1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Aleks [24]
3 years ago
12

[Assembly Language]Extended Subtraction Procedure.Create a procedure named Extended_Sub --(Receives: ESI and EDI point to the tw

o integers, EBX points to a variable that will hold the result, and ECX indicates the size of operands (multiple of 32 bits). (Returns: nothing)It subtracts two binary integers of arbitrary size. The storage size of the two integers must be the same, and their size must be a multiple of 32 bits.Use the following data to test your program:.dataop1 QWORD 0A2B2A40674981234hop2 QWORD 08010870000234502hresult QWORD 1 DUP(0)
Computers and Technology
1 answer:
alex41 [277]3 years ago
5 0

Answer:

Modern (i.e 386 and beyond) x86 processors have eight 32-bit general purpose registers, as depicted in Figure 1. The register names are mostly historical. For example, EAX used to be called the accumulator since it was used by a number of arithmetic operations, and ECX was known as the counter since it was used to hold a loop index. Whereas most of the registers have lost their special purposes in the modern instruction set, by convention, two are reserved for special purposes — the stack pointer (ESP) and the base pointer (EBP).

For the EAX, EBX, ECX, and EDX registers, subsections may be used. For example, the least significant 2 bytes of EAX can be treated as a 16-bit register called AX. The least significant byte of AX can be used as a single 8-bit register called AL, while the most significant byte of AX can be used as a single 8-bit register called AH. These names refer to the same physical register. When a two-byte quantity is placed into DX, the update affects the value of DH, DL, and EDX. These sub-registers are mainly hold-overs from older, 16-bit versions of the instruction set. However, they are sometimes convenient when dealing with data that are smaller than 32-bits (e.g. 1-byte ASCII characters).

When referring to registers in assembly language, the names are not case-sensitive. For example, the names EAX and eax refer to the same register.

Explanation:

You might be interested in
How dose computers it use the information to solve problems
S_A_V [24]

Answer:

A programmer's job is to find solutions. They break down problems into easy steps for a computer. 

Explanation:

hope I'm helping you!

8 0
3 years ago
A certain computer can be equipped with 268,435,456 bytes of memory. Why would a manufacturer choose such a peculiar number inst
Arte-miy333 [17]

Answer:

Computer system use Binary and it uses power of 2 only.

Explanation:

The reasons for equipping memory with a peculiar number instead of round or even number are as follows:

  • The computer system uses the power of 2 instead of the power of 10 to equipping memory and hence use a number like 250,000,000 is not possible.
  • The computer systems work on the memory where 1 MB or 1 megabyte shows as 1024 kb or 1,048,576 bytes.
  • In computer system memory capacity is always some multiply of 1024 bytes.
  • Hence, 268,435,456 bytes of memory shows 256 MB of memory.

5 0
4 years ago
what is the greatest number of bits you could borrow from the host portion of a class b subnet mask and still have at least 130
Lina20 [59]

The greatest number of bits you could borrow from the host portion of a class b subnet mask and still have at least 130 host per subnet is 24.

<h3>What is a host bit?</h3>

Host bits are known to be the parts of an IP address that can state out a particular host in any subnet.

Note that whenever we take or borrow an host-bit, we can also double the number of subnets that we are said to create and as such, when we borrowing 2 host bits we can have 4 subnets.

Learn more about Bits from

brainly.com/question/19667078

6 0
2 years ago
To give text an outline, you can use which command?
Sindrei [870]

Answer:

To show all text in an outline. Position the cursor the and then press

Alt + Shift + A

Explanation:

8 0
4 years ago
Identify one type of business or organization that you believe would have serious risks if they chose to use VLANs and/or VPNs.
german

Answer:

National security agency

Explanation:

A lot of the private VPNs are own by corporations outside the USA, a national security agency is constantly sending sensitive and priceless data over the internet, when you decide to use a VPN it is possible for the service provider to share the decrypted information with others, therefore, if the national security agency at issue decide to use the service of an unscrupulous VPN provider their sensitive information could end in the hands of a foreign government who is willing to pay a lot for the data.

Note: there could be a case in which the VPN service provider is not corrupted, but the government forces them to share the information through legal actions.

5 0
4 years ago
Other questions:
  • Using the College Registration example from Section 6.7.3 as a starting point, do the following:
    5·1 answer
  • A network administrator has received the IPv6 prefix 2001:DB8::/48 for subnetting. Assuming the administrator does not subnet in
    11·1 answer
  • Which design approach help build sites that optimize varied screen sizes
    5·1 answer
  • Which of the following does not illustrate the survey method of choosing a speech topic?
    6·2 answers
  • What did the Copernican revolution demonstrate?
    15·1 answer
  • ? I don’t understand
    8·2 answers
  • Write function that ask for input from a user. Use this input as input for the countdown function that we wrote using the while
    6·1 answer
  • Im lonnnelllly........................who want to date
    11·1 answer
  • After inserting a video into your slide how can you test it
    11·1 answer
  • ANSWER ASAP!!!!!!
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!