Hack assembly to change and store values

Assignment Help Computer Engineering
Reference no: EM133141138

Multiplication Program in Hack Assembly

Overview

Hack assembly programs (*.asm code) can manipulate registers, RAM, and I/O devices in the Hack Computer. In this task, you will be using Hack assembly to change and store values in registers and RAM, and carry out some arithmetic operations.
Task requirements

a. Go through week 7 class materials on Cloud Deakin & complete the problems in week 7 active learning sessions, so that you get an understanding of how to complete this task.
b. Read the task instructions
Task Instructions

1. Using your knowledge gained from the learning materials and learning sessions in week 7, write a Hack assembly program Mult.asm to multiply two integer values.

2. The inputs of this program are the current values stored in R0 and R1 (i.e., the two top RAM locations).

3. The program must compute the product R0*R1 and store the result in R2. Assume that R0>=0, R1>=0, and R0*R1<32768. Your program need not test these conditions, but rather assume that they hold.

4. Use the provided Mult.tst and Mult.cmp test scripts in task resources to test your implementation via the CPU Emulator tool, as shown in the lecture videos.

5. In a document, explain how you arrived at the solution (1 page max).

Reference no: EM133141138

Questions Cloud

Parallel to reduce home preparation : Assume that the home you are building will require you to sell your existing apartment, what activities could be done in parallel to reduce the home preparation
Plan schedule management : Define activities. Identify at least 25 activities associated with your homebuilding project. Identify predecessors for each of your activities.
Difference between portfolio risk and stand-alone risk : Explain the difference between portfolio risk and stand-alone risk. Explain the distinction between a stock's price and its intrinsic value.
Relationship between risk and return on investment : What is the relationship between risk and return on investment (ROI)? What level of risk are you currently able to accept?
Hack assembly to change and store values : In this task, you will be using Hack assembly to change and store values in registers and RAM, and carry out some arithmetic operations
How does this relate to what you already know : Why do you think your course team wants you to learn this - Please include evidence that you reached the minimum required score in each self- assessment weekly
Hack assembly programs - manipulate registers : Using your knowledge gained from the learning materials and learning sessions in week 6, load the given Flip.asm into the CPU Emulator.
Advanced technical certifications or specialisations : Review the Stepping Stones model and conclude your task with a brief statement about your next career step including what you might do
Conduct a small research project : Conduct a small research project aiming to answer a question related to a topic in SIT111. Create a plan to outline the question and method for your research

Reviews

Write a Review

Computer Engineering Questions & Answers

  Plot and compare bit error rate vs signal to noise ratio

Plot and Compare Bit Error Rate Vs Signal to Noise Ratio for uncoded QPSK and trellis coded 8PSK with the same total power a reference, comparison on same plot

  Question1amanda white has started a domestic cleaning

question1amanda white has started a domestic cleaning business spotless view cleaning svc.she started the business on

  Write a java program to accept positive integers from user

Write a Java program to accept positive integers from the user at the command line. The user can enter as many integers as they like. Use -1 as a sentinel.

  Pid stands for what and also explain it

What are the digital input and output ranges of the Allen-Bradley PID instruction?

  How business continuity and disaster recovery are connected

Organizations have millions invested in computing resources. In the event of a disaster, an organization must have strong and secure plans in place to minimize.

  What kinds of applications can be supported

What kinds of applications can be supported, what equipment will be necessary, where the equipment will be located, and what services this company offers.

  Discuss and describe the purpose and value of java

Discuss and describe the purpose and value of Java. How and why do we use it? Provide a real-world example in your response.

  Formal risk assessment of the external server

As part of a formal risk assessment of the external server in a small Web design company, you have identified asset "integrity of the organization web server and the threat hacking and defacement of the web server.

  Do you want to start the program over again

Using a do-while loop structure: After the program completes, ask the user "Do you want to start the program over again? (Enter Yes or No)".

  What is the relationship betwee byod and shadow it

Should an employer be able to discipline or terminate an employee for on-line behavior in his/her own time? What is the relationship betwee BYOD.

  Determine how detects network vulnerabilities

Select one network scanning software tool (there is a list in your required reading slides) and explain in detail how it works and how detects network.

  Show the result of the calculation metric using cstr

require to create 2 textboxes with label one with input of value to be converted English using CDbl and another to display the result of the calculation metric using cstr.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd