1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Arlecino [84]
3 years ago
6

4-Translate the following C program to MIPS assembly program (Please explain each instruction in your code by a comment and subm

it a .asm file) int main() { char Str1[6]= {'h','e','l','l','o','\0'}; char Str2[5]= {'m','a','r','s','\0'}; int i, j; i = 0; while( Str1[i]!='\0') { i++; } j = 0; while( Str2[j]!='\0') { Str1[i] = Str2[j]; i++; j++; } Str1[i] = '\0'; printf("\n String after the Concatenate = %s", Str1); return 0; }
Computers and Technology
1 answer:
earnstyle [38]3 years ago
3 0

Answer:

.data

str1: .asciiz "Hello"

str2: .asciiz "mars"

msg: .asciiz "String after the concatenate: "

.text

main:

#load the address str1 to $a0

la $a0,str1

#initialize $t0 with 0

li $t0,0

#loop to find the length of str1

#$t0 stores the length of str1

loop1:

#load byte of $a0 to $t1

lb $t1,0($a0)

#branch for equal.If $t1 equal to 0,jump to label stop1

beq $t1,0,stop1

addi $t0,$t0,1 #increase the count

addi $a0,$a0,1 #increase the address

#jump to label loop1

j loop1

stop1:

#load the address of str2 to $a1

la $a1,str2

#loop2 concatenate the each element in str2 to str1

loop2:

lb $t2,0($a1) #load character in str2 to $t2

sb $t2,0($a0) #store value in $t2 to str1

beq $t2,0,stop2

addi $a1,$a1,1 #increase the address of str2

addi $a0,$a0,1 #increase the address of str1

j loop2

stop2:

#syscall for print string is $v0 = 4

#syscall to termiante the program is $v0 = 10

#print the message

li $v0, 4

la $a0, msg

syscall

#print the concatenated string

li $v0,4

la $a0,str1

syscall

#termiante the program

li $v0, 10

syscall

Explanation:

You might be interested in
In this exercise, first run the code as it is given to see the intended output. Then trace through each of the 3 variables to se
dlinn [17]

Answer:

The memory with variable names str1, str2, and str3 all have equal and the same value after the first if-statement.

Explanation:

The str1 was first assigned a null value while the str2 and str3 were assigned the string value "Karen" with the String class and directly respectively. On the first if-statement, the condition checks if the str1 is null and assigns the value of the variable str2 to str1, then the other conditional statement compares the values of all the string variables.

3 0
3 years ago
Storage device that is installed inside your computer is called?
liraira [26]
Its either called an HDD or an SSD
3 0
3 years ago
Why is sequencing important?
S_A_V [24]

Answer:

C

Explanation:

If it wasn't in order then the code would fail

4 0
3 years ago
Read 2 more answers
You are purchasing a new printer. Which of the following is the most important requirement?
OlgaM077 [116]

Question↓

You are purchasing a new printer. Which of the following is the most important requirement?

Answer↓

A. Is the printer compatible with your computer's operating system?

If The Printer is Not Compatible With your Computer you will not Be able to Use Therefore, you Will have to buy a New One.

xXxAnimexXx

Hope this Helps! ^ω^

7 0
3 years ago
Determine the efficiency and big-O notation for the following algorithm:
Anon25 [30]

Answer and Explanation:

To calculate Big O, go through each line of code and determine O(!), O(n) and return your calculation.

For example,

In O (5 +6n), where 6 5 represent five instances of O(1), and 6 represent the 6 O(n).

We compute the time complexity of the algorithm. We get the result, just an estimation. In given algorithms, run time in milliseconds has been provided, such as in T (1) algorithm process in 512 milliseconds and T(2) algorithms process 8129 milliseconds. But big O notation not measured in milliseconds. Information given is not enough to calculate the big O notation.

       

8 0
3 years ago
Other questions:
  • To extend the bottom border of a hyperlink across the complete width of a navigation list, change the ____ property of each hype
    9·1 answer
  • Sending packets with false ip source addresses is called ____. ip address spoofing a port scanning attack a ip address scanning
    11·1 answer
  • Which law was established to prevent law enforcement agencies from accessing communication through telephone and digital mediums
    8·2 answers
  • The concept of a process in an operating system embodies two primary characteristics, one of which is:
    15·1 answer
  • To properly insert a memory module, you must locate the direction of the ______ .
    14·1 answer
  • What is it with the order of operations
    9·1 answer
  • In which circumstances would the view side by side feature be useful or helpful.
    15·2 answers
  • Fill in the blanks!
    14·1 answer
  • What are different ways that celebrities try to connect with fans using the Internet and social media?
    5·1 answer
  • I WILL GIVS BRAINLIEST IF U ANSWER THIS
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!