1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
GalinKa [24]
3 years ago
10

Translate function f into RISC-V assembly language. Assume the function declaration for g is int g(int a, int b). e code for fun

ction f is as follows: int f(int a, int b, int c, int d){ return g(g(a,b), c d); }
Computers and Technology
1 answer:
Shkiper50 [21]3 years ago
4 0

Answer:

int f(int a, int b, int c) {

return func(func(a, b), c);

}

f: addiu $sp, $sp, -8 # allocate frame = 8 bytes

sw $ra, 0($sp) # save return address

sw $a2, 4($sp) # save c

jal func # call func(a,b)

move $a0, $v0 # $a0 = result of func(a,b)

lw $a1, 4($sp) # $a1 = c

jal func # call func(func(a,b),c)

lw $ra, 0($sp) # restore return address

addiu $sp, $sp, 8 # free stack frame

jr $ra # return to caller

You might be interested in
What type of device does a computer turn to first when attempting to make contact with a host with a known IP address on another
mihalych1998 [28]

Answer: the DNS server

Explanation:

4 0
3 years ago
Read 2 more answers
Which option can be used to automatically scan a document to prepare it for publishing, identifying personal information that sh
lubasha [3.4K]

Answer:

Document Inspector  option can be used to automatically scan a document to prepare it for publishing, identifying personal information that should be removed

Explanation:

Document scanner: This converts the text written in the paper in to a digital form. Most probably it will convert the text in paper in to image only.

Document Inspector is the tool which removes the personal information while sharing the document. The personal information can be name, mail id, phone number etc. This personal information though hidden will get reflected while publishing and this document inspector allow us to protect these data from sharing.

Privacy manager: This is a software reducing the risk of unauthorized access of data

Security manager: This once again protect the document.

4 0
4 years ago
Which of the following combines something you know, such as a password, with something you are (a biometric device such as a fin
yulyashka [42]

Answer:

c. Two-factor authentication

Explanation:

Two-factor authentication is also known as 2FA. It is an extra form of security put in place aside the use of username and password to ensure the authenticity of someone trying to access an online platform with a registered account.

First the user enters his or her username and password, then they will also have to provide some extra information before finally gaining access. Such information could be ones place of birth, name of pet, something one has or know, etc.

2FA helps to still keep an account safe even if a device or password is been stolen. Two-factor authentication could be SMSbased, hardware token, software token, etc.

4 0
4 years ago
.…………….. Are devices that routepackets of data between two or more networks.
Masja [62]

Answer: Routers

Explanation:

Routers are the device that route packets of data between two or more networks as, core router is that which transmitted data from the other router and route packets based on the network information layers and can forward the other packets based on the data link layers information, the layer on which the bridges are operated.

8 0
4 years ago
Read 2 more answers
Given the following class, public class Magazine { private static double SUBSCRIPTION_DISCOUNT = .60; private String title;
jonny [76]

Answer:

The answer is "III only"

Explanation:

An accessor method is also an instance function that receives or establishes the value of an object's properties. This method is called methods through obtaining information about an entity. This method reverses it to process, which has two accessory string techniques to reach source string data reference length Accessor method.

6 0
3 years ago
Other questions:
  • Technological _____ is the term used to describe the merging of several technologies into a single device.
    13·1 answer
  • Which of the following websites can help you learn about general career trends? A. Bureau of Labor Statistics B. Career Cruising
    6·1 answer
  • 1.) You are a digital forensic examiner and have been asked to examine a hard drive for potential evidence. Give examples of how
    13·1 answer
  • Identify four basic data manipulations performed on a relational database using sql
    7·1 answer
  • A parameter is a numerical measure that describes a characteristic of a sample. Choose One • 4 points True False
    6·1 answer
  • Write a function MaxMagnitude with two input parameters, that returns the largest-magnitude value. If the inputs are 5 7, the fu
    14·1 answer
  • Barry discovers that an attacker is running an access point in a building adjacent to his company. The access point is broadcast
    9·1 answer
  • What is the action take to the input called?
    15·1 answer
  • Keli is unable to find a shape that meets her needs. Which feature in Power Point should she use to create shapes that are compl
    6·1 answer
  • A typical day in programming and software development would involve
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!