Write an assembly program that has a subroutine named rmndr

Assignment Help Computer Engineering
Reference no: EM131249227

Assignment Digital Systems Design

1. Implement the following function in Assembly. Where out, a, b, c are all Unsigned Integers of 32 bits. out = c * (a + b << 2);

2. Write an assembly program that reverses an array M. Assume size of M is 10 bytes and use stack related instructions only.

3. Compare three register values in R0, R1 and R2, find the largest one, and store it into R3.

4. Write an assembly program that has a subroutine named rmndr which computes the remainder for a variable N when it is divided by 10 and stores the result into a variable M. Your implementation should have basic ARM instructions.

5. Write an assembly program that has a subroutine named pow which computes M^N for two variables and stores the result in P variable. Assume M, N, and P are 32-bit unsigned. Your implementation should have basic ARM instructions.

6. Write a C program that prints the following in the screen:

*****
****
***
**
*

7. Write a C program that checks a character X and if it finds bit 0 or bit 1 of X is 1, then it sets bit 7 and 6 to 1 otherwise 0. Use bitwise operators for it.

8. Write a C program that checks a character X and if it finds bit 0 of X is 1, then it toggles bit 3 repeatedly else sets bit 3 to 1. Use bitwise operators for it.

9. Write a C program that has a function abs(float X) which returns the absolute value of a real number X, where X is a user input. Don't use the built-in abs() function.

10. Write a C program that prints the prime factor of an integer X. For example, X = 20 it should print 2, 2, and 5.

Reference no: EM131249227

Questions Cloud

Critique of the employee retention committee meeting : Perform a detailed critique of the Employee Retention Committee meeting. List the occurrences or omissions that you believe indicate faulty committee practice, and state why you believe so and what should have been done differently
Conduct hand-washing audits of the nursing units : After working in a hospital for six months, you have been selected to head the team to conduct hand-washing audits of the nursing units. Whom do you want on your team, and why?
Find an expression for the tension in the cord : The mass of the shaft and collar may be neglected. The cord keeps the rod at an initial angle of 30? with the vertical while the shaft is initially rotating freely at angular velocity φ? = 200 rad/s. The cord suddenly breaks.
Succession planning procedure : In a minimum of 500 words, document a succession plan for an employee (e.g., IT Developer, Maintenance Crew, Training Specialist, CEO) of your chosen firm. What concepts are crucial when recruiting team members? Be sure to address the following qu..
Write an assembly program that has a subroutine named rmndr : Write an assembly program that has a subroutine named rmndr which computes the remainder for a variable N when it is divided by 10 and stores the result into a variable M.
Develop block 16 in ecuadors tropical rain forest : What conflicts must Conoco resolve in deciding whether or not to develop block 16 in Ecuador's tropical rain forest and what objectives and whose interests appear to be carrying the most weight in this case? Which should dominate?
Find the maximum speed for a typical atv : Find the maximum speed for a typical ATV (with a wheelbase L of 3.5 ft and d of about 4 ft), assuming a sharp turn with radius of curvature of 5 ft.
Assignment-agile versus waterfall : "WATERFALL vs. AGILE METHODOLOGY" (You may also view the article at http://agileintro.wordpress.com/2008/01/04/waterfall-vs-agile-methodology/.)
Respond to murray essay : Assignment: Respond to Murray's essay by telling the story of your choosing to be a college student. Remember to highlight 2-3 "big moments" in your life as you talk about your influences, motives, and goals

Reviews

Write a Review

Computer Engineering Questions & Answers

  What do mean by functional dependency

Why is this table NOT in First Normal Form (1NF) normalization? What can you do to put it in 1NF.

  Make use to effectively manage a team of system

Are different management techniques needed for managing technical personnel versus nontechnical personnel.

  Write a process findranks in java

Write down a method findRanks in Java that accepts an unsorted array of integers vals, and a starting and ending rank start and end, numbering ranks from 0, and returns an unsorted (any order is acceptable) array containing the lo-th through the h..

  Determining the smallest values in dictionary

Explain an efficient method for determining the k smallest values in the dictionary which are greater than low. Your method must take much less than O (n) time whenever k is much less than n. Analyze the time for your method.

  Iterate through vector

Iterate through vector A using a for loop and create a new vector B containing logical values. The new vector should contain true for positive values and false for all other values.

  Different access methods like ofdma sdma tdma cdma and fdma

different access methods such as ofdmasdma tdma cdma and fdma rely on cross-layer optimization to different degrees.

  Describe the type and basic uses of the system how the

write a 700 to 1050 word paper identifying and describing how specific system used in an organization has transformed

  The cio at your organization wants you to evluate a plan to

the cio at your organization wants you to assess a plan to replace the current usernamepassword authentication methods

  Explaining the trust/security domain boundaries

Recognize and explain Trust/Security Domain boundaries which may be applicable to the personal computer (workstation) security in the business context.

  Implement the comparison operations

This is first part of a two-part project in which you will build a simple, but complete computer in Logisim. For this part, you will build three components that will be key parts of the overall computer design.

  Create a use case model for using ms powerpoint

Develop and make a Use Case Model for using MS PowerPoint.

  Implement the lzw algorithm

The LZW algorithm compresses a given text by figuring out patterns which appear very often in the text. The basic idea is to replace (perhaps very long) patterns which appear many times by a much shorter code. Read about this algorithm here .

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd