Do not use pseudo-instructions

Assignment Help Basic Computer Science
Reference no: EM13979097

Below is the main function for this assignment.  Copy this into your file to start and change Name to your name.  Stubs have been added for some of the functions so it will assemble.

.data num1: .word 0 num2: .word 0

text1: .asciiz "\nProduct " name: .asciiz "\nName" endline: .asciiz "\n"

.text

.globl main

 

main:

 

lui $a0, 0x1001     

# get start of data

 

addiu $a0, $a0, 0x0012

# get start of name

 

andi $a2, $a0, 0

 

# set flag to false

 

 

jal print  

 

# print name

 

ori $s0, $0, 5

 

# repeat 5 times

top:

beq $s0, $0, end

 

# if counter is zero, stop loop

 

 

 

 

 

lui $a0, 0x1001

 

# set address of first word

 

addiu $a1, $a0, 4

 

# set address of second word

 

jalgetinput

 

# call function to get input, store into memory

 

 

 

 

 

lui $t0, 0x1001

 

# get address of first word

 

lw $a0, 0($t0)

 

# get the first value from memory

 

lw $a1, 4($t0)

 

# get the second value from memory

 

jal multiply

 

# multiply the values, result in $v0

 

addi $a1, $v0, 0

 

# get value to print from $v0

 

lui $a0, 0x1001

 

# get start of data section

 

addi $a0, $a0, 8

 

# get start of product output string

 

ori $a2, $0, 1

 

# set flag to true

 

jal print  

 

# print result

 

 

 

 

 

addi $s0, $s0, -1

 

# decrement counter

 

 

j top       

 

# repeat

end: ori $v0, $0, 10

 

# set command to stop program,

         syscall    

 

 

 

getinput: jr $ra

#stub

 

print: jr $ra      

#stub

 

multiply: jr $ra

#stub

 

You are to complete the program by writing four functions.  Pay particular attention to the purpose of each function, what registers to use and how the parameters and stack are to be used.  If the instructions specify a particular register, then you must use it.

1.      print

                                  $a0 - address of a string to print

                                   $a1 - value of an integer value to print

                                   $a2 - boolean value (1 or 0)

 

This function must first print the string, then if $a2 holds a 1 (true) print the integer.  Both outputs must be on the same line. End the output with a newline. 

2.      multiply

                                   $a0 - first integer

                                   $a1 - second integer

                                   $v0 - first integer * second integer

 

This function is to calculate and return the result of multiplying the arguments together. You may assume that both arguments are greater than zero.  As multiplication is really repeated addition, you can calculate the result by adding and using a loop.  Using a version of the mult instruction is NOT ACCEPTABLE.

3.      getpos 

                                   $a0 - prompt

                                   $v0 - positive integer input

This function will print the prompt string by calling the print function (above) and then get input from the user.  This process is repeated until a value greater than zero is input.  The value is then returned in $v0.  As this function calls another function so you MUSTsave the $ra on the stack (not into another register).

4.      getinput

                                  $a0 - address to store the first value

                                   $a1 - address to store the second value

This function must call the getpos function two times and store each return value into the memory locations given in $a0 and $a1.  As this function calls another function so you MUST save the $ra on the stack (not into another register).

General:

1.      Do not use pseudo-instructions.  

2.      All calls to the functions must be done through jal and returns through jr.

3.      Your code must be documented for each function.  Describe which registers are used in the function and how they are used.

Submit your file with the complete program.

Reference no: EM13979097

Questions Cloud

Do a what if analysis by changing the probability : What is the probability that at least 30 employees out of 80 would be financially secure if they lost their job for 6 months to a year?
What is the standard deviation of the random variable : What is the standard deviation of the random variable? What is the mean of the random variable?
Zero economic profit includes a normal return : Zero economic profit includes a normal return for business owner. However, how do we know that the business owner will be satisfied with zero economic profit? In other words, if a business owner is earning zero economic profit, is there another oppor..
An investor has two investments a and b : An investor has two investments A and B. The investor believes that investment A is equally likely to increase by $1,000 or to decrease by $1,000 by the end of the year.
Do not use pseudo-instructions : You are to complete the program by writing four functions.  Pay particular attention to the purpose of each function, what registers to use and how the parameters and stack are to be used.  If the instructions specify a particular register, then you ..
How did hasting big five model of personality leadership : How did Hasting Big Five model of personality leadership traits change from Pure Software to Netflix? Which leadership styles did Hasting use at Pure Software and Netflix? How effectively were these leadership styles used? Explain how power, organiza..
Given a choice between a command line interface : 1.Given a choice between a command line interface and a GUI, most people prefer the GUI. There are, however, people who prefer the command line interface. Why do you suppose anyone would prefer a command line interface?2. Briefly describe a hierarchi..
Find the expected number of people who arrive before you : a. Find the expected number of people who arrive before you.b. Find the variance of the number of people who arrive before you.
Explain each of the columns in the data : The sample above shows all three of the types of input that will be found in our tests. All the input will start with a header line like the one at the top of the input and it should be ignored. Let me explain each of the columns in the data

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Compare clock cycle times and execution times

Instead of a single cycle orgization we use multicycle organization where each instruction takes multiple cucles but only one instruction finishes before another is fetched. in this organization.

  Create a binary heap class in python

1. Create a binary heap class in python. 2.The Heap class should have a limited heap size.(the heap only keeps track of the n most important items) 3. pass the max heap size in the constructor. (If an element gets added to the heap that makes it grow..

  Explain cause and effect transition happen

One process could cause another process to make a transition. Under what circumstance, if any, would the following. Cause and effect transition happen ?

  Explain the management of high-assurance software

The company does not adduce any additional evidence of assurance. How would you explain to the management of this company why their software is in fact not "high-assurance" software?

  Write a program that reads two coordinates

Write a program that reads two coordinates (x1, y1) and (x2, y2), and prints the slope of the line passing through these two points.

  Item analysis debate

Include other scholarly resources other than those listed below with appropriate references and in-text citations.

  The woofwoof store specializes in food products

The WoofWoof Store specializes in food products for dogs and other household pets. In developing a new puppy food, company nutritionists have specified that the mixture must contain at least 16% protein, 13% fat, 12% vitamin, and no more than 15% fib..

  What is the output of the following unknown method

What is the output of the following unknown method

  Digital terrorism and criminology of computer crime

List at least three (3) major categories of cyber terrorism and / or information warfare. Among the chosen categories, determine the one (1) that should be the top priority for the federal government to address. Provide a rationale to support your re..

  Compare and contrast roles and responsibilities it positions

Compare and contrast the roles and responsibilities of IT position.

  Determine five challenges faced by multiprocessors when

discussion 1registers memory and pipelining please re spond to the followingexplain whether or not programs should use

  B2b e-marketplaces

Volkswagen operates its own proprietary B2B e-marketplaces in which its suppliers participate. What are the disadvantages to Volkswagen of not using a generic B2B e-marketplace with even more suppliers?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd