Write an assembly subroutine that check if a number is in the interval of [0, 10] and return 1 if the number is in this interval and 0 otherwise. Call this subroutine to check if each integer in an array in the memory is in this interval and write the results of all numbers into another array in the memory

Answers

Answer 1

Answer:

.data

array: .word 1,3,5,7,9,11,13,15,17,19

result: .word 0,0,0,0,0,0,0,0,0,0

.text

  la $s0, array

  la $s1, result

  addi $t0, $zero, 0

  INTERVAL:  bge $t0, 10, END

     sll $t1, $t0, 2

     add $t2, $s0, $t1

     lw $t2, 0($t2)

     jal LIMIT

     IF:    bne $a0, 1, ELSE

        add $t3, $s1, $t1

        sw $t2, 0($t3)

     ELSE:

     addi $t0, $t0, 1

     j INTERVAL

  END:    

  addi $v0, $zero, 10

  syscall

  LIMIT:  

     addi $a0, $zero, 0

     START: bge $t2, 0, NEXT

        b ENDLIMIT

     NEXT:  ble $t2, 10, SET

        b ENDLIMIT  

     SET:   addi $a0, $zero, 1

     ENDLIMIT:

     jr $ra

Explanation:

The assembly source code is used to create a subroutine called "INTERVAL" that checks if a number from an array is in a range of 1 to 10. The program returns 1 if the condition is met but 0 if otherwise.


Related Questions

How does the CPU interface with the device to coordinate the transfer?

Answers

Explanation:

The CPU can initiate a DMA (Direct Memory Access) operation by writing values into special registers that can be independently accessed by the device, The device initiates the corresponding operation once it receives a command from the CPU.

Which of the following makes the varied types of digital communication possible?


an agreed-upon set of rules and standards governing the way technology shares and manages data


properly linking all of the workstations on a closed loop-like configuration


refraining from relying too heavily on one central hub that connects all nodes on a system


only using a high-quality server computer with lots of memory

Answers

Answer:

An agreed-upon set of rules and standards governing the way technology shares and manages data

what is paragraph indentation

Answers

Answer:

a blank space between a margin and the beginning of a line of text

Explanation:

The space before start start of your paragraph. Ex:what I did with the first sentence

The miniaturization of which of the following inventions allowed integrated circuits to get smaller, leading to the creation of the microprocessor?.

Answers

The miniaturization of microchip inventions allowed integrated circuits to get smaller and leads to the creation of the microprocessor.

What is Microprocessor?

A Microprocessor may be defined as a kind of miniature electronic device that significantly stores the arithmetic, logic, and control circuitry mandatory to carry out the functions of a digital computer's central processing unit.

Microchips are silicon devices that remarkably function as the central processing unit in the computer. These chips possess numerous electronic components which are utilized to carry out specific mathematical operations.

Along with this, these chips also migrate data from one memory location to another with the support of microprocessors.

Therefore, the miniaturization of microchip inventions allowed integrated circuits to get smaller and leads to the creation of the microprocessor.

To learn more about Microprocessors, refer to the link:

https://brainly.com/question/13164100

#SPJ1

Your question seems incomplete. The most probable complete question is as follows:

The miniaturization of which of the following inventions allowed integrated circuits to get smaller, leading to the creation of the microprocessor?

microchipelectronic circuitvacuum tubetransistor

your University wants to create a new department for university alumni. Every
employee has their own system credentials and they can use these credentials on any system inside the
building. how can you ensure the system authorization, availability and monitoring.

Answers

The way to ensure the system authorization, availability and monitoring is that an efficient and effective online examination system be made or a system where all can clock in daily can be used.

What is system credentials?

The system credentials is seen as a kind of Credentials that is known to be used for the verification of peoples identity as well as been used as a tools for authentication.

Note that they can be part of a certificate or other authentication act that helps to know the identity of a user's and as such, The way to ensure the system authorization, availability and monitoring is that an efficient and effective online examination system be made or a system where all can clock in daily can be used.

Learn more about system credentials from

https://brainly.com/question/4670419

#SPJ1

Identify two clues a tester can take from the code when writing tests.

Answers

The two clues that a  tester can take from the code when writing tests are:

Always write tests before the code needed to pass them.The test prepares for the code's intended behavior.

What do code tests do?

In order to find flaws or problems throughout the software development process, code-based testing requires running over every line of code in a program.

The program is tested against specific test cases to determine whether it executes the necessary functionalities. Static and structural testing are two further subcategories of code-based testing.

Therefore, the evidence that a  tester can use in a program if they are writing some kinds of codes are those based on the code written.

Learn more about coding from

https://brainly.com/question/22654163

#SPJ1

Which menu option allows you to change the display to close-up, single, or multiple pages?

Answers

What is the question asking for?……

What device that will have the most network ports.

Answers

Answer:

switch device

Explanation:

because its purpose is to connect many devices.

Answer: SWITCH DEVICE

Explanation:

You join Mountain Water Co – an expanding bottled water company as an information security officer. The company wants to do a lot of advertising of its bottled water products through its website. The CEO asks you to review the company website and report if it is secure. After talking to the webmaster you find out the following:


The Web server accepts all connections


No authentication is required

Self-registration is allowed

The web server is connected to the Internet

Is the situation secure? Select all that apply.


a.

Yes. There is no threat to a bottled water company so it is secure.


b.

There is insufficient information available to answer this question.


c.

No. Anything that is connected to the Internet is insecure.


d.

No. The system is allowing everyone to register. Only individuals who are associated with the company should be able to register.


e.

No. If there is no authentication, then anyone with access to the website online can access it. For good security only individuals with certain authorized roles should access a website.

Answers

In regards to the above case, My response is c. No. Anything that is connected to the Internet is insecure.

What is meant by computer security?

Computer security is known to be a term that can be called cybersecurity. This is seen as a form of  protection of computer systems as well as information from any kind of harm, theft, as well as any form of unauthorized use.

Note that Computer hardware is seen to be protected by the same ways or methods that one uses to protect other valuable things.

In the above, there is no method of authentication and as such, In regards to the above case, My response is c. No. Anything that is connected to the Internet is insecure.

Learn more about Computer security from

https://brainly.com/question/25720881

#SPJ1

What are the 3 constraints for mineshaft headgear

Answers

The  3 constraints for mineshaft headgear

The ore, or metal often run out. There is issue of  Incompetence or faulty parts.Their structure can be complicated.What is Mine headgear constructions about?

Mine headgear constructions is known to be one that tends to aid the wheel method that is often used for suspending any kind of winding cables that moves workers and ore up as well as  down deep level shafts.

Note that the  The  3 constraints for mineshaft headgear

The ore, or metal often run out. There is issue of  Incompetence or faulty parts.Their structure can be complicated.

Learn more about mineshaft headgear from

https://brainly.com/question/24554365

#SPJ1

Answer the following questions in your own words.
[tex] \\ \\ [/tex]
1. What is the difference between tools and equipment?

2. Describe the word paraphernalia.​​

Answers

1. A tool is something more specific, used to do work. Tools are always equipment, but a pice of equipment is not always a tool. For instance a hammer and a saw are tools, and if you’re planning to build something they are part of your equipment for the job

2. The separate real or personal property of a married woman that she can dispose of by will and sometimes according to common law during her life

Raw images can be processed again at a later date when new and improved software become available.
Group of answer choices

True

False

Answers

Answer:

True

Explanation:


Which of the following are the functions of an OS?
An OS is responsible for managing and coordinating activities on a computer. The OS delegates booting of a system to other parts of the
system. The OS allocates computer memory and CPU time to various applications and peripheral devices. After this, the CPU manages the
peripheral devices, while the OS acts as an Interface between the user and the peripherals.

Answers

Answer:

The OS allocates computer memory and CPU time to various applications and peripheral devices. After this, the CPU manages the peripheral devices, while the OS acts as an Interface between the user and the peripherals.

The ______________ and Internet connectivity provide the communication path and connection to the network.

Answers

Answer:

I chose router for this one too. I don't know if both the answers are router, but I got an A so it was either one was wrong or both were right.

Explanation:

The router and Internet connectivity provides the communication path and connection to the network.

What is internet connectivity?

Dial-up telephone lines, broadband connections that are constantly on, and wireless devices are all examples of "Internet connectivity," which is the phrase used to describe how individuals connect to the Internet. The most recent of them is a wireless connection to the Internet.

One or more packet-switched networks or subnetworks can be connected using a router. By sending data packets to their intended IP addresses, it manages traffic between different networks and permits several devices to share an Internet connection.

The router is a transformation of information from one to another packet.

Therefore, the router is the provider of connection to the network.

To learn more about internet connectivity, refer to the below link:

https://brainly.com/question/13600794

#SPJ2

You do not need to cite anything used from creative commons.
True or False?

Answers

True. It is not necessary to cite information that is common knowledge. One of the ways to judge if something is common knowledge is to ask yourself if anyone in the field would know this information or if no one would argue against it.

Answer: False

Explanation: Creative commons is when a person uploads their own copyrighted content and gets license for it, so it other people online may add to it or alter it and re-share it. They get to decide how you get to use and what you are allowed to do with but no matter the situation you always have to give credit to the original content creator. Thus, false, you NEED to cite anything used from Creative Commons.

HELP ASAP 100 points as i need answer soon

You join Mountain Water Co – an expanding bottled water company as an information security officer. The company wants to do a lot of advertising of its bottled water products through its website. The CEO asks you to review the company website and report if it is secure. After talking to the webmaster you find out the following:
The Web server accepts all connections


No authentication is required

Self-registration is allowed

The web server is connected to the Internet

Is the situation secure? Select all that apply.


a. Yes. There is no threat to a bottled water company so it is secure.


b. There is insufficient information available to answer this question.


c. No. Anything that is connected to the Internet is insecure.


d. No. The system is allowing everyone to register. Only individuals who are associated with the company should be able to register.


e. No. If there is no authentication, then anyone with access to the website online can access it. For good security only individuals with certain authorized roles should access a website.

Answers

Answer:

yes

Explanation:

but you need to open the website before asking this question

Assume that your company provides IT systems integration consultancy for mid-size
manufacturing, distribution and logistics companies in the country. Having recommended and
implemented a Management Information Systems (MIS) for one on your leading clients, and
taken part in the training session of the MIS conducted by the vendor, develop a process model
with the appropriate tool set for the activities that must be performed by the sales ordering
module of the MIS to capture customer’s sales order for a named client. (Note: Your solution
must include (but not limited to) an explanation of the sales module of the MIS and the steps
involved in the sales order activities).
Discuss how information systems are useful for organizations?

Answers

Every company needs records of its actions in order to identify the root of issues and implement appropriate fixes. Storage of operational data, communication logs, documents, and modification histories can be done with the help of information systems.

Why is information system important?

By supplying organizations with information they can use to make informed decisions, information systems may help them make better judgments. An organization might, for instance, employ an information system to gather sales data, which will show which products are selling well and which are not. The things to promote or delete can then be decided using this data.

By processing data from company inputs to produce information that is valuable for managing your operations, information systems become important. You can either add more data to make the information more accurate or use the information in innovative ways to boost the usefulness of the information system.

By enabling managers and other organization leaders to store data in folders and documents that can be seamlessly shared with the right personnel, information systems help disseminate information.

Learn more about information systems on:

https://brainly.com/question/14688347

#SPJ1

Describe the word paraphernalia in your own words​

Answers

Answer:

miscellaneous articles especially the equipment needed for a particular activity

Which of the following information
is required by application programs
to access the content ofa file.
a. File name
b. File location
c. File extension
d. File size

Answers

An information which is required by application programs to access the content of a file is: c. File extension.

What is a file?

A file can be defined as a computer resource or type of document that avails an end user the ability to save or record data as a single unit on a computer storage device.

In Computer technology, a sequence which best reflects the size of various files and their extension on a computer system, from smallest to largest include the following:

Text (.txt)Compressed files (.zip)Picture (.jpeg)Audio (.mp3)Video (.mp4)

In conclusion, we can reasonably infer and logically deduce that an information which is required by application programs to access the content of a file is file extension because an error would occur if there's an incompatibility issue between the two resource.

Read more on file extensions here: brainly.com/question/1982059

#SPJ1

Advantages and Disadvantages of Modern Devices​

Answers

Answer:

Advantages of Technology:

Easy access to information

Improved Communication

The convenience of travelling

Convenience in Education

Improved entertainment

Disadvantages of technology

Excessive dependency

Inevitable Cheating

Laziness and forgetting the basic way of studying

Given positive integer num_insects, write a while loop that prints, then doubles, num_insects each iteration. Print values ≤ 100. Follow each number with a space.


Sample output with input: 8

8 16 32 64

Answers

Using the knowledge in computational language in python it is possible to write a code that given positive integer num_insects, write a while loop that prints, then doubles, num_insects each iteration.

Writting the code:

num_insects = int(input('Enter num: '))

while (num_insects > 0) and (num_insects <= 100):

  print(num_insects, end='\n') # New line

  num_insects = num_insects * 2

See more about python at brainly.com/question/12975450

#SPJ1

Which of the following commands will visualise the running processes?

Select one:
a. Get-Process
b. Get-RunningProcesses
c. Show-Process

Answers

Answer:

A

Explanation:

The PS command displays your currently running processes in real-time. This will display the process for the current shell with four columns: PID returns the unique process ID.

A

It shows your current running instant in real-time

who is know as father of computer

Answers

Answer:

Babbage is sometimes referred to as "father of computing." The International Charles Babbage Society (later the Charles Babbage Institute) took his name to honor his intellectual contributions and their relation to modern computers.

Answer: Charles Babbage

list any three specification technology​

Answers

Answer:

descriptive, performance and detailed.

Question 8
T
Many states are reducing property taxes for homeowners and extend financial aid for renters in the form of tax
credits.

Answers

Answer: Hey! What's the question?

Explanation:

How is the Agile way of working different?

Answers

Answer:

It is working within guidelines (of the task) but without boundaries (of how you achieve it).

The Internet is the largest example of a _____?

Answers

Answer:

the answer is wide area network

A computer science degree does not typically give students the necessary skills to easily learn a new computer language. True or False.

Answers

Answer:

False

Explanation:

to group worksheets together press and hold the _____ key​

Answers

Answer : to group worksheets together press and hold Ctrl key.

How many input configurations does the Boolean expression (x AND Y) OR (NOT x
AND NOT y) have?
4
6
8
10
CAN SOMEONE PLSEASEEE HELP ME

Answers

Answer:

4

Explanation:

There are only 2 inputs, X and Y, and the number of different input configurations will be 2-to-the-power-of the number of inputs.

2² = 4

In other words, XY can be 00,01,10 or 11 and that's it. Four combinations.

BTW, (x AND Y) OR (NOT x AND NOT y) is allso called XNOR. See picture.

Other Questions
legal positivism holds that there is no law higher than the laws created by a national government and that laws must be obeyed to prevent anarchy even if they are unjust. argumentive essay on computers? what types of programs does the federal government fund for its citizens I WILL GIVE BRAINIEST TO WHO ANSWERS RIGHT AND MORE POINTS City workers are using a snowplow to clear a street. A tire on the snowplow is 3.2 ft in diameter and has to turn 35 times in traveling the length of the street.How long is the street?Use the value 3.14 for 1. Round your answer to the nearest tenth. Do not round any Intermediate steps. Turn these into ratios, what is the simplest form? in a prenatal education class, an instructor informs parents that their childs development will be influenced by many factors, including biological, cognitive, social, and emotional factors. this instructor is addressing which of baltes key principles of lifespan development? Which sentence uses parallel structure?A.Exhausted and not feeling much motivation, Eduardo decided to stay home.B.Exhausted and having little motivation, Eduardo decided to stay home.C.Exhausted and unmotivated, Eduardo decided to stay home. Explain the role of photosynthesis in the flow of energy between the plant and the person shown in the diagram.plant and the person 5. A population of pigeons on the west side of town has a per capital annual growth rate of 0. 7. Aseparate population of pigeons on the east side of town has a per capita annual growth rate of0. 10. If both populations are growing exponentially and both are censused the following year, Inwhich of the populations will dN/dt be greatest? Which number is closest to 58? describe how a philosopher might analyze this riddle: riddlewhat gets wetter the more it dries? answera towel (hint: the word dries has two different meanings.) please find x to this. 5/9x -11 = -51 how i will be fit person? i have four identical oranges. how many ways are there for me to divide these oranges into at most three groups? (by definition, a group must have at least one orange.) Write the slope intercept form of the equation for each line. the price of a candy bar in a vending machine increased from 1.35 to 2.75. what is the percent increase? give your answer to the nearest tenth of a percent 1st sweater2nd sweater3rd sweater4th sweater503530SaveSuppose the price of a sweater is $10. Jaylen's marginal benefit for purchasing each additional sweater is given in the table below. Hegets the most benefit from the first sweater and less benefit from each additional sweater. If Jaylen is behaving rationally, how manysweaters will he purchase? harley is able to control his emotions. he is able to monitor his response to situations and make sure that he expresses his emotions appropriately. true or false? to ensure that your sla is working properly, its important to create a judicial branch made up of your top sales leadership.\