Draw the stack frame as seen by the subroutine

Assignment Help Computer Engineering
Reference no: EM132143350

Question :

Suppose you have two arrays of 8-bit signed integers P[i] and Q[i] for 0 = i < N. Write a subroutine mdiff that will find the maximum of (Q[i]-P[i]) for 0 = i < N.

A pointer to the array P is passed in register X and a pointer to the array Q is passed in register Y. The number of elements in each array N is passed in accumulator A.

The result should be returned in accumulator A, overwriting the value N. (You can assume that the values of P(i) and Q(i) lie between -63 and +63 so that their difference is always representable as an 8-bit signed quantity)

(i) You are required to save and restore any accumulators and/or registers used by the subroutine (other than A). The pointers in X and Y should be returned unchanged to the calling program.

(ii) The contents of the arrays P and Q should not be changed. (HSC12 Assembly language)

(a) Draw the stack frame as seen by the subroutine

(b) Write the code for the subroutine

Reference no: EM132143350

Questions Cloud

Is it possible to forward the two packets through the switch : Is it possible to forward the two packets through the switch fabric at the same time when the fabric uses a shared bus?
Find the probability that at any given time : Suppose users share a 3 Mbps link. Also suppose each user requires 150 kbps when transmitting, but each user transmits only 10 percent of the time.
Use stack and recursion and solve the given problem : Suppose there are three decks of cards on the table, a number is written on each card. And each deck is sorted in decreasing order .
Develop your appreciation of research in brand building : This assignment will get you thinking about and develop your appreciation of the application of research in brand building
Draw the stack frame as seen by the subroutine : You are required to save and restore any accumulators and/or registers used by the subroutine (other than A).
How would you respond to that statement : Suppose that someone tells you that an attribute that is part of a composite primary key is also a candidate key.
What is the time complexity of the algorithm : Suppose instead that wibble always returns False. What is the time complexity of the algorithm?
Calculate the interval for the expected error : Suppose that you have used some concept learning algorithm to learn a hypothesis h1 from some training data.
Construct a fragment of matlab code that will prompt : Construct a fragment of MATLAB code that will prompt the student for his or her choice, read in the choice, and use the answer.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd