Write a program to produce a double table

Assignment Help Basic Computer Science
Reference no: EM13167040

Using the ROL instruction to perform multiplication, write a program to produce a double table. This table should be built from a single int32 value provided by the user and print 3 rows beginning with the starting value. Within that row, the pattern of doubled numbers should be calculated by issuing ROL instructions. For the next row, start it with the first number from the prior row increment by one.

For example, the following output should be produced when the user inputs the starting value 2:

Gimme a starting value: 2
Double Table
2 4 8
3 6 12
4 8 16

And here would be the output produced when the user inputs the starting value 4:

Gimme a starting value: 4
Double Table
4 8 16
5 10 20

 

 

Reference no: EM13167040

Questions Cloud

Define a class called counter : Define a class called Counter. An object of this class is used to count things, so it records a count that is a non negative whole number. Include methods to set the counter to 0, to increase the count by
Prompts for an int8 value to inspect and then prints : Write an HLA Assembly program that prompts for an int8 value to inspect and then prints it in binary format.
Temporarily move to the street so that the : Driveway is a "last-in, first-out" stack. Of course, when a car owner retrieves a vehicle that wasn't the last one in, the cars blocking it must temporarily move to the street so that the requested vehicle can leave
Fair and responsible use of college computer : Fair and Responsible Use of College Computers" and is based on the rules and regulation provided by your institution. Does your school have a similar policy? Does it contain all the elements listed in the text?
Write a program to produce a double table : Using the ROL instruction to perform multiplication, write a program to produce a double table. This table should be built from a single int32 value provided by the user and print 3 rows beginning with the starting value. Within that row, the pattern..
Most cost-effective in terms of both time and money : Search the Web for security education and training programs in your area. Keep a list and see which category has the most examples. See if you can determine the costs associated with each example. Which do think would be most cost-effective in terms ..
Write a program that will accept the names of 3 processes : Write a program that will accept the names of 3 processes as command-line arguments. Each of these processes will run for as many seconds as: (PID%10)*2+3 and terminate.�
Random numbers : Create a program that will generate a list of 200 random numbers (ranging from 1- 1000) and determine the medium, mode, and average of the list of numbers. Have the program display the original list and then display the list in ascending and desce..
Searches for items that are not in the list : How many searches for items that are not in the list would you have to do to make sorting and using binary search a better strategy than using linear search?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Perceptions of product create its personality

Perceptions of product create its personality. Bottom, round the back. And even there they are ugly. Is that essential? Could they not, in some small degree, give pleasure?

  Adding two unsigned and signed binary numbers

Add the two binary numbers and interpret the sum assuming that the numbers are (1) unsigned, and (2) signed.

  Create a program to keep track of the participants

Create a program to keep track of the participants in a triathlon. Your program will keep track of the times in three events: Running, Swimming, and Biking.

  Write a program to help the weatherman with weather report

write a program to help the weatherman with his weather report. you will sample the temperature each hour on the hour over the course of 24 hours

  Explain why companies get better results-information system

Using three components of information systems and complementary assets concepts, explain why some companies achieve better results with information systems than others.

  Let r be a cfg in chomsky normal from with x variables.

Let R be a CFG in Chomsky normal from with x variables.

  Explain the roles of computer forensics expert

Explain the roles of computer forensics expert and computer security expert. You should include the following: Which specific positions (job titles) are in demand within business organizations?

  Explain implications of copyrights on usage of web site

Study and explain copyright implications associated to Web site development. Write down minimum of 350 words explaining the implications of copyrights on usage of content on Web site.

  What influence the concept of pervasive computing

What you believe the eventually influence will be of concept of "pervasive computing" or"location based services" will be on society.

  How components of computer system interact in system

How do components of computer system interact within system? What improvements or additions to system do you believe would benefit you or make system more user-friendly?

  Decision to maintain the website in-house or outsource it

You also have financial consideration to take into account. If hosting is outsourced, the cost is fixed. Write down the advantage of keeping it in house?

  Describe the different parts of the cia triad

Describe the different parts of the C.I.A. triad and how each can be used to improve the overall security of an information system.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd