Q/ write a a ssem bly Progam that store 1234H #in r egister Ax then trans fo The Contents of Ax toregister 3* and then trans f the content of AX to Location L A2344] and r qu sf A x- memory
Q: Write the definition of a function absoluteValue, that receives an integer parameter and returns the...
A: As given, I need to write a C++ program having a function called absoluteValue that takes an integer...
Q: What are the motives for studying space and temporal complexity?
A: Reasons for Space Complexity The space complexity of an algorithm is studied for the following reaso...
Q: Suppose we have an array with some finite elements. If we want to rearrange its element in a certain...
A: An array is a data structure used to store varieties of data.
Q: purpose of this assignment is to use programming as a means of changing the filter on a photograph. ...
A: The program is an given below :
Q: 2. Discuss types of application integration.
A: Answer 2. There are four types:- 1. presentation-level integration 2. business process integration 3...
Q: Why isn't virtual memory utilised more often in embedded systems?
A: Introduction virtual memory utilised more often in embedded systems
Q: propagation delay an IS connected to ost B by a 15 Mbps a 25 propagation delay Host A sends a 1500-b...
A: The answer is
Q: Using C Language: Write a program that will input 20 values to array BSIT. Call the function EVEN t...
A: First, we will enter the 20 values and store them in array BSIT. Then we will call the function EVEN...
Q: An 8-bit carry-select adder is given below. If the propagation delay for a gate is 2 nsec, how long ...
A: Let's see the solution in the next steps
Q: Will the given 8086 instruction execute? MOV A, #465H
A: Given an 8086 instruction MOV A, #465H and we have to whether the given instruction will execute or ...
Q: Write an algorithm that returns the index of the first item that is less than its predecessor in an ...
A: Introduction Write an algorithm that returns the index of the first item that is less than its prede...
Q: xamine the benefits and drawbacks of various system models.
A: Introduction: The following are some of the benefits of using a modelling methodology: It forces us ...
Q: What are the two types of files, in general, that exist? In what ways do these two file formats diff...
A: Two symbols are used to represent anything from text to computer processor instructions.
Q: i) Write the datatype required for all the fields of table SCHOOL. ii) To display TEACHERNAME, PERIO...
A: Since you have asked multi-part question so we have answered first three questions for you. If you w...
Q: Computer Science Retrospect, a StorCentric company, is releasing Retrospect Backup 18.5, featuring ...
A: Answer: Retrospect is encrypting backup copies to protect them from un-authorized encryption. Retr...
Q: Is backup the responsibility of the database administrator or the database user? a person who manag...
A: Backups may be created by database administrators, but it is the DBA's responsibility to make sure t...
Q: Use multiple-row subquery in a WHERE clause. List order numbers of books, written by an author whose...
A: Multiрle-rоw subqueries аre nested queries thаt саn return mоre thаn оne rоw оf results...
Q: What security holes were exploited as part of the scam scheme?
A: Scams are very risky in internet marketing that can cause exploitation of source code that can leak ...
Q: When assessing the benefits and drawbacks of distributed data processing, what aspects should you co...
A: According to the information given:- we have to define the benefits and drawback of distributed data...
Q: should be described in English, and it should
A: Here the given problem statement is Explaining the code Compiler and interpreter are the machine la...
Q: Using three iterations of the Bisection method to determine the zeros of the f(x) within the interva...
A: Here in this question we have asked to use bisection method to determine the zeros of function F(x)=...
Q: Computer Science You are required to build a product for determining whether a bank statement is cor...
A: Bank reconciliation is used to determine whether a bank statement is correct or not
Q: int main() int NUMBER, BALANCE; printf("Please enter a number "); scanf("%d", &NUMBER); BALANCE = NU...
A: Code: #include<stdio.h> int main(){ int N,B; printf("Enter a number: "); scanf("%d ",...
Q: Label the Recursion Requirements. int fact (int n) int reAulG 1# in--1) return : ract (n-1) reurn *u...
A: The answer is
Q: What are three options that could be used in a project based on the decision tree structure? What ap...
A: Introduction: Tree data structures are algorithms for storing and retrieving data in a database, ref...
Q: What is the purpose of system engineering? How to achieve performance improvement by using system en...
A: Systems engineering is an interdisciplinary field of engineering and engineering management that dea...
