1-How many bytes are in a halfword?
4 |
||
2 |
||
6 |
||
8 |
2-Which of the following is NOT true of pseudo-instructions?
They tend to be easier to understand than their machine instruction counterparts |
||
They map one-to-one to machine instructions |
||
They are “shortcuts” to common operations |
||
They may map to one or more machine instructions |
3- What is the .data section of a MIPS program used for?
To define variables to be used in the MIPS program |
||
It tells you that this MIPS program will work with data |
||
It’s where you place your actual MIPS instructions |
||
To instruct the MIPS compiler where to find main memory |
4-Complex instruction set computer (CISC) is an instruction set that:
Has more instructions, but is less verbose than RISC |
||
Is the basis for MIPS |
||
Is no longer in use, having been replaced largely by RISC |
||
Has fewer, but more complex instructions for the CPU to process |
5- True or false: The difference between .ascii and .asciiz is that .asciiz character arrays (strings) are terminated with a “null” value whereas .ascii character arrays (strings) are not.
True
False
1-How many bytes are in a halfword?
Answer : - b) 2
(A word has 4 bytes and halfword has 2 bytes)
2-Which of the following is NOT true of pseudo-instructions?
Answer : - b)They map one-to-one to machine instructions
(Pseudo code is written in easier language that can be understood by a layman. Programmer scan use it for their reference in coding. It cannot be compiled.)
3- What is the .data section of a MIPS program used for?
Answer : - a) To define variables to be used in the MIPS
program
4-Complex instruction set computer (CISC) is an instruction set that:
Answer :- d) Has fewer, but more complex instructions for the CPU to process
5- True or false: The difference between .ascii and .asciiz is that .asciiz character arrays (strings) are terminated with a “null” value whereas .ascii character arrays (strings) are not.
Answer :- True
1-How many bytes are in a halfword? 4 2 6 8 2-Which of the following is...
1. Introduced by IBM with its System/360, the _________ is a set of computers offered with different price and performance characteristics that presents the same architecture to the user. 2. A large number of general-purpose registers, and/or the use of compiler technology to optimize register usage, a limited and simple instruction set, and an emphasis on optimizing the instruction pipeline are all key elements of _________ architectures. 3. The difference between the operations provided in high-level languages (HLLs) and those...
C programming 1) When setting a two-dimensional character array, how is the size (number of characters) in the second dimension set? Select an answer: The number of elements are equal to the average size of all the strings. To the length of the longest string; you don't need to add one because the first array element is zero. To the length of the longest string, plus one for the null character. The second dimension is equal to the number of...
1-Is it possible to run a program without a main() function? Yes No 2- How many main() functions can one have in a program? 2 This depends on what compiler you use. As many as you like 1 3- What does the following code fragment leave in x? char a = 'A'; int x = sizeof (a); 1 Depends on what compiler you use. 4 2 4- True or false: In a C program I can have two functions with...
1. You are given a C file which contains a partially completed
program. Follow the instructions contained in comments and complete
the required functions. You will be rewriting four functions from
HW03 (initializeStrings, printStrings, encryptStrings,
decryptStrings) using only pointer operations instead of using
array operations. In addition to this, you will be writing two new
functions (printReversedString, isValidPassword). You should not be
using any array operations in any of functions for this assignment.
You may use only the strlen() function...
Create a program that performs the following operations: 1. Prompt for and accept a string of up to 80 characters from the user. • The memory buffer for this string is created by: buffer: .space 80 #create space for string input The syscall to place input into the buffer looks like: li $v0,8 # code for syscall read_string la $a0, buffer #tell syscall where the buffer is li $a1, 80 # tell syscall how big the buffer is syscall 2....
i need help with a mips program to to covert roman numerals to
real numbers
Lab 4: Roman Numeral Conversion Part A: Due Sunday, 19 May 2019, 11:59 PM Due Friday, 24 May 2019, 11:59 PM Part B: Minimum Submission Requirements Ensure that your Lab4 folder contains the following files (note the capitalization convention): o Diagram.pdf o Lab4. asm O README.txt Commit and push your repository Lab Objective In this lab, you will develop a more detailed understanding of how...
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
QUESTION 1 Which of the following is not a legal exception to breaking patient confidentiality? O when required by lavw O The patient is incompetent or incapacitated O An emergency O A gut feeling O To protect 3rd parties QUESTION 2 Why is trust imperative to maintain a patient/provider relationship? O You don't want to get sued O You want your patients to respect you O As a hospital operates...
1. Please provide a C++ program which faithfully reads a list of non-negative integer scores, ultimately terminating the list reading when the sentinel value (lets use -9999) is entered. The program should then correctly report the number of non-negative scores entered and the arithmetic mean (average) of those scores 2. Demonstrate your programs behavior in response to errors on input (that is, show that it faithfully rejects improper input such as alphabetic characters, decimal points, and commas). Here are some...
Question 1 An array is NOT: A - Made up of different data types. B - Subscripted by integers. C - A consecutive group of memory chunks. D - None of the choices. Question 2 How many times is the body of the loop executed? int i=1; while(true) { cout << i; if(++i==5) break; } A - Forever B - 4 C - 5 D - 6 E - 0 Question 3 What is wrong with the following piece of...
Assignment 6, Merge Arrays (java) Instructions In this assignment, you will write a program which merges two arrays of positive integers and removes any duplicate entries. Your program will first ask for a valid length which must be an integer which is 10 or greater. The program should continue to ask until a valid length is entered. The program will then create two arrays of the length entered, fill these with random integers between 1 and 100 inclusive, and print...