1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ki77a [65]
4 years ago
10

Consider the following MARIE Code: 100 If, Load X /Load the first value 101 Subt Y /Subtract the value of Y, store result in AC

102 Skipcond 400 /If AC=0 (X=Y), skip the next instruction 103 Jump Else /Jump to Else part if AC is not equal to 0 104 Then, Load X /Reload X so it can be doubled 105 Add X /Double X Charles Sturt University Subject Outline ITC544 202030 SM I Version 2 - Published 25 March 2020 Page 19 of 39 106 Store X /Store the new value 107 Jump Endif /Skip over the false, or else, part to the end of if 108 Else, Load Y /Start the else part by loading Y 109 Subt X /Subtract X from Y 10A Store Y /Store Y-X in Y 10B Endif, Halt /Terminate program (it doesn't do much!) 10C X, Dec 12 /Assume these values for X and Y 10D Y, Dec 20 Find the values stored in the following registers after the execution of "Skipcond 400" instruction: [5 marks] (i) PC (ii) IR (iii) MAR (iv) MBR (v) AC
Computers and Technology
1 answer:
Nataliya [291]4 years ago
6 0

The program is given below:-

<u>Explanation:</u>

100 If, Load X /Load the first value

101 Subt Y /Subtract the value of Y, store result in AC

102 Skipcond 400 /If AC=0 (X=Y), skip the next instruction

103 Jump Else /Jump to Else part if AC is not equal to 0

104 Then, Load X /Reload X so it can be doubled

105 Add X /Double X

106 Store X /Store the new value

107 Jump Endif /Skip over the false, or else, part to the end of if

108 Else, Load Y /Start the else part by loading Y

109 Subt X /Subtract X from Y

10A Store Y /Store Y-X in Y

10B Endif, Halt /Terminate program (it doesn't do much!)

10C X, Dec 12 /Assume these values for X and Y

10D Y, Dec 20

You might be interested in
Hawaii and japan are examples of islands made by? You have to write it.
Brums [2.3K]

Answer:

Volcanic activity

5 0
3 years ago
True/false operating systems of mobile devices can support full-scale software programs like Microsoft word or excel
Anestetic [448]
This statement is false.
7 0
4 years ago
An ISP is considering adding additional redundant connections to its network. Which of the following best describes why the comp
ozzi

Answer:

Redundant networks are generally more reliable.

Explanation:

6 0
3 years ago
Data warehousing is a(n) __________, and data mining is a(n) ____________.
Maksim231197 [3]

Answer:

B. Process, group of techniques

Explanation:

Data warehousing simply means storing large amounts of data from multiple sources to a central "warehouse" to be analyzed or simply stored for later. Data mining on the other hand involves discovering patterns in sets of data to make better decisions. Analyzing data with a group of techniques like statistics and machine learning.

8 0
3 years ago
When designing a website, Claire creates a color palette for the web pages. How can the color palette help Claire design effecti
Vilka [71]
Consistency and unity
highlight important content
4 0
3 years ago
Other questions:
  • Network firewall entry and exit points are called
    6·1 answer
  • "a router interface has been assigned an ip address of 172.16.192.166 with a mask of 255.255.255.252. to which subnet does the i
    5·1 answer
  • Write an expression that executes the loop body as long as the user enters a non-negative number. Note: If the submitted code ha
    14·1 answer
  • Consider the following two tables where EmployeeNum is primary key in both tables. What is the result of combining the two table
    15·1 answer
  • Project: Math Tutor Program with Error Handling
    9·2 answers
  • Can I get the code for the Edhesive Assignment 3 Chatbox in python? Thanks.
    15·1 answer
  • What is a good starting point for data mining?
    5·1 answer
  • Describe the steps which should be taken after a cyber-attack has taken place
    7·1 answer
  • What kind of files are automatically blocked in outlook?
    7·1 answer
  • Why would students most likely need to collect data? Check all that apply
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!