1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
JulsSmile [24]
3 years ago
11

Demonstrate the register addressing mode for the following instructions. Also what addressing mode belongs to these instructions

?
1. MOV CX, [BX+DI]
2. MOV AX, ARRAY[CX]
3. MOV BX, [CX+DI+6]
Computers and Technology
1 answer:
kotykmax [81]3 years ago
4 0

Answer:

Demonstrate the register addressing mode for the following instructions. Also what addressing mode belongs to these instructions?

1. MOV CX, [BX+DI]

2. MOV AX, ARRAY[CX]

3. MOV BX, [CX+DI+6]

You might be interested in
Whichmultiplexing technique involves signals composed of lightbeams?
Angelina_Jolie [31]

Answer:

3.WDM

Explanation:

WDM ( wavelength division multiplexing ) involves signals composed of light beams WDM is used in communication where fibers are used it is used for multiplexing of number of carrier signals  which are made of optical fibers by using different wavelength of laser light it has different wavelength so this WDM is used for signals composed of light beams it has property of multiplexing of signal

8 0
3 years ago
Which of the following technologies is the best choice to convey urgent and highly sensitive information? telephone fax letter e
snow_lady [41]
Using e-mail to send messages is the best choice to convey urgent and highly sensitive information. E-mail is just a conversation between you and the recipient. So it is the best when it comes to when you are sending a highly sensitive information. While telephone fax letter and dispatch radio may need to use a mediator to transfer messages which violates the confidentiality of the information.
3 0
3 years ago
Employees are one of the main contributors to cybersecurity breaches because of _____? Select 3 options.
Tema [17]

Answer: inattention, lack of knowledge, and negligence.

Explanation: employees are often the cause of workplace incidents because they may be unknowledgeable about security protocols, negligent, or simply make a mistake.

5 0
2 years ago
"Write code that prints: Ready! countNum ... 2 1 Start! Your code should contain a for loop. Print a newline after each number a
BartSMP [9]

Explanation:

#include <iostream.h>

#inlcude<conion.h>

void main()

{

  int count, x;

  clrscr();

  cout<<"Enter the count:";

  cin>> count;

  cout<<"Ready!\n";

  for(x=count;x>0;x--)

  {

     cout<<x<<"\n";

  }

  cout<<"Start";

  getche();

}

This is a simple program where the output is expected to be in reverse order. So we run a for loop starting from the count and decrements the counter by 1 every time when the loop runs and print the value. So to print the output in "new line" we include "\n".

6 0
3 years ago
Cybercrime has a serious economic impact on national and global economies that costs the _____ of its GDP every year.
maks197457 [2]

Answer:

World at least 1 percent

Explanation:

Cybercrime are crimes that focuses on networks of computers whereby a computer is used to commit the crime or a computer is the target of the crime, with the possible effect of a threat to the security and financial wellbeing of a person, an establishment or country

According to the report by Zhanna Malekos Smith and Eugenia Lostri, 'The Hidden Costs of Cybercrime' the monetary cost of cybercrime which is estimated at $945 billion is <u>a little above 1% of the World's GDP</u> which is around $87.55 trillion.

4 0
3 years ago
Other questions:
  • For film editors, which task comes last in their workflow pattern?
    12·2 answers
  • The ancient city of Pompeii was destroyed when a mixture of hot volcanic gases, ash, and rock poured down Mount Vesuvius and cov
    8·2 answers
  • Image-editing software is used to_____
    7·1 answer
  • Write a program that represents a popular kid’s toy that teaches them about different shapes and colors.
    14·1 answer
  • In the program below, numA is a _____.
    8·2 answers
  • Assignment 6: Animation
    7·1 answer
  • Of what is famous Ted Nelson?​
    8·1 answer
  • In C language. Print numbers 0, 1, 2, ..., userNum as shown, with each number indented by that number of spaces. For each printe
    5·1 answer
  • * what is an electronic mail ?
    13·1 answer
  • Task 2
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!