Write an asm procedure which reverses the string source

Assignment Help Basic Computer Science
Reference no: EM13767045

1.(20pts) Following is the C/C++ code for comparing two integers:

if (x > y) result = 0;

else result = 1;

Convert the code above to its assembler equivalent, preserving the same functionality of the code.

2. Given the BYTE array "source", write an ASM procedure which reverses the string source and places the result into BYTE "destination". Pay attention to the difference in string sizes vs. individual character locations.

.DATA

source BYTE "Here I am looking for a letter A",0

destination BYTE SIZEOF source DUP (0)

.CODE

3. Consider the following variables in the .DATA section, then follow the code execution to populate the stack allocation.

.DATA

Var1 WORD 1234h, 5678h

Var2 BYTE 0D4h, 0B3h

.CODE

MOV AX, Var1

PUSH AX

MOV EBX, Var3 + 4

PUSH EBX

MOV CX, WORD PTR [Var3+2]

PUSH CX

PUSH Var3

ADDR

VALUE

0E

 

0D

 

0C

 

0B

 

0A

 

09

 

08

 

07

 

06

 

05

 

04

 

03

 

02

 

01

 

00

 

 

 

Var3 DWORD 0DEADBEEFh, 0F00FDEEDh

4. Assuming that data allocations for this program begin at 0x00401000h what will be the values of AX, ECX and EDI registers at the indicated locations?

.data

intarray WORD 100h,200h,300h,400h

.code

mov edi,OFFSET intarray                                    EDI:_________________________

mov ecx,LENGTHOF intarray                               ECX:_________________________

mov ax,0     

L1:

add ax,[edi]

 add edi,TYPE intarray    

loop L1         

                                                                         EDI:_________________________

                                                                         ECX:_________________________

                                                                         AX:__________________________

5. Convert the following compound expressions to assembly code:

a) if (al >= bl) AND (bl < cl)

     X = 1;

b) if (al >= bl) OR (al > cl)

     X = 1;

6. a) Write code that jumps to label L1 if either bit 1, 5, or 7 is set in the BL register.

Write code that jumps to label L1 if bits 2, 3, and 4 are all set in the BL register.

Write code that jumps to label L3 if EAX is negative.

Write code that jumps to label L4 if the expression (EBX - ECX) is greater than zero.

Reference no: EM13767045

Questions Cloud

Describe how the fibonacci numbers are related to the golden : Describe how the Fibonacci Numbers are related to the Golden Ratio. Also define the rigid motion "glide reflection."
Global economy-between free trade and protectionism : Globalization was welcomed around the world at the beginning of the 1990s. Different trade theories were used to explain benefits of free trade and market liberalization. However, by the end of the twentieth century, voices of discontent were begi..
What view of life does the story present : What view of life does the story present? Which character best articulates this viewpoint? According to this work's view of life, what is mankind's relationship to God? To the universe?
Which hamper effective prosecutions : How can the US Legislators or Supreme Court help resolve constitutional concerns, which hamper effective prosecutions
Write an asm procedure which reverses the string source : Given the BYTE array "source", write an ASM procedure which reverses the string source and places the result into BYTE "destination". Pay attention to the difference in string sizes vs. individual character locations.
Overview of business entities video lecture : See the IRS website for the SS-4 and Subchapter-S Election Form. See my Overview of Business Entities video lecture (near the end) for instructions on preparing the Bylaws and Meeting Minutes
Aggression and the media issues : Write a paper on aggression and the media,Choose a TV show (popular one) to illustrate the issue and use scientific articles (Pros/Cons) to support your argument.
Data integrity for input strings and security issue : What are some problems with not adding data integrity for your input strings? Example: If you are asking for an amount and when you can put in a letter. What is one security issue that can take place with an interface? Explain why.
Ethics awareness inventory and ethical choices : Use the Ethics Awareness Inventory and Ethical Choices in the Workplace assessments to revisit your values. Write a paper of no more than 700 words in which you do the following:

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd