1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
xz_007 [3.2K]
3 years ago
8

Given a high-level code you should be able to write the corresponding MIPS assembly code. Simple loop in C; A[ ] is an array of

ints do { g = g + A[i]; i = i + j; while (i != h) } Rewrite this as: Loop: g = g + A[i]; i = i + j; if (i != h) goto Loop; Using the mapping: g: $s1, h: $s2, i: $s3, j: $s4, base of A: $s5; write the corresponding assembly instructions
Computers and Technology
1 answer:
nevsk [136]3 years ago
4 0

Answer:

Explanation:

The code for the given problem is written below

.data

A : .word 1 2 3 4 5 6 7 8 9 10

.text

la $s5,A

li $s1,0 # load g

li $s2,10 # load h

li $s3,0 # load i

li $s4,1 # load j

loop:

mul $s6,$s3,4

add $s6,$s6,$s5 #address of A[i]

lw $s6,($s6) #get value of A[i] in s3

add $s1,$s1,$s6 #g = g+A[i]

add $s3,$s3,$s4 # i = i+j

bne $s3,$s2,loop #if i!=h jump to loop

You might be interested in
Suppose a program is operating with execution-time binding and the physical address generated is 300. the relocation register is
maria [59]

The corresponding logical address is 200.

If a program is operating with execution-time binding, the physical address generated will be 300. However, if the relocation register is set to 100, the corresponding logical address will be 200.

This is because the relocation register is used to offset the physical address, so that it can be used to calculate the logical address.

Learn more here:

brainly.com/question/20355023

#SPJ4

7 0
2 years ago
As a digital strategist, Jared wants to add something extra to his ads to give users more incentive to click and convert. He's c
nadya68 [22]

Answer:

A) Up to 15 characters in each.

Explanation:

Total characters he can use in each of these optional paths are up to 15 characters in each.

6 0
4 years ago
Audra recently earned her associate’s degree and is looking for a job. Her resume lists her strengths in a separate section. Som
zhuklara [117]

With Audra’s associate degree and list of qualifications, she will be looking for an entry-level position. The position that would be most suitable for her would be (D) auditing clerk.

She will not quality for an Accountant and Marketing Manager position, which requires a longer amount of experience as well as a higher degree of education, and she is overqualified for the Data Entry position which does not require her level of qualifications.

8 0
3 years ago
Read 2 more answers
In Marvel Comics, what imaginary rare metal is an important natural resource of Wakanda, the home country of Black Panther?
DerKrebs [107]

Answer:

vinranium

Explanation:

i watched the movie

IM SO SMART!!!!!!!!!!!!! UWU

3 0
3 years ago
Saving a file as a new filename can be accomplished through the Save As dialog box? True<br> False
aliina [53]
Your answer would be true, (brainliest answer please)
7 0
3 years ago
Other questions:
  • What is the IEEE standard for the Wi-Fi Protected Access 2 (WPA2) security protocol?
    6·1 answer
  • What is the name of the option in most presentation applications with which you can modify slide elements?
    14·1 answer
  • Live.com is Microsoft's free web-based email provider.<br> A. True<br> B. False
    6·1 answer
  • "Create a Matlab Scrapt that will take the a Matrix A and Matrix B (of AX=B), then calculate the Determinant of Matrix A, Invers
    5·1 answer
  • PLEASE HELP! One of the nice byproducts of joining a club, organization, community service project, or service learning project
    6·1 answer
  • Explain motherboard in detail
    14·2 answers
  • Why is local hosting not suitable for a public website?
    15·1 answer
  • When power is completely removed from your computer
    11·1 answer
  • What is the launching of a 3-D map called?
    12·1 answer
  • _________ is the method used by password crackers who work with pre-calculated hashes of all passwords possible within a certain
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!