1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
katrin [286]
3 years ago
11

Assembly (Procedure and Conditional Processing). For the following program, what are outputs for register EAX, EBX, ECX, and EDX

in decimal? include Irvine32.inc .code main proc mov eax, 10 mov ebx, 10 mov ecx, 10 mov edx, 10 call proc1 call DumpRegs exit main endp proc1 proc uses ebx ecx L1: add eax, 1 add ebx, 1 loop L1 cmp ebx, 20 jne return mov edx, 20 return: ret proc1 endp end main EAX = ____________________ EBX = ________________________ ECX = ____________________ EDX = ________________________
Computers and Technology
1 answer:
marta [7]3 years ago
7 0

Answer:

See explaination

Explanation:

Given data:

.code main

mov eax, 10 means eax=10,(now eax register contain 10)

mov ebx ,10 means ebx=10

mov ecx, 10 means ecx=10

mov edx, 10 means edx =10

call proc1 measn invoke the proc1 function

call DumpReg means Display the register

exit main endp means main function closed

///// now proc1 function part'

L1 means it's start a scope as loop

add eax, 1 means increament one or eax=eax+1 => 11 ( because eax was 10 )

add ebx , 1 means ebx=ebx+1 =>11

Loop L1 means this is loop

cmp ebx ,20 compare ebx with 20

jne return means if ebx==20 then jump onto return statement else go ahead

mov edx 20 means edx=20

retunrn : ret proc1 endp endp main means when return statement come it will end then proc1 and redirect to main function;

after exicute this code :

EAX contain 11

EBX contain aslo 11

ECX contain 10

EDX contain 20

You might be interested in
In a DTP project, Fiona is looking for a way to make a page layout attractive to readers. Help Fiona pick the correct word to co
Jlenok [28]

You’ll need a(n)  a block of bold text to capture the attention of your audience.

<h3>How do you make text bold in pages?</h3>

First one need to select Format  and then Font and then Bold.

Note that  by bolding a selected text, it can capture the mind of the people to the page layout.

Hence, You’ll need a(n)  a block of bold text to capture the attention of your audience.

Learn more about  page layout  from

brainly.com/question/12129748

#SPJ1

8 0
2 years ago
What type of power flaw involves a fluctuation in voltage levels caused by other devices on the network or by EMI?
HACTEHA [7]

Answer:

noise is the correct answer for the above question.

Explanation:

  • The noise is a term which is a barrier in the network of communication. It forces the signals to make a delay in data transfer. It is caused by any device or mechanism.
  • For example, if any data is transferring, but some device makes fluctuation in wire, then the communication voltage is disturbed.
  • The above question asked about the term which born with the help of some devices and it caused the fluctuation in the voltage. So the term is known as noise.
4 0
4 years ago
As we learned in this lesson, a byte is about the same amount of memory as a character, such as the letter 't'. There are approx
Papessa [141]

Answer:

Give an example of a special purpose computer that you are familiar with and briefly describe its hardware and its software.

One example of a special purpose computer is a microwave because the programs on a microwave (like the "Popcorn" program) can't be changed. The hardware of a microwave include its buttons, the door, the light bulb, the transformer, the waveguide, the magnetron, and the control circuit. The software of a microwave is all of the programs that make the microwave run. These include the "Popcorn" program that is supposed to perfectly make your popcorn, the "Sensor" program that senses for a certain type of food/drink and adjusts the temperature accordingly, or a "Defrost" program which can be used to defrost meat.

   2. Explain in your own words the difference between running your app by "Connecting to the Companion" and running your app by "Packaging" it.

When running the app by "Connecting to the Companion", the MIT companion app transfers the software (blocks) to the phone and then interprets them for the Android operating system. The Android OS takes the software and interprets it for the phone's processor so the app can run. Because of the way "Connecting to the Companion" works, the code can be re-interpreted every time a change is made. This process is known as interpretation because the code is constantly being re-interpreted.

When running the app by "Packaging" it, a program changes the software (blocks) on the computer into binary code and then packages it in an .apk file. Using a barcode scanner or another piece of software, the .apk file can be loaded onto the phone so the Android OS can interpret the code for the phone's processor. This process is called compilation since all of the source code is changed into binary.

     3. As we learned in this lesson, a byte is about the same amount of memory as a character, such as the letter 't'. There are approximately 7 million characters in all of the Harry Potter novels combined. How many bytes of memory would all of the Harry Potter novels take up? How many copies of the Harry Potter novels would fit on a 7 Gigabyte flash drive. (Remember 1 Gigabyte is 1 billion bytes.)

The Harry Potter novels would take up approximately 7 million bytes. This means that 1,000 copies of the Harry Potter novels could fit on a 7 Gigabyte flash drive!

5 0
4 years ago
Patti would like more information about product recalls. Which of the following resources would not be reliable and relevant? ww
motikmotik
The first list since it wasn't updated in so long.
8 0
3 years ago
Read 2 more answers
In a stack, if a user tries to remove an element from an empty stack it is called.
Sergeu [11.5K]

In a stack, if a user tries to remove an element from an empty stack it is called underflow.

<h3>What is underflow?</h3>

When we attempt to pop (remove) anything off the stack but there is nothing there to remove, stack underflow occurs. The computer will kind of sound an alert as a result of what we taught it to do, which is impossible.

The options are:

1) Underflow

2) Empty collection

3) Overflow

4) Garbage collection

As we know,

When an item is requested from the stack but the stack is empty, an error situation arises.

Thus, in a stack, if a user tries to remove an element from an empty stack it is called underflow.

Learn more about the underflow here:

brainly.com/question/14865058

#SPJ4

5 0
2 years ago
Other questions:
  • Specification of database requirements falls under which category of database​ administration?
    8·1 answer
  • In what way would web-based applications be useful to organizations?
    8·1 answer
  • How many steps are there on Mail Merge Task Pane? List them.​
    9·1 answer
  • A​ __________ is a commonly used tool for showing how the parts of a whole are distributed.
    11·1 answer
  • Jim maintains attendance records for his employees for the year. Row B includes the dates of attendance, and column A includes t
    5·2 answers
  • What is the missing line?
    9·1 answer
  • Directions: Asba student of Contact Center Service, you already have an experience using different computer programs. Try to rem
    8·2 answers
  • Fill in the blanks
    7·1 answer
  • 1 cup coffee cream = ____ tbsp butter plus ____ c milk
    11·1 answer
  • Parts of a computer software
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!