1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
max2010maxim [7]
2 years ago
5

Given the following array definition, write a constant declaration named ArraySize that automatically calculates the size in byt

es, of the array:
newArray DWORD 10,20,30,40,50
a) arraysize=(S-newArray)
b) arraysize#(S-new,Array)/2
c) arraySize- (S-newArray)/4
d) arraySize- (S-arraySize)
Computers and Technology
1 answer:
Rina8888 [55]2 years ago
8 0

Answer:

ArraySize = ($ - newArray)

Explanation:

Given

Array name: newArray

Type: DWORD

Required

The size of the array in bytes

The following formula is used to calculate the size of an array in assembly language.

Variable = ($-Array name)

So, we have:

ArraySize = ($ - newArray)

<em>Where ArraySize is the variable that holds the size of newArray (in bytes)</em>

You might be interested in
Timing circuits are a crucial component of VLSI chips. Here’s a simple model of such a timing circuit. Consider a complete balan
gregori [183]

Answer:

Let L and R be the sub-trees underneath the root r.

If the height of L (where we consider height to be the maximum length of all root-leaf paths) is ∆ more than that of R, ∆ ≥ 0, then the length of the edge  (r, R) is increased by ∆.

Then, we separately perform the same cycle over L and R.

Once more, by induction, argue that this greedy algorithm is efficient –

when it does not increase the length of (r, R) edge by ∆, then prove that the solution can be improved.

5 0
2 years ago
Assume that the classes listed in the Java Quick Reference have been imported where appropriate.
Taya2010 [7]

Answer:

Attached is a screenshot of my code for 'PasswordGenerator' and the tests necessary.

Explanation:

If you need any explanation, please ask!

3 0
2 years ago
Read 2 more answers
What technique is most commonly associated with the use of malicious flash drives by penetration testers
nasty-shy [4]

Answer: Distributing malicious flash drives in a parking lot or other high-traffic area, often with a label that will tempt the person who finds it into plugging it in, is a technique used by penetration testers.

Explanation:

4 0
1 year ago
Three IT Companies. Help me please!
GuDViN [60]

Answer:

Apple, Samsung and Foxconn

Explanation:

They are the leading it companies today

3 0
2 years ago
Read 2 more answers
What do you think is the most important event in the history of the Internet? What event has had the biggest impact on your dail
lana [24]

Answer:the answer would be this serious when anonimous came to the world or rather when anonymity came

 

Explanation:

The most important events of all the Internet was when anonomous arrived and began to reveal secrets and things against the United States government

 

3 0
3 years ago
Other questions:
  • Show what this program prints. Be exact and complete. Can you explain the behavior of each print statement? 1 2 3 4 5 6 7 public
    12·1 answer
  • What registry file contains installed programs' settings and associated usernames and passwords?​?
    13·1 answer
  • Need help this will affect my final grade in technology and the dead line has passed!!!
    11·1 answer
  • How much does a Canon PowerShot G7X cost in America?
    14·1 answer
  • Which of the following would be an example of a loss of record integrity in a
    12·1 answer
  • Hi whats airpods good for
    15·2 answers
  • Where does the list of incoming mail appear in gmail
    13·2 answers
  • To extract detailed and comprehensive responses from your client, use the _____ questioning technique.
    5·2 answers
  • You need to update your router settings, so you log into the administration panel, Whose Internet protocol (IP) address is 192.1
    5·1 answer
  • Write long answer to the following question. a. Define microcomputer. Explain the types of microcomputers in detail.​
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!