subject

Insert the following variables in your program:

.data

uarray word 1000h, 2000h, 3000h, 4000h

sarray sword -1, -2, -3, -4

write instructions that use direct offset addressing to move the four values in uarray to the eax, ebx, ecx, and edx registers. when you follow this with a call dumpregs statement, the following register values should display:

eax = 1000 ebx = 2000 ecx = 3000 edx= 4000

next, write instructions that use direct offset addressing to move the four values in sarray to the eax, ebx, ecx, and edx registers. when you follow this with a call dumpregs statement, the following register values should display:

eax = ebx = e ecx = d edx= c

assignment 4b - p. 130 exercise 5

use a loop with indirect or indexed addressing to reverse the elements of the integer array in place. do not copy the elements to any other array. use the sizeof, typeof, and lenghtof operators to make the program as flexible as possible if the array size and type should be changed in the future. optionally, you may display the modified array by calling the dumpmem method from the irvine32 library. see chapter 5 for details.

assignment 4c - p. 130 exercise 7

write a program that implements the following arithmetic expression:

eax = -val2 + 7 - val3 + val1

use the following data definitions:

val1 sdword 8

val2 sdword -15

val3 sdword 20

in comments, next to each instruction, write the hexadecimal value of eax. insert a

call dumpregs statement at the end of the program.

ansver
Answers: 3

Another question on Computers and Technology

question
Computers and Technology, 23.06.2019 08:00
The managing director of a company sends a christmas greeting to all his employees through the company email. which type of network does he use? he uses an .
Answers: 3
question
Computers and Technology, 23.06.2019 09:00
What provides an array of buttons for quick access to commonly used commands and tools
Answers: 1
question
Computers and Technology, 23.06.2019 11:00
What are the possible consequences of computer hacking? what is computer piracy? describe some examples. what are the effects of computer piracy? what are the possible consequences of computer piracy? what is intentional virus setting? describe some examples. what are the effects of intentional virus setting? what are the possible consequences of intentional virus setting? what is invasion of privacy? describe some examples. what are the effects of invasion of privacy? what are the possible consequences of invasion of privacy? what is an acceptable use policy and what is the purpose of the acceptable use policy what is intellectual property and how can you use it?
Answers: 1
question
Computers and Technology, 23.06.2019 22:00
Take a critical look at three gui applications you have used—for example, a spreadsheet, a word-processing program, and a game. describe how well each conforms to the gui design guidelines listed in this chapter.
Answers: 3
You know the right answer?
Insert the following variables in your program:

.data

uarray word 1000h, 20...
Questions
question
Computers and Technology, 08.12.2019 15:31
question
Mathematics, 08.12.2019 15:31
question
Mathematics, 08.12.2019 15:31
Questions on the website: 13722362