Write a subroutine that reads every symbol of the string

Assignment Help Computer Engineering
Reference no: EM131881000

Problem

1. Declare a string using DCB directive. Write a subroutine that reads every symbol of the string and compares if it is a letter (A-Z, a-z).

2. Declare in the memory four ASCI symbols using DCD macro-directive. Write two subroutines. The first one pack reads these four symbols and packs them in a word packedAscii. The second oneunpackAsciireads the wordpackedAsciiand unpacks itto registersr5 to r8.

3. Write a subroutine that loads a word from the memory and makes permutations: first and third byte; second and forth byte. After that it stores the result in another word in the memory.

Reference no: EM131881000

Questions Cloud

Save money for retirement : Bilbo Baggins wants to save money to meet three objectives. how much will he have to save each month in Years 11 through 30?
Explain the difference in independent demand : In looking at demand management explain the difference in independent demand, dependent demand and derived demand. Explain how CRM
Discuss the impact hipaa has had on hcos and providers : Explain how abiding by HIPAA rules and regulations may challenge the ethics of health care professionals.
Define and distinguish between possession : Define and distinguish between possession, form, time, and place utility. Give a "real world" example for each one.
Write a subroutine that reads every symbol of the string : Declare a string using DCB directive. Write a subroutine that reads every symbol of the string and compares if it is a letter (A-Z, a-z).
Explain the difference in independent demand : In looking at demand management explain the difference in independent demand, dependent demand and derived demand. Explain how CRM
Why should every nation have a cybersecurity strategy : Write a paper on Why Should every nation have a cybersecurity strategy - The 12-20 page requirement is for the paper body
Which entity prepares consolidated worksheet : Beta Corporation acquired 100 percent of the voting shares of Yang Inc. by issuing 10,000 new shares of $10 par value common stock with a $40 market value.
How does reverse logistics relate to a company : How does reverse logistics relate to a company being socially responsible and how is reverse logistics related to service recovery?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Question1 write down an sql statement to show tables owned

question1. write down an sql statement to show tables owned by user newyear. 2. write down an sql statement to show the

  What is the markup vocabulary of a markup language

What is the markup vocabulary of a markup language? What is an XML namespace? From where do the names used in defining an XML schema come?

  Suppose a computer using a set-associative cache

assume that a computer using a set-associative cache has 2^16 words of main memory and a cache of 32 blocks, where each cache block contains 8 words.

  Writing program for rectangle

Write down a program that asks for the length L and the width W of a rectangle, then compute the perimeter and area of the rectangle. Perimeter = (length + width) * 2

  Write an algorithm for driving from where you live

Write an algorithm for driving from where you live to the nearest airport that has regularly scheduled flights.

  Distinguish between a file and a directory

What is a file? Distinguish between a file and a directory. Distinguish between a file and a file system. Why is a file a generic concept and not a

  What is the primary responsibility of a firewall

What is the primary responsibility of a firewall? What are the three basic types of firewalls? What are the advantages of having a security policy in place?

  Recognize trends in mobile software development and

imagine you are employed as a senior software engineer in a company that designs and produces mobile software

  Redesign your favorite programming language

Redesign your favorite programming language to eliminate all specific input/ output features. Instead, allow the programmer to create persistent variables.

  Write a program that implements the given algorithm

Write a program that implements this algorithm. The user should supply an 8-digit number, and you should print out whether the number is valid or not.

  Identify four types of input control and explain function

Identify four types of input control and explain function of each. Provide an example of data integrity error that could occur if each of these types of input.

  Determine whether or not you should move forward

determine whether or not you should move forward with the implementation of a virtual infrastructure. Justify your response.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd