Write an asm procedure which reverses the string source

Assignment Help Basic Computer Science
Reference no: EM13767045

1.(20pts) Following is the C/C++ code for comparing two integers:

if (x > y) result = 0;

else result = 1;

Convert the code above to its assembler equivalent, preserving the same functionality of the code.

2. Given the BYTE array "source", write an ASM procedure which reverses the string source and places the result into BYTE "destination". Pay attention to the difference in string sizes vs. individual character locations.

.DATA

source BYTE "Here I am looking for a letter A",0

destination BYTE SIZEOF source DUP (0)

.CODE

3. Consider the following variables in the .DATA section, then follow the code execution to populate the stack allocation.

.DATA

Var1 WORD 1234h, 5678h

Var2 BYTE 0D4h, 0B3h

.CODE

MOV AX, Var1

PUSH AX

MOV EBX, Var3 + 4

PUSH EBX

MOV CX, WORD PTR [Var3+2]

PUSH CX

PUSH Var3

ADDR

VALUE

0E

 

0D

 

0C

 

0B

 

0A

 

09

 

08

 

07

 

06

 

05

 

04

 

03

 

02

 

01

 

00

 

 

 

Var3 DWORD 0DEADBEEFh, 0F00FDEEDh

4. Assuming that data allocations for this program begin at 0x00401000h what will be the values of AX, ECX and EDI registers at the indicated locations?

.data

intarray WORD 100h,200h,300h,400h

.code

mov edi,OFFSET intarray                                    EDI:_________________________

mov ecx,LENGTHOF intarray                               ECX:_________________________

mov ax,0     

L1:

add ax,[edi]

 add edi,TYPE intarray    

loop L1         

                                                                         EDI:_________________________

                                                                         ECX:_________________________

                                                                         AX:__________________________

5. Convert the following compound expressions to assembly code:

a) if (al >= bl) AND (bl < cl)

     X = 1;

b) if (al >= bl) OR (al > cl)

     X = 1;

6. a) Write code that jumps to label L1 if either bit 1, 5, or 7 is set in the BL register.

Write code that jumps to label L1 if bits 2, 3, and 4 are all set in the BL register.

Write code that jumps to label L3 if EAX is negative.

Write code that jumps to label L4 if the expression (EBX - ECX) is greater than zero.

Reference no: EM13767045

Questions Cloud

Describe how the fibonacci numbers are related to the golden : Describe how the Fibonacci Numbers are related to the Golden Ratio. Also define the rigid motion "glide reflection."
Global economy-between free trade and protectionism : Globalization was welcomed around the world at the beginning of the 1990s. Different trade theories were used to explain benefits of free trade and market liberalization. However, by the end of the twentieth century, voices of discontent were begi..
What view of life does the story present : What view of life does the story present? Which character best articulates this viewpoint? According to this work's view of life, what is mankind's relationship to God? To the universe?
Which hamper effective prosecutions : How can the US Legislators or Supreme Court help resolve constitutional concerns, which hamper effective prosecutions
Write an asm procedure which reverses the string source : Given the BYTE array "source", write an ASM procedure which reverses the string source and places the result into BYTE "destination". Pay attention to the difference in string sizes vs. individual character locations.
Overview of business entities video lecture : See the IRS website for the SS-4 and Subchapter-S Election Form. See my Overview of Business Entities video lecture (near the end) for instructions on preparing the Bylaws and Meeting Minutes
Aggression and the media issues : Write a paper on aggression and the media,Choose a TV show (popular one) to illustrate the issue and use scientific articles (Pros/Cons) to support your argument.
Data integrity for input strings and security issue : What are some problems with not adding data integrity for your input strings? Example: If you are asking for an amount and when you can put in a letter. What is one security issue that can take place with an interface? Explain why.
Ethics awareness inventory and ethical choices : Use the Ethics Awareness Inventory and Ethical Choices in the Workplace assessments to revisit your values. Write a paper of no more than 700 words in which you do the following:

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Multimedia application between two multimedia applications

If your running memory intensive multimedia application on the computer which has 128 MB RAM installed and computer is momentarily stopping when you switch between two multimedia applications.

  The acquisition of software is complex for various reasons

The acquisition of software is complex for various reasons: an organization may have any number of software applications, which keep changing over time

  Write an anonymous block that places a substitution variable

Write an anonymous block that places a substitution variable (&) into a local variable of type character. You should check the value entered in the local variable and output different messages depending on the value provided.

  A cyber-attack or information security breach

Find a recent article on a cyber-attack or information security breach. Submit a 1-2 page long summary of the article.

  Database developer for a local college

Suppose that you are the database developer for a local college. The Chief Information Officer (CIO) has asked you to provide a summary of normalizing database tables that the IT staff will use in the upcoming training session.

  Find the gradient magnitude and gradient direction

Consider the sub-image shown above. Find the gradient magnitude and gradient direction at the center entry using the following operators.

  Write a program that prompts the user to input a string

Write a program that prompts the user to input a string and then outputs the string in the pig Latin form. The rules for converting a string into pig latin form are described in Programming example : Your program must store the characters of a str..

  Consider a memory system with a level

Consider a memory system with a level 1 cache of 32 KB and DRAM of 512 MB with the processor operating at 1 GHz. The latency to L1 cache is one cycle and the latency to DRAM is 100 cycles.

  A work- sheet to store lookup tables

You work for a travel company that specializes in arranging travel accommodations for student tours and vacations in exciting destinations such as Canada, Rome, and the Czech Republic.

  Create a hierarchy chart depicting the chosen situation

Create a hierarchy chart depicting the chosen situation, develop a flowchart and provide a brief explanation for it and develop an algorithm and provide a brief explanation for it.

  Cmpute cpi and mips rating for processor

Determine the average CPI? On 500MHz Pentium III program takes 1 second. Compute MIPS rating for this processor? What is CPI?

  Explain make-buy decision for management prerogative

Make-buy decision is the significant management prerogative. You are manager of software organization which has average software development cost of $20.00/LOC.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd