1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anuta_ua [19.1K]
4 years ago
10

Write a C function which mimics the behavior of the assembly language function below. Note that this time, the assembly language

code is recursive (despite –O2 compilation), and your C code should likewise be recursive.
f:
cmpl $1, %edi
je .L3
xorl %eax, %eax
testl %edi, %edi
jle .L7
subq $8, %rsp
subl $1, %edi
call f
testl %eax, %eax
sete %al
addq $8, %rsp
movzbl %al, %eax
.L7:
ret
.L3:
movl $1, %eax
ret
Computers and Technology
1 answer:
Digiron [165]4 years ago
6 0

Answer:

#include <stdio.h>

int f(int edi) {

 

  if (edi == 1) {

      return 1;  

  }

  if (edi <= 0) {

      return 0;

  }

 

  edi--;

  int eax = f(edi);

 

  if(eax == 0) {

      return 1;

  } else {

      return 0;

  }

}

int main(void) {

  int edi = 9;

  int ret;

  ret = f(edi);

  printf("%d", ret);

  return 0;

}

Explanation:

  • Inside the function f, check if edi is 1 or less than 1 and then return a number accordingly.
  • Decrement the edi variable, call the f function and assign its value to eax.
  • Check if eax is equal to 0 then return 1 else return 0.
  • Inside the main function, call the f function by passing the edi value and finally display the value of ret.
You might be interested in
This formatting option functions like a space bar. However, instead of moving one space at a time, it allows you to move your te
uysha [10]
Would it be Tab. I know that if you are in Microsoft word it works like that.<span />
3 0
3 years ago
Which term describes an event where a person who does not have the required clearance or access caveats comes into possession of
notka56 [123]

Answer:

The answer is "compromise"

Explanation:

In computer science, the comprised system is used to describe as any technological resource, that has been negatively affected by an untrustworthy source for nondisclosure, integrity or accessibility either deliberately or inadvertently.

  • In this, the mechanical interaction from the unauthorized source or technological progress can result in compromise.
  • This helps you and the partner to meet each other's interests by taking into consideration both the positions and the solution to the main problem.

4 0
3 years ago
Read 2 more answers
You have been doing a lot of web surfing lately as part of your research for your course and along the way you have noticed a gr
creativ13 [48]

The generated code component that executes on the web server is the following does Laura tell you is NOT a component of the active server page.

a. the generated code component that executes on the web server

<u>Explanation:</u>

Asp technology is where it is a combination of both  HTML and visual basic programming. Asp web pages are executed in server and display as Html to the end-users.

With the HTML coding, only static pages can be developed whereas through ASP web pages are developed and which contains visual basic coding languages and for client-side validates in ASP web pages either javascript or visual basic scripts are used.

Each ASP web pages are compiled at the server end and executed and complied out HTML pages are shown in web pages.

We need to install the ASP component at the server to execute the ASP web pages.

3 0
3 years ago
Nolan has just created a linked cell to another cell in a separate worksheet in his current Excel 2016 workbook.
kipiarov [429]

Answer: dependent

Explanation:

A Cells containing formulas which refer to other cells are known as dependents.

These are cells that depend on values in the selected cell.

A dependents cell can either contain a formula or a constant value.

(Ctrl + ] ) Is used as a shortcut when selecting dependents cells in an active cell.

Another option is to make use of you (Tools > Formula Auditing > Trace Precedents).

4 0
3 years ago
Read 2 more answers
Who is the three president of somalia​
Snezhnost [94]

Answer:

Siad Barre

Explanation:

3 0
3 years ago
Read 2 more answers
Other questions:
  • If you have a 3D printer please show me a vid of you making something because I'm interested in getting one. Ty! Also can someon
    12·1 answer
  • What will happen with communication methods in five years?
    8·1 answer
  • How do I learn coding??? ​
    5·2 answers
  • You want to display the process of raising a scholarship request and its approval on a slide. Which element in the presentation
    5·1 answer
  • Does Windows 7 support secure boot in UEFI? Windows eight? Linux UBUNTU version 14?
    8·1 answer
  • Kelvin owns a small trading firm. Recently, he suspected that some of his employees were using fraudulent activities for their p
    5·2 answers
  • What is ana absolute adress
    11·1 answer
  • Which composer below was not part of the classical period? <br> A. Beethoven B. Bach<br> C. Mozart
    6·1 answer
  • Pls help me<br> first one to answer correctly gets brainly points
    6·2 answers
  • What is digital marketing?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!