Write down an assembly language program

Assignment Help Computer Engineering
Reference no: EM132397

Question

Write down an assembly language program that solves following problem. The Albatross Company has four salespeople who sell five diverse products (1 to 5). Once a day, each salesperson reports their sales of each creation. These reports are consolidated over time into a file. Each record in the file enclose three values-

The salesperson number from one to four (3 characters wide, right justified)

The product number from one to five (3 characters wide, right justified)

The dollar value of that product sold that day by that salesperson (9 characters wide, right justified)

Your program have got to prompt the user for a file name, process file, and report the totals for each salesperson and for each product. A sample facts file called "Albatross.dat" is provided to allow you to test your program.

Your program has to be able to handle a data file that contains any number of sales records. This means that it is probable for the input data file to hold multiple records for each salesperson and product combination. Do not write your program so that it always (and only) expects the number of records that ensue to be in the sample data file. Your program will be tested and graded by executing it with a data file that contains fewer records than sample data file, the sample data file, and finally with a data file that contains more records than sample data file.

Reference no: EM132397

Questions Cloud

How to produce a wired and wireless network plan : How to produce a wired and wireless network plan
Examine the importance and purpose of of n-tier systems : Examine the importance and purpose of of n-tier systems
How can sophie use applocker : How can Sophie use AppLocker.
Explore paper on vmware security : Explore paper on VMware Security
Write down an assembly language program : Write down an assembly language program The product number from one to five (3 characters wide, right justified)
Produce two random integer numbers between 1 and 200 : Produce two random integer numbers between 1 and 200.
Write down a program that has a function named presentvalue : Write down a program that has a function named presentValue
Describe mutual strategy to maintain enterprise-level system : Describe mutual strategy to maintain enterprise-level system
Create a white paper based on knowledge : Create a white paper based on knowledge

Reviews

Write a Review

Computer Engineering Questions & Answers

  Software engineering and microprocessor systems

Software is required for a simple house burglar alarm system.

  A non-linear circuit problem

Computer program which will calculate the voltage across a resistor in the circuit

  Classify the use and location of firewalls

Classify the use and location of Firewalls Categorize the use and location of IPS or IDS where necessary.

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Risk assessment of ict system

Risk Assessment of ICT System and Developing Computer Incident Response System on WAMP platform

  Explain the method to find cost of sorting the relation

Explain the method to find cost of sorting the relation In each case, how many combine passes are required?

  Type of data standard

What type of data standard are we dealing with in each scenario (metadata, spatial or attribute)? You work for Town of Ancaster prior to an amalgamation of New City of Hamilton. Your main responsibility was to retain Town's single line road network f..

  Intermediate programming

Design a program that reads in a text file with drawing commands and then outputs a bitmap with all the items drawn correctly

  Can you suggest process for choosing appropriate data-mining

Consider on how you would know if a computer were thinking like a human.

  Security policy document project

Analyze security requirements and develop a security policy

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Security vulnerability

What is the security vulnerability of this solution

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd