1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nesterboy [21]
3 years ago
14

For the following C code assume k and m are passed in x3 and x4 respectively, while result is returned in x4. Compile this code

in RISC-V using recursion. C language: int func (unsigned int m, unsigned int k) { if (k <=1) return m; else return 5m + 2k + func (m-2, k-m);

Computers and Technology
1 answer:
Zinaida [17]3 years ago
6 0

Answer:

Check the explanation

Explanation:

Using the RISC-V recursion <em><u>(which is normally pronounced as "risk-five" is a free to use license, modular, extensible instruction set architecture (ISA). initially planned and designed for advance research in computer architecture at Berkeley, RISC-V is now utilized and implemented in everything from $10 microcontroller boards to the pan-European supercomputing initiative.)</u></em> the full compilation of the code can be seen in the attached image below.

You might be interested in
What is data mining ​
Vesna [10]

Answer:

Data mining is a process of extracting and discovering patterns in large data sets involving methods at the intersection of machine learning, statistics, and database systems.

5 0
3 years ago
Read 2 more answers
True or False? Any edition or version of Windows can join a domain.
Veseljchak [2.6K]

Answer: TRUE! 100%

If I was helpful i would to be rated brainliest please thank you!

Explanation:

8 0
2 years ago
Black and white squares codehs, i need the whole code (40 points for correct answer)
ludmilkaskok [199]

Answer:

speed(0)

penup()

setposition(-100,0)

count=0

def make_squares(i):

if i % 2 == 0:

begin_fill()

for i in range(4):

forward(25);

left(90)

end_fill()

penup()

pendown()

for i in range(6):

pendown()

make_squares(i)

penup()

forward(35)

Explanation:

3 0
3 years ago
Read 2 more answers
This technology is used to produce high-quality documents that look good on the computer screen and in print. wiki presentation
Virty [35]

Answer:

The Answer is Desktop Publishing.

Explanation:

Desktop publishing software is one of the tools used by graphic designers as well as non-designers.

It helps in designing visual displays such as brochures, posters, visiting cards, web pages, and desktop printing.

Example:

Corel Draw

Corel Ventura

5 0
3 years ago
How would you explain these three security risks (phishing, keylogging, malware) to a family member? What would you say to help
kompoz [17]

Answer:

1. Phishing is a cybercrime in which a target or targets are contacted by email, telephone or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data such as personally identifiable information, banking and credit card details, and passwords.

2. Keyloggers are built for the act of keystroke logging — creating records of everything you type on a computer or mobile keyboard. These are used to quietly monitor your computer activity while you use your devices as normal.

3. Malware is intrusive software that is designed to damage and destroy computers and computer systems.

Explanation:

All of these can be used to steal data & passwords

5 0
3 years ago
Other questions:
  • Instructions:Select the correct answer.
    13·1 answer
  • What component on a smartphone requires pairing with another device?
    8·1 answer
  • ______ includes websites that encourage interaction and connection among people, businesses, and organizations.
    9·2 answers
  • 5(x + 4) = 4(x -6) |<br><br><br>How to do this problem
    10·1 answer
  • Set-In-Order includes making changes to the layout of the area.A) TrueB) False
    12·1 answer
  • QUESTION
    14·1 answer
  • Which of the following tabs is used to open, save, and print a document?
    7·2 answers
  • Which statement opens a text file so that you can retrieve the information it contains?
    14·1 answer
  • It is a data being transported on a network​
    13·1 answer
  • Content area a leased asset will appear on the balance sheet as a long-term asset. true false'
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!