What is the mips assembly code, Computer Engineering

Assignment Help:

Question:

(a) Using an appropriate diagram, illustrate the structure of an instruction used for branching purposes and state the purpose of each part.

(b) Given the number 104345 needs to be loaded in the memory address pointed by the Base Address of $s2 by an offset of 8 bytes. Provide the instructions to perform this operation.

(c) Translate the following Assembly instructions in machine language instructions. Describe every step involved in the conversion process.

i. sw $t5, 32($s1)
ii. bne $t3,$s3,L4 (given that L4 is at line 253)

Consult appendix at the end of this question paper for R, I, J types (formats) and table of registers.

(d) The following machine language instructions have been inspected by a hacker during its transmission on an insecure network. Given that it may involve sensible data, you have been assigned the task to write its equivalent Assembly instruction.

00100010111010110000000010011110

(e) Consider the following C segment:

loop: g = 12 + B[8] - A[i];
i = i +j;
if (i!=h) goto loop;

A is an array of 80 elements. Variables g, h, i and j are associated with registers $S1, $S2, $S3 and $S4 respectively. Base of array A is $S5 and that of B is $S6. What is the MIPS assembly code for this C loop?


Related Discussions:- What is the mips assembly code

Legacy systems and current infrastructure, Legacy systems and current infra...

Legacy systems and current infrastructure - Information System This problem is most easily understood using the everyday example of the rail ways where the rail network infras

What are the principles of transport layer, Q. What are the principles of t...

Q. What