1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Phantasy [73]
3 years ago
8

Use MPLAB to write an asemply program to multipy two numbers (11111001) and (11111001). Then save the product in file reisters 0

x50 and 0x51. Return a snapshot of your code, the SFR memory view showing the register used to store the multiplication, the file register view showing the product value.
Computers and Technology
1 answer:
kari74 [83]3 years ago
5 0
3.148085752161e17
-should be right,did my best
You might be interested in
A company wishes to move all of its services and applications to a cloud provider but wants to maintain full control of the depl
Brrunno [24]

Answer:

b. IaaS  Infrastructure as a Service

Explanation:

  • Infrastructure as a Service is a cloud infrastructure service or platform which provides with the computing resources like servers, storage services, backup service and networking services.
  • These services are provided to the organizations by cloud service providers to fulfill their business and resources requirements and the users have to purchase these services.
  • These resources and services are provided from the data centers of the cloud service providers.
  • It is beneficial to utilize these virtual services from a third party provider  than to buy the hardware equipment and the consumers can use these services as per their needs and are charged accordingly instead of purchasing their own hardware which often gets difficult to maintain.
  • These services also provide and manage the operating systems, the applications and provides with the backup services, internet connection, security such as firewall and access controls and manage storage such as hard drives. Users can install and run any applications.
  • Iaas offers scalability as it can add resources and services with the growing requirements of the users.
4 0
3 years ago
Please answer ASAP!!!!!!
Blababa [14]

Answer:

the first constructor invocation will work.

pet temp("mouse", 5.99);

Explanation:

This will create a pet object on the stack, using the constructor.

If you want to create an object on the heap, you would use the new operator:

pet* pTemp = new pet("mouse", 5.99);

3 0
3 years ago
Jane wishes to forward X-Windows traffic to a remote host as well as POP3 traffic. She is worried that adversaries might be moni
chubhunter [2.5K]

Answer:

She can the following tool to protect the link:

Secure Socket Shell

Explanation:

Secure Socket Shell:

It is also known as secure shell and has short form SSH. A method that is used to secure the communication over the unprotected network. This network protocol was introduced in 1995 and its most common use include the managing of different systems as the network administrator can execute different commands remotely.

In our question, Jane can use Secure socket shell in order to communicate the information to the remote end without being monitored by the adversaries.

8 0
4 years ago
Jenna updated her status on a social network regarding her upcoming vacation. What information should Jenna not provide when upd
Helen [10]
Jenna should NOT provide her routine!!!
hope this helps and have a great day!!
7 0
3 years ago
Read 2 more answers
What are they
kifflom [539]
1) Input devices are any devices that input information to the computer - Examples include your keyboard, mouse, microphone, ect.

2) Output devices are any devices that output information from the computer. - Examples include your monitor, printer, headset/speakers, ect.

3) Processing devices are devices that take the information and process it. The most obvious example of this is the Central Processing Unit (CPU) on your computer.
6 0
4 years ago
Read 2 more answers
Other questions:
  • Which is the term for a computer typically located in an area with limited security and loaded with software and data files that
    9·1 answer
  • Caitlyn's Crafty Creations computes a retail price for each product as the cost of materials plus $14 multiplied by the number o
    10·1 answer
  • Which of the following is an example of fine art? 1. fashion 2. interior design 3. painting 4. product design
    7·2 answers
  • At a minimum, your vehicle insurance policy must provide coverage of
    10·1 answer
  • What is wrong with the following declaration? How should it be fixed?
    11·1 answer
  • What does place value mean with binary?
    6·1 answer
  • _____ parser is an LL parser that is implemented by writing code directly from the grammar of the source language. EBNF is ideal
    7·1 answer
  • The input to the function/method consists of two arguments.<br><br> a. True<br> b. False
    13·1 answer
  • What feature did the 32X add to the Sega Genesis?
    14·2 answers
  • What are two advantages of a pay-for-use online conferencing service compared to a free service? (Choose two)
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!