1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mixer [17]
3 years ago
6

What two actions does the RETI instruction perf orm? Why must these two actions be done in a single instruction, as opposed to a

llowing the programmer to use multiple instructions?
Computers and Technology
1 answer:
Bas_tet [7]3 years ago
5 0

Answer:

In assembly language, two instructions control the use of the assembly language procedure.

  • CALL
  • RET

CALL pushed the control to the return address onto the stack and transferred the control.

RET instruction returns the address that placed on the stack by a call instruction.

Explanation:

Action RET instruction

  • The RET instruction pops the address and returns off the stack, which is pointed by the stack pointer.
  • The stack is LIFO in memory at a particular location, and the pointer points offset from the stack location.

RET instruction does its job by consulting the register and memory state at the point when it is executed.

In RET instruction, only register and memory state is executed. Call instruction must save that address that figure out in a register and memory location.

You might be interested in
which of the following is not a name of one of the central features of Facebook timeline activity log Graph Search for Daily New
Pani-rosa [81]
The correct answer is Graph Search for Daily News

This does not exist on Facebook, unlike the timeline and the activity log.
3 0
3 years ago
The difference between natural and technological system
kari74 [83]
Natural systems are systems that came into being by natural processes. Like the rain cycle.

Technological systems are those to whom people intervened or designed. Like diverting water for a rider for land irrigation.
5 0
3 years ago
If you configure any more passwords on the switch, will they be displayed in the configuration file as plain text or in encrypte
Elza [17]

Answer:

The "service password-encryption" global configuration command encrypts passwords configured before and after the command is issued.

Explanation:

A switch is an intermediate network device that is used to transfer frames to nodes on its collision domain. It operates in the Data-link layer of the OSI model.

Switches uses media address control (MAC) table, containing the MAC addresses of the nodes in the network, to determine the destination of nodes.

In the global configuration mode in a switch, the password and other protocols are configured. The service password-encryption command in the global execution mode encrypts passwords configured before and after the command.

4 0
3 years ago
Only one person can receive the same email at the same time true or false
nasty-shy [4]

Answer:

false

Explanation:

5 0
3 years ago
The man-in-the-middle attack<br> means what
Tom [10]

Answer:

<em> where the attacker secretly relays and possibly alters the communications between two parties who believe that they are directly communicating with each other.</em>

Explanation:

4 0
3 years ago
Other questions:
  • Where is the insert function button found in microsoft excel?
    11·1 answer
  • Being able to express your thoughts in an email is a primary technology skill. True or False
    8·2 answers
  • Peripherals can be used to input information. True False
    6·2 answers
  • Which step can most directly help your team follow up on decisions made during Web development meetings?This task contains the r
    6·1 answer
  • An app builder has created a report for sales people to view records from the custom object, some users have complained that the
    8·1 answer
  • A5.3 1012 kg satellite is 1,800 m from another satellite that has a mass of 3.5 x 108 kg. What is the gravitational
    6·1 answer
  • Use HTML to create a web page
    10·1 answer
  • 24 POINTS!!! <br> Why are Sequences, Selection, and Iteration building blocks of algorithms?
    5·1 answer
  • ___ is a form of electronic money that is decentralized and whose transactions are encrypted, processed, and recorded via peer-t
    10·2 answers
  • What is software engineering? What are the objectives of software engineering?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!