1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
murzikaleks [220]
3 years ago
10

Please refer to the MIPS solution in the question above. How many total instructions are executed during the running of this cod

e? How many memory data references will be made during execution?
Computers and Technology
2 answers:
irina [24]3 years ago
6 0

Answer:

PLEASE SEE EXPLAINATION

Explanation:

for the code given in C Language :-

for(i=0; i<=100; i++)

{

a[i]=b[i]+C;

}

Given address of a =$a0

Gievn address of b = $a1

$t0 holds i

s0 holds constant C

Assembly Language

addi $t0, $zero, 0

loop: slti $t1, $t0, 101

beq $t1, $zero, exist

sll $t2, $t0, 2

add $t3, $t2, $a1

lw $t3, O($t3)

add $t3, $t3, $s0

add $t4, $t2, $a0

sw $t3, O($t4)

i loop

instructions of 1+101*8=809

101 itereations*2 per itereation sw)=202 data references

Digiron [165]3 years ago
3 0

Answer:

MIPS designs are used in SGI's computer product line; in many embedded systems; on Windows CE devices; Cisco routers; and video consoles such as the Nintendo 64 or the Sony PlayStation, PlayStation 2 and PlayStation Portable. Most recently, NASA used one of them on the New Horizons probe1.

Explanation:

The earliest MIPS architectures were 32-bit fsfs (generally 32-bit wide data paths and registers), although later versions were implemented in 64-bit. There are five backward compatible revisions of the MIPS instruction set, called MIPS I, MIPS II, MIPS III, MIPS IV, and MIPS 32/64. In the last of these, MIPS 32/64 Release 2, a record control set is defined to major. Also several "extensions" are available, such as the MIPS-3D, consisting of a simple set of floating point SIMD instructions dedicated to common 3D tasks, the MDMX (MaDMaX) made up of a more extensive set of integer SIMD instructions that use 64-bit floating-point registers, MIPS16 which adds compression to the instruction flow to make programs take up less space (presumably in response to the Thumb compression technology of the ARM architecture) or the recent MIPS MT that adds multithreading functionalities similar to the HyperThreading technology of Intel Pentium 4 processors

You might be interested in
Make a hierarchical directory structure under /root that consists of one directory containing three subdirectories.
Alika [10]
You can make a hierarchical directory structure under /root that consists of one directory containing subdirectories  by using cd and mkdir
the mkdir command created the directories while the cd command changes which directory you're currently in
5 0
3 years ago
These are statements given by witnesses under oath? A. Testimony B. Admissible Evidence C. Indirect Evidence D. Circumstantial E
Aneli [31]

Answer:A. Testimony

Explanation:when someone knows something about what happened in the case held in court or they had witnessed what happened; In order to actual testify on what they know they are called on the stand and they have to raise their hand as a sign to swear an oath before the can give their testimony in court.

8 0
3 years ago
List the various cases where use of a NULL value would be appropriate.
melomori [17]

Answer:

The answer is below

Explanation:

There are cases where the use of a NULL value would be appropriate in a computer programming situation. These cases can be summarily described below:

The first case is in a situation where the value of the attribute of a certain element is known to exist, but the value can not be found

The second case is in a situation where the value of the attribute of a certain element is not known whether it exists or not.

4 0
3 years ago
In which type of attack does the user respond to several external communication requests? Harry wants to watch a movie online by
Shkiper50 [21]

Answer:

They normaly do that to put a virus on your device And hack into your private info like passwords and credit cards and stuff like that

Explanation:

Always watch a movie leagly

3 0
3 years ago
Assessing opportunity cost involves...
vova2212 [387]

Answer:

Assessing opportunity cost involves <u>making choices and dealing with consequences.</u>

Explanation:

Opportunity cost means that, the cost to gain something with some consequences. If there are multiple opportunities in front of you and you have to analyze or assess each opportunity. In this assessment you have to assess the consequences of all choices or opportunities. After assessing all the opportunities you will select the opportunity in which you have more gain and less consequences.

So we can say that, while assessing different opportunities, we have to make choices and dealing with consequences.

6 0
3 years ago
Other questions:
  • To what extent do you think st. cyprian was effective in his efforts to bring inherited christian teachings to bear on the unpre
    10·1 answer
  • Where does the term for a star network describe? A) a network for Department of Defense scientists to share data about the stars
    13·2 answers
  • Jennifer's company currently uses Windows Active Directory to provide centralized authentication, authorization, and accounting
    14·1 answer
  • How we can get NET I'D by IP Address?
    11·1 answer
  • What is the name for a hardcoded value entered into a formula ?
    8·2 answers
  • I need to know thr full number of pie
    8·1 answer
  • What major criteria must a product or process meet in order to be considered emerging technology?
    7·1 answer
  • Kos-huar-utb garls jonly​
    8·2 answers
  • Write a program that (a) generates a vector with 20 random integer elements with integers between -29 and 30, (b) replaces all t
    13·1 answer
  • Select the correct answer. Which input device uses optical technology?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!