MARIE assembly language program

Assignment Help Basic Computer Science
Reference no: EM133860453

Question

You are to design, write, test, and debug a MARIE assembly language program that inputs a sequence of characters from the set A-Z (capital letters only), stores each character in memory after it is transformed by the trivial ROT13 cipher, and then, after character input completes, outputs the transformed characters.

A template source code file (Project-2_Starting_Code.mas) is provided with this assignment. Edit this file to create a program that meets the program specifications. Note that the template includes instructions to initialize some working values that your program can use. The template also defines memory locations.

You may add data memory locations. The program can be designed without additional data locations, but it may be necessary to do so for your design.

For full credit, your solution must perform the functions and satisfy the requirements specified below.

a) The first instruction of the program must be placed at location (address) 0x100 (100 hexadecimal) in MARIE's memory. This is accomplished by following the program template that is provided.

b) The constant data values (One, ChA, ChZ, ChPe, Val13, Start) should not be changed by the program. The program can load from these memory locations, but should not store to them.

c) Transformed input characters must be stored in successive memory locations beginning at location 0x200 (200 hexadecimal) as indicated in the program template. The program should store all transformed input characters before any characters are output.

d) The program should always initialize the values for Ptr in the working data memory and not rely on the values for these locations that are defined in the assembly source file. This initialization is done by the provided template file.

e) The program should work for any inputs 'A' through 'Z' and '.' (a period terminates input). In the interest of keeping the program simple, the program does not need to validate inputs.

f) When transformed characters are stored and when transformed characters are output, the program must use a loop and indirect addressing to access the values in the array of words. Note that variable Ptr is initialized in the template code and should be used in the loop. You may also define a Count variable to count the number of characters, but there are also correct designs that do not require a Count variable.

g) The program should operate as follows:

Input Phase:

1. A character (A-Z or '.') is input. MarieSim allows the user to input a single character that is read into the accumulator (AC) with an Input instruction.

2. If character '.' (period) is input, then the input phase ends and the output phase begins (step 5 below). (The period may be stored in memory to mark the end of the characters or the characters can be counted to determine how many transformed characters to output during the output phase.)

3. The character that is input is transformed using the trivial ROT13 cipher (see Section 5.1).

4. The transformed character is stored in the next location in the block of memory beginning at location Start. (Variable Ptr must be updated and indirect memory addressing must be used.)

Output Phase:

5. All transformed characters are output, beginning with the first character that was transformed.

The '.' character is not to be output. (This will require a loop using variable Ptr and indirect addressing. Note that the number of characters to output will vary and the program must know when to stop the output by relying on a '.' or other special character in memory, counting the
number of input characters during the input phase, or some other method.)

6. After all characters are output, the program halts by executing the HALT instruction.

4. Testing

Test and debug the program using the MARIE simulator. Debug the program using the "Step" and "Breakpoint" (step-by-step) features of the simulator. You must test your program with the following two test cases.

Test 1: Input the eight-character sequence "VIRGINIA" followed by a '.' to terminate the input. Note that you need to input one character at a time into MarieSim's UNICODE Input area, with each character followed by pressing the "Enter" key. The ROT13 value of each character ("IVETVAVN") should be displayed after the '.' character is input.

Test 2: Rerun the program in MarieSim, without reassembling or reloading, then input the four-character sequence "GRPU" followed by a '.' to terminate the input. Note the output.

Reference no: EM133860453

Questions Cloud

SuvaTech Solutions Database System : The organization also manages cloud service and software licenses; which clients subscribe to under different pricing tiers.
Athletes Make several dictionaries : Athletes Make several dictionaries, where the name of each dictionary is the name of an athlete.
Different fees based on the time of day and on weekends : Toll roads have different fees based on the time of day and on weekends. Write a method calcToll() that has three parameters
About the plain text and there is no way to break the code : With the use of one-time pad, the cipher text contains no information whatsoever about the plain text and there is no way to break the code.
MARIE assembly language program : You are to design, write, test, and debug a MARIE assembly language program that inputs a sequence of characters from the set A-Z
Generic cyber-physical system entry points of attack : What are the six generic cyber-physical system's entry points of attack? What are the examples, descriptions, and defenses regarding the following attacks?
Write program that adds up the numbers in file : Write a program that adds up the numbers in a file and prints out their sum, average, max and min. Assume that there is one number per line.
Field of the enrollments table : Relate the Primary Key of the Students table to the StudentID field of the Enrollments table.
Investigation to make digital evidence usable in court : A computer forensics detective should recover deleted data using practices that meet legal standards for investigation to make digital evidence usable in court.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd