1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nesterboy [21]
3 years ago
14

For the following C code assume k and m are passed in x3 and x4 respectively, while result is returned in x4. Compile this code

in RISC-V using recursion. C language: int func (unsigned int m, unsigned int k) { if (k <=1) return m; else return 5m + 2k + func (m-2, k-m);

Computers and Technology
1 answer:
Zinaida [17]3 years ago
6 0

Answer:

Check the explanation

Explanation:

Using the RISC-V recursion <em><u>(which is normally pronounced as "risk-five" is a free to use license, modular, extensible instruction set architecture (ISA). initially planned and designed for advance research in computer architecture at Berkeley, RISC-V is now utilized and implemented in everything from $10 microcontroller boards to the pan-European supercomputing initiative.)</u></em> the full compilation of the code can be seen in the attached image below.

You might be interested in
Which of the following scanning technique attackers use to bypass firewall rules, logging mechanism, and hide themselves as usua
OLEGan [10]

Answer: Stealth scanning technique

Explanation:

Stealth Scanning technique includes the following steps:

1. The client upon sending a single SYN packet to is responded by SYN/ACK packet if the port is open.

2. The port is assumed to be in closed state if the RST packe t is sent from the server.

3. This RST packet is sent by the client to close the initiation process so that a connection cannot be established.

6 0
3 years ago
I am sorting data that is stored over a network connection. Based on the properties of that connection, it is extremely expensiv
Ann [662]

Answer: Provided in the explanation section

Explanation:

The question to this problem says;

Question:

I am sorting data that is stored over a network connection. Based on the properties of that connection, it is extremely expensive to "swap" two elements. But looping over the elements and looking at their values is very inexpensive. I want to minimize swaps above all other factors. Choose the sorting algorithm we studied that will perform the best:

ANSWER

1. Merge Sort

Because merge sort uses additional memory instead of swapping the elements.

2. Merge Sort and Quick Sort both can be used with multi processor.

cheers i hope this helps !!!

4 0
4 years ago
Which of the following is something you need to keep an eye out for
Brilliant_brown [7]

Answer:

D. Pedestrians ignoring DON'T WALK signs

Explanation:

Pedestrians ignoring DON'T WALK signs is something you need to keep an eye out for  near packed intersections.

4 0
3 years ago
Read 2 more answers
Whenever I ask a question I loose points I just asked a question before and I had 56 points now I have 12 now I'll probably have
lilavasa [31]
Just try to answer some questions as well, then you can keep a nice balance.
ps. Only answer the questions you know. 
5 0
3 years ago
2. What is “suspension of disbelief?” Which form of immersion is it most closely associated with?
jonny [76]
What are the answer choices
4 0
4 years ago
Read 2 more answers
Other questions:
  • PLS HURRY!! This OS introduced a very cool GUI that had animations and transparencies.
    5·1 answer
  • What tool listed below will be the most useful for developing presentation content?
    10·2 answers
  • What types of scientific claims should be verified
    5·1 answer
  • Please help me please and thank you!
    14·1 answer
  • Recording music using a keyboard controller is commonly accomplished using which type of audio file format?
    13·1 answer
  • List and explain the error in the code
    14·1 answer
  • PLEASE HELP!! Kou converged his Word document to a PowerPoint document. When he received the PowerPoint, he was missing material
    12·1 answer
  • It is unlawful in the State of Florida for any person, ______________________, to be a passenger in the front seat of a motor ve
    7·1 answer
  • Write a method called sum with a while loop that adds up all numbers between two numbers a and b. The values for a and b can be
    11·2 answers
  • Which of the following rules need to be followed when using variables?<br> Choose all that apply.
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!