1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
MakcuM [25]
3 years ago
13

Write a MIPS program to continuously generate the following series of integers: 1, 2, 3, 6, 9, 18, 27, 54, 81, and so on. Use st

andard MIPS programming conventions. Use the jump instruction to generate an infinite loop. Write a subroutine EVEN that returns a 1 if the argument is even, else it returns a 0. You must call this subroutine with jal and return from it with jr. The MIPS program must be converted into machine code and placed in the instruction memory. The sequence can be computed by adding the value to itself if it is odd and by adding the previous value to it if it is even. Before replacing the test program in the instruction memory, make sure that your design works for the provided Test-Program.
Computers and Technology
1 answer:
Pachacha [2.7K]3 years ago
3 0

Answer:

Explanation:

Here is a working solution in MIPS

.data

space: .asciiz ", "

.text

li $t1, 1       #Start at 1

li $t2, 1       #Store last value

li $t4, 1000    #terminate at 1000

li $t7, 2       #For division (divide by 2)

loop:

li $v0, 1

add $a0, $t1, $zero #print $t1

syscall

div $t1, $t7      #divide $t1 by 2

mfhi $t5          #get the remainder

move $t6, $t1     #hang on to what $t1 was originally

beqz $t5, even    #if the remainder is 0, it's even

add $t1,$t1,$t1    #it's odd, so add to itself

move $t2, $t6      #store what $t1 was originally to last value

bgt $t1, $t4, done #if the number is over 1000, we're done

li $v0, 4           #Print a comma and space

la $a0, space

syscall

j loop

even:

add $t1,$t1,$t2    #set $t1 = $t1 + Last value ($t2)

move $t2, $t6      #store what $t1 was originally to last value

bgt $t1, $t4, done #if the number is over 1000, we're done

li $v0, 4           #Print a comma and space

la $a0, space

syscall

j loop

done:

You might be interested in
A(n) ________ software installation copies all the most commonly used files to your computer's hard drive.
irinina [24]

Answer:

Full

Explanation:

According to my research on IT tasks, I can say that based on the information provided within the question this type of software installation is called a Full Software Installation. This type of installation is usually done when installing a brand new operating system, which you then need to install all the necessary software that is commonly needed.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

8 0
3 years ago
When did internet came to existence?
Luden [163]
1982 the Internet protocol was introduced as the standard network protocol on the ARPANET.

1981 access to the ARPANET was expanded.
7 0
3 years ago
. When attempting to minimize memory usage, the most efficient way to do group processing when using the MEANS procedure is to u
MrRissso [65]

Answer:

A. the BY statement.

Explanation:

The BY statement aids the procedure MEANS to develop the tree for the current BY group only, thereby analyze the stats, and clean the tree prior to the start and development of the next BY group.

However, without the BY statement, procedure MEANS develops its AVL tree for both the whole file and all sector estimates crossings established in CLASS.

Hence, in this case, the correct answer is the BY Statement.

8 0
3 years ago
What are source data entry devices​
matrenka [14]

Answer:

<u><em>Source data entry devices are used for audio input, video input and to enter the source document directly to the computer. Source data entry devices do not require data to be typed-in, keyed-in or pointed to a particular location.</em></u>

Explanation:

7 0
3 years ago
Answer the following questions for Web browser and Web server software: 1. What functions should this software application provi
timurjin [86]

Answer:

Explanation:

Functions should a software application provide to keep a web browser secured

1) The web browser should always be updated, so kindly keep the "automatic update" option enable on your browser settings so that whenever the browser gets an update, it will be updated automatically.

2) Always keep the third party cookies disabled because there are so many unauthorized and phishing sites over the internet they may lead the browser unsafe and cause very higher security risk so block all the third party sites and cookies from the browser

Functions should a software application prohibit to keep a web browser secured

1) Do not store passwords on your web browser, deny the "store password" option on your browser settings. Even if you store passwords on your web browser do set a very strong master password to access all the stored passwords.

2) Do not click on unwanted, unknown hyperlinks. There will be many unsolicited attachments, PDFs, DOCs, files, etc over the internet so do not open or download it unnecessarily.

Functions should a software application provide to keep a web server secured

1) Always use an application scanner. Whenever you install or download any new applications do scan the application before accessing it.

2) Install all the security patches because there are more number of hackers over the internet so do not deny installing the security patcheds on time.  

Functions should a software application prohibit to keep a web server secured

1) When an application is not in use for long time, better uninstall it because they are actually of no use so do uninstall all the unwanted softwares or applications along with extensions.

2) There may be scripts, files, setups, codes stored on the web server unknowingly so do check it and delete all the sample scripts, files and codes from the web server.

5 0
3 years ago
Other questions:
  • Which of the following describes a hash algorithms ability to avoid the same output from two guessed inputs?A. Collision avoidan
    12·1 answer
  • explain the key reasons why entity relationship modeling is important, and determine at least (1) way in which it impacts the ov
    5·1 answer
  • Which command will display the current contents of non-volatile random-access memory (nvram)?
    14·1 answer
  • Convert the following pseudi code to C++ code. BE sure to define the apprpriat evariables.
    9·1 answer
  • An extranet is like an intranet except that it allows company employees access to corporate Web sites from the ______
    13·1 answer
  • All nuclear energy results in the rapid release of energy, such as in atomic bombs. true or false
    8·1 answer
  • What are the text or graphics that are lighter than the main text located in a document's background called?
    10·1 answer
  • Which function of a word processing program enables you to apply a preset formatting
    5·1 answer
  • Write a program that asks the user for the name of a text file. The program should display the first 10 lines of the file on the
    6·1 answer
  • A small business named Widgets, Inc. has hired you to evaluate their wireless network security practices. As you analyze their f
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!