Q: Label the Recursion Requirements. int fact (int n) 1fin--1)
A: Given :- label the recursion requirements
Q: ble functions. We have found that the given functions have the same derivative. In general, if two d...
A: Floating-point Figures are used to represent no integer fractional figures and are used in utmost en...
Q: Object Oriented Database Question: What is the difference between authorization type hierarchy and ...
A: Hierarchical authorization is exactly what it sounds like: it determines authorization based on a hi...
Q: We have an array with some finite elements. If we want to make room for another element within the s...
A: More efficient an array or a data structure: Linked lists seem to be more economic over arrays when ...
Q: What security holes were exploited as part of the scam scheme?
A: One of the greatest deal and challenge these days, IT has to encounter is of the cyber safety and of...
Q: Create processes A, B and C from the same code file using fork. In this case you will have a single ...
A:
Q: public GenericCollection cut(int k) { //this method cuts the current //GenericCollection object such...
A: Program Plan: The value of count is initialized to 0 Initialize a temporary node (i,e) temp1 to firs...
Q: Processors in Intel’s Pentium series provide for four privilege levels. Why would the designers of C...
A: Processors in Intel’s Pentium series provide for four privilege levels. Why would the designers of C...
Q: Rey A. What is the ciphertext of M=9 if Alice chooses the random integer k=4? B. If Alice uses the s...
A: The answer is
Q: Is common morality possible in cyber Security?
A: Cyber security: Cyber security is the application of technologies, processes and controls to protec...
Q: You are given 4 items as (value, weightpairs in this format {{20, 5}, {60, 20}, {25, 10}, {X, 25}}Yo...
A: Required:- Give me an example of f formatted string in python. Take all the data from the user. Appr...
Q: in "-e"|"encrypt") perform_encryption $input_file $output...
A: Steganography focuses more on high security and capacity. Steganography masks the sensitive data in ...
Q: Give me an example of f formatted string in python. Take all the data from the user.
A: Required:- Give me an example of f formatted string in python. Take all the data from the user. Appr...
Q: A new architecture, with N layers, is proposed. User application at the top layer generates a messag...
A: We have a total of N layers..The message generated at the top layer is M bytesSo the message have to...
Q: Label the Recursion Requirements. int fact (int n) int reAult: ifin--1) Fact (n-1 return **l;
A: The following recursion function is to find the factorial of the number passed as the parameter Fac...
Q: Need solution for DVP checker board problem 6.5
A: Answer: Need solution for DVP checker board problem 6.5
Q: when i run code i get error message on line 21 says invalid syntax at hash = filemd5 the file is it ...
A: arrangement
Q: Under what kind of circumstance could maps of only point events be misleading for spatial pattern ex...
A: answer is
Q: Write a cpp program to find the number of years, number of weeks and number of days from the user en...
A: Given :- Write a cpp program to find the number of years, number of weeks and number of days from th...
Q: Explain two computer advances that have helped e-commerce become more efficient.
A: Intro The question is about computer advances that have helped e-commerce become more efficient and ...
Q: Write a C++ program will ask the user to enter 5 numbers and then present with their sum.
A: Required:- Write a C++ program that will ask the user to enter 5 numbers and then present them with ...
Q: convert temperature specified in Celsius in one class into Fahrenheit in another class. In c
A: According to the question we have to write code to convert temperature specified in Celsius in one c...
Q: Create a program that will take in an input of ASCII characters and distance value to encrypt and pr...
A: The code is given below.
Q: Without using any loop In PHP programming languague The value of the input variable is 9,3,5.5,7,8 H...
A: 1) In PHP we have a function array_sum() which returns the sum of the values in an array. 2) It's sy...
Please fast..
Step by step
Solved in 3 steps with 1 images
- Write a windows32 assembly language program in visual studio that utilizes a recursive procedure. The main (_MainProc) procedure should: accept, from the user, an integer greater than 0. Guard against invalid values being entered using a loop. call the recurse sub-procedure using the cdecl protocol, receive the results of the sub-procedure, and display the results. NOTE: The main procedure should do nothing more than this! The recurse sub-procedure should (following the cdecl protocol): recursively find the solution for: recurse(0) = 3, and recurse(n) = 5 * recurse(n-1) + 9, for n > 0. return the value back to the calling procedure. Notes: Both the main procedure and recurse sub-procedure must follow the cdecl protocol.Hello, I am having an error and cannot figure out how to solve this question. Could someone please assist? Please be advised, I am using PostgreSQL as that is what was used in class. Thus, I must use PLPGSQL Application: PostgreSQL 12 or 13PLPGSQL CREATE OR REPLACE FUNCTION Moreno_03_bankTriggerFunction()RETURNS TRIGGERLANGUAGE PLPGSQLAS$BODY$CREATE TRIGGER Moreno_03_bankTriggerAFTER DELETE ON accountFOR EACH ROW EXECUTE PROCEDURE Moreno_15_bankTriggerFunction(); TABLES (if needed) CREATE TABLE branch (branch_name varchar(35),branch_city varchar(15),assets numeric(15,2) CHECK (assets > 0.00),CONSTRAINT branch_pkey PRIMARY KEY (branch_name));CREATE TABLE customer (ID varchar(15),customer_name varchar(25) NOT NULL,customer_street varchar(35),customer_city varchar(15),CONSTRAINT customer_pkey PRIMARY KEY (ID));CREATE TABLE loan (loan_number varchar(15),branch_name varchar(35),amount numeric(15,2),CONSTRAINT loan_pkey PRIMARY KEY (loan_number),CONSTRAINT loan_fkey FOREIGN KEY…Hello, I am having an error and cannot figure out how to solve this question. Could someone please assist? Please be advised, I am using PostgreSQL as that is what was used in class. Thus, I must use PLPGSQL Code CREATE OR REPLACE FUNCTION Moreno_03_bankTriggerFunction()RETURNS TRIGGERLANGUAGE PLPGSQLAS$$CREATE TRIGGER Wise_12_bankTriggerAFTER DELETE ON accountFOR EACH ROW EXECUTE PROCEDURE Moreno_15_bankTriggerFunction();
- ONE S X O Intrdu 6 ssd (2) x 6 Task3. Z Zotero x O Differe x G Use th x • Identif x ملفاتي M Iul x fi Fiverr x + A elearning.utm.my/21221/pluginfile.php/318434/mod_resource/content/3/Module%205%20-%20Central%20Processing%20Unit%20AA24Apr2021-StudentPar. Q Intrduction 25 / 56 67% + 24 Segment Activity 2 Segment Name Execution Time (ns) Instruction Fetch & 52 Example 13: Decode (IF) Operand Fetch (OF) Instruction Execute (IE) 40 30 • There are 4 segments as follows: Operand Store (OS) 40 • The interface delay is 3 ns. • The simple block diagram of the pipeline: 国中中中中中 R OF PRP IE OS Draw the space time diagram and calculate the: a) cycle time of the non-pipeline and pipeline. b) execution time for 50 tasks. c) real speedup. d) Maximum speedup. Module 5 - Central.pdf Show all 1:11 PM P Type here to search 85°F 12/16/2021Create a COVID-19 support service application using Python namedCovidSupportSystem that will provide the user with the below options:• Statistics,• Prevention,• Symptoms,• Treatment and Report case 1.1 Under Statistics state how many cases there are in South Africa, China and USA, then askthe user if they would like to see the cases for a different country, if yes, askthem to pick a number between 0 and 9, then pull a country from a list to showPlease use IBM Business Computing to answer the folloing question 1 – Create a new Library called VnnLIB1 (NN is your student login id number) using the command CRTLIB 2 – Create a new Jobq VnnJOBQ1 and Outq VnnOUTQ1 in the Library VnnLIB1 using the command crtjobq and crtoutq 3 – Grant *PUBLIC *USE Authority to your VnnLIB1 library using the command wrkobj VnnLIB1 and then option 2 4 – Submit 3 jobs using sbmjob in your VnnJOBQ1, these jobs will not run, since they are not attached to any sub-system. Check it out by using wrkjobq command 5 – Change the 3 jobs submitted in step #4 to run in sub-system QINTER and change the out to VnnOUTQ1. These jobs will run, and the results will be in VnnOUTQ1. Check it out by using wrkoutq command 6 – Create a new Source File called VnnSRC in your library VnnLIB1 using command crtsrcpf 7 - Create a new Save File called VnnSAVF in your library VnnLIB1 using command crtsavf 8 – Run DSPJOBLOG command and save the output in your spool file 9 – Write the…
- ONE X Intrd X O ssd ( X O Task: X Z Zote x O Diffe x G Uset x • Ident X ملفات البريد M i Fiver x C Get x + A elearning.utm.my/21221/pluginfile.php/318427/mod_resource/content/2/Module%205%20-%20Central%20Processing%20Unit%20AA24Apr2021-StudentPar. Q Intrduction 74 / 88 75% Trace the execution of the instruction by showing Activity 1 all the changes in CPU registers (control and general purpose registers) as well as the micro- operations related to the instructions. Use the given initial table. Exercise 5.2 : Memory address 39D Memory Content A450 Instruction/Data L1: XCHG CX, NUM 39E B451 SUB VAL1,CX 39F C39D JMP L1: 450 100 NUM 451 500 VAL1 Clock IP/PC MAR MBR IR CX NUM VAL1 Micro-operation to 200 100 74 Module 5 - Central.pdf Show all 1:43 PM P Type here to search 85°F 12/16/2021Linux System ProgrammingCode a C++ program, named processes.cpp that receives one argument, (i.e., argv[1]) upon itsinvocation and searches how many processes whose name is given in argv[1] are running onthe system where your program has been invoked. To be specific, your program shoulddemonstrate the same behavior as:$ ps -A | grep argv[1] | wc -lImplement processes using the following system calls:1. pid_t fork( void ); creates a child process that differs from the parent process only interms of their process IDs.2. int execlp( const char *file, const char *arg, ..., (char *)0 ); replaces the currentprocess image with a new process image that will be loaded from file. The firstargument arg must be the same as file. The last argument is a NULL pointer of type“char *”.3. int pipe( int filedes[2] ); creates a pair of file descriptors (which point to a pipestructure), and places them in the array pointed to by filedes. filedes[0] is for readingdata from the pipe, filedes[1] is for…Code is here- INCLUDE PCMAC.INC.model small.586.stack 100h.data msg DB 'Today is: $' ; Declare string outputsaveAX DW ? ; Variable to save register AXsaveDX DW ? ; Variable to save register DX EXTRN putDec:NEAR ; Use subprogram putDecDay PROC ; Begin procedure_Begin_GetDatemov ax, @data ; Requirementmov ds, ax_putStr msg ; Write output message_getDate ; Get System Datemov saveDX, dx ; Save Month and Daymov al, dh ; Move month to register ALmov ah, 0 ; Clear high value in AHcall putDec ; Write Month_putCh '/' ; Write '/'mov dx, saveDX ; Restore Month, Daymov al, dl ; Move day to register ALmov ah, 0 ; Clear high value in AHcall putDec ; Day_putCh '/' ; Write '/'mov ax, cx ; Move year to register AXcall putDec ; Year_Exit 0 ; Exit programDay endpend Day; My program displays " Today is: //", I need it to display the current date.
- USING GITBASH SHELL SCRIPT Find the even multiples of any number chosen by the user in a given range – the usershould specify the multiples of which number they want to print and a minimum and maximumvalue. The multiples printed should be within the [minimum, maximum] range. For example, ifthe user choses the number 7 and would like to print all even multiples in the [15, 60] range, theprogram should print all the even multiples that are bigger than or equal to 15 (minimum), butsmaller than or equal to 60 (maximum). The program should keep a count of how many numberswere printed and should output that count, as well as the numbers. The output then, for theexample given, should be 28, 42, 56, and the count should be 3. So l wrote this code as shown by the screenshot and now l want to write the same code using functions this is the code GNU nano 5.9…USING GITBASH SHELL SCRIPT Find the even multiples of any number chosen by the user in a given range – the usershould specify the multiples of which number they want to print and a minimum and maximumvalue. The multiples printed should be within the [minimum, maximum] range. For example, ifthe user choses the number 7 and would like to print all even multiples in the [15, 60] range, theprogram should print all the even multiples that are bigger than or equal to 15 (minimum), butsmaller than or equal to 60 (maximum). The program should keep a count of how many numberswere printed and should output that count, as well as the numbers. The output then, for theexample given, should be 28, 42, 56, and the count should be 3. So l wrote this code as shown by the screenshot and now l want to write the same code using a different alternative like functions or the for loop not the while loop this is the code GNU nano 5.9…Computer Science Below question is based on google cloud Function Assume you have a Cloud Function created and it is set for unauthenticated invocation. Further assume the trigger type is HTTP. You may use whichever language you prefer for Google Cloud. What is the code required to display the following message from the page, assuming that username and status are passed in as querystring variables? Your assigned username is: username Your status is: status