Question

explain why

5. Which of the following are TRUE for the X86 call instruction? (A) Branches to a specified address: (B) Pushes the instruct

1 0
Add a comment Improve this question Transcribed image text
Answer #1

Answer 5) (B) and (C) are correct.

The call instruction in X86 pushes the pointer to the top of the stack and target address is required to be stored which may be stored in the general-purpose register.

Answer 6) True

the sizeof(int*) itself returns the size of pointer type int it maybe 4 bytes but they are 8 bytes on 64-bit machines that is it depends on the architecture of the machine.

Answer 7) True

c[b] gives the address at that b index in the array. But we can get the same by adding b to the base address that is *c.

Answer 8) False

security software focus on all types of Softwares and their motto is to detect and avoid any cyber-attack before it happens and not to makes software keep working under attack.

Answer 9) False

Ethical hacking is used to test software security under cyber attack. It is used to find vulnerabilities in the system and not to hack into someone's else computer

Answer 10) True

Concurrency means when multiple processes are running at the same time that is in parallel.

Add a comment
Know the answer?
Add Answer to:
explain why 5. Which of the following are TRUE for the X86 call instruction? (A) Branches...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • True/False 1. The results of code fragment sizeof(int*)==sizeof(int) depends on the compiler and architecture. 2. If...

    True/False 1. The results of code fragment sizeof(int*)==sizeof(int) depends on the compiler and architecture. 2. If c is of type int* and b is of type int, c[b] is equivalent to *c+b. 3. Security software focuses on engineering software so that it continues to function correctly under malicious attack. 4. Ethical hacking is about hacking into systems run by those whose ethics you disagree with. 5. Concurrency occurs when two or more separate execution flows are able to run simultaneously.

  • Please answer the following Assembly x86 Questions with either TRUE or FALSE. 1. The PUSHAD instruction...

    Please answer the following Assembly x86 Questions with either TRUE or FALSE. 1. The PUSHAD instruction pushes all the 32-bit general-purpose registers on the stack. 2. The SS register points to the last value pushed on the stack. 3. The POP instruction copies a value from the stack to an operand, then it increments the stack pointer 4. When a macro is invoked, both CALL and RET instructions are needed. 5. When the instruction CALL runs, ESP always changes value....

  • True or False questions Assembly x86 C++ 35. _____ JMP is a conditional transfer operation. 36....

    True or False questions Assembly x86 C++ 35. _____ JMP is a conditional transfer operation. 36. _____ Before you use the LOOP instruction, you must be aware of how it uses the counter. 37. _____ The LOOP instruction first checks to see whether ECX is not equal to zero; then LOOP decrements ECX and jumps to the destination label. 38. _____ Stacks are LIFO structures, ie, (last-in ,first-out). 39. _____ Instructions that involve only registers work faster because of pre-fetch...

  • QUESTION 3 Assume x = 4 and y = 5, which of the following is true?...

    QUESTION 3 Assume x = 4 and y = 5, which of the following is true? x < 5 || y < 5 x > 5 || y > 5 x < 5 && y < 5 x > 5 && y > 5 QUESTION 14 Which of the following statements are the same? (A) x -= x + 4 (B) x = x + 4 - x (C) x = x - (x + 4) (A) and (B) are...

  • QUESTION 1 Which statement results in the value false? The value of count is 0; limit...

    QUESTION 1 Which statement results in the value false? The value of count is 0; limit is 10. (count != 0)&&(limit < 20) (count == 0)&&(limit < 20) (count != 0)||(limit < 20) (count == 0)&&(limit < 20) 10 points    QUESTION 2 If this code fragment were executed in an otherwise correct and complete program, what would the output be? int a = 3, b = 2, c = 5 if (a > b) a = 4; if (...

  • T/F C Language Questions. Answer the following true/false questions. You must correctly state WHY your answer...

    T/F C Language Questions. Answer the following true/false questions. You must correctly state WHY your answer is true or false in order to receive credit. #include <stdio.h> #include <string.h> int run_through(int num, char **a) { int i; int check=0; for(i=0;i<num;i++) { printf("%s\n", *(a+i)); if(strcmp(*(a+i), "filename")==0) { check=1; } } return check; } char** find_filename(int n, char **b) { int i; int check=0; for(i=0;i<n;i++) { if(strcmp(*b, "filename")==0) { b++; break; } b++; } return b; } int main(int argc, char **argv)...

  • These are my answere to the following questions: are they right? 1. B 2. T 3....

    These are my answere to the following questions: are they right? 1. B 2. T 3. T 4. T 5. F 6. T 7. A 8. D 9. E 10. B 11. B 12. A 13. A 14. D 15. C 16. D 17. T 18. C 19. T 20. T 21. T 22. A 23. T 24. D 25. B 26. A 27. A 28. A 29. T 30. C 31. D 32. A 33. T 34. F 35....

  • I've posted 3 classes after the instruction that were given at start You will implement and...

    I've posted 3 classes after the instruction that were given at start You will implement and test a PriorityQueue class, where the items of the priority queue are stored on a linked list. The material from Ch1 ~ 8 of the textbook can help you tremendously. You can get a lot of good information about implementing this assignment from chapter 8. There are couple notes about this assignment. 1. Using structure Node with a pointer point to Node structure to...

  • Header file #ifndef DYNAMIC_ARRAY_INCLUDED #define DYNAMIC_ARRAY_INCLUDED 1 #ifndef __TYPE #define __TYPE # define TYPE int #...

    Header file #ifndef DYNAMIC_ARRAY_INCLUDED #define DYNAMIC_ARRAY_INCLUDED 1 #ifndef __TYPE #define __TYPE # define TYPE int # define TYPE_SIZE sizeof(int) # endif # ifndef LT # define LT(A, B) ((A) < (B)) # endif # ifndef EQ # define EQ(A, B) ((A) == (B)) # endif typedef struct DynArr DynArr; /* Dynamic Array Functions */ void initDynArr(DynArr *v, int capacity); DynArr *newDynArr(int cap); void freeDynArr(DynArr *v); void deleteDynArr(DynArr *v); int sizeDynArr(DynArr *v); void addDynArr(DynArr *v, TYPE val); TYPE getDynArr(DynArr *v, int...

  • This assignment is comprised of 3 parts: ​All files needed are located at the end of...

    This assignment is comprised of 3 parts: ​All files needed are located at the end of the directions. Part 1: Implementation of Dynamic Array, Stack, and Bag First, complete the Worksheets 14 (Dynamic Array), 15 (Dynamic Array Amortized Execution Time Analysis), 16 (Dynamic Array Stack), and 21 (Dynamic Array Bag). These worksheets will get you started on the implementations, but you will NOT turn them in. ​Do Not Worry about these, they are completed. Next, complete the dynamic array and...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT