1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
VLD [36.1K]
3 years ago
11

Write a machine code program for all the following problems. Test to make sure that they work in LC3. It's best to complete each

step and test before moving onto the next. No credit if you write code in assembly. Your machine code file name must be named, Multiply.bin a. The LC-3 has no multiply instruction. You must write code to allow for multiplication of two numbers. These numbers must be loaded into the registers R3 and R4 from memory. Load R3 with contents of memory from x4000 and R4 from x4001. In other words, someone running this code will place the data in these two memory locations b. Write machine code to multiply the contents of R3 with the contents of R4. The result must be stored in R5. In other words, R5 R3 R4 c. You must also store the result at memory location x4002. d. Modify your code to change the contents of register R1 based on the final result stored in R5. i. If R5 is greater than 0, R1 must be set to 1 ii. If R5 is less than 0, R1 must be set to -1 iii. If R5 is equal to 0, R1 must be set to 0 1. Start your program at x3000 so that it will be easier for me to grade it. 2. Each program must include a header comment that has your name(s) and a brief description of the program 3. Make sure to comment logic of your program. You will be graded on comments.

Computers and Technology
1 answer:
Usimov [2.4K]3 years ago
8 0

Answer:

Following is given the solution to each part.

All the comments are given above each step so that they can make the logic clear.

I hope it will help you!

Explanation:

You might be interested in
Explain set associative mapping<br>​
gtnhenbr [62]
Set-associative mapping allows that each word that is present in the cache can have two or more words in the main memory for the same index address. Set associative cache mapping combines the best of direct and associative cache mapping techniques.
6 0
3 years ago
You use a cisco 2900 router in your network. you are considering purchasing and implementing the Unifield communications feature
Olenka [21]

Explanation:

License boot module c2900, technology-package uck9

7 0
3 years ago
The two most common mechanisms for sharing an ip address are a router or ____.
Karo-lina-s [1.5K]
ICS would bet he answer. 


Good luck! (:
8 0
3 years ago
What does clicking and dragging the fill handle in excel
Olegator [25]

Answer:

The fill handle copies the same values, formulas, or fills a series of dates, texts, numbers, and other data to a desired number of cells. ... Click and hold the handle, then you can drag up, down, across over other cells. When you release your mouse button, it auto-fills the content to the cells you dragged over.

5 0
2 years ago
Design a database to keep data about college students, their academic advisors, the clubs they belong to, the moderators of the
alekssr [168]

Answer:

Complete design is attached below.please have a look.

Explanation:

8 0
3 years ago
Read 2 more answers
Other questions:
  • What two terms below describe a network device with three ports, two of which send and receive all traffic, and the third port m
    6·1 answer
  • A new company is upgrading a media workstation. The computer will be predominantly used for graphic intensive presentations, sli
    13·1 answer
  • Which function of a web page relies on responsive web design? Adding extra horizontal scroll Blocking mobile devices from viewin
    11·2 answers
  • In which of the following scenarios would it be best to use a for loop?
    6·1 answer
  • In most software packages, the function key F1 is used to run the _____program.
    10·1 answer
  • Select the correct answer
    15·1 answer
  • Do you trust machine learning application?
    10·1 answer
  • Meta is a penetration testing engineer assigned to pen test the security firm's network. So far, she cannot tunnel through the n
    12·1 answer
  • What is the complete path and filename of the file where ports and their associated protocols are defined
    12·1 answer
  • Data frames can be subset by a chosen value using ==.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!