentication The human iris is uniq
    6·1 answer
  • Write a C program to input a character, then check if the input
    5·1 answer
  • What feature is available to add a suggestion in the margin of someone else's document?​
    15·1 answer
  • State whether the given HTML coding is True or False. &lt;HR SIZE=5 COLOR=YELLOW ALIGN=RIGHT WIDTH=75%&gt;​
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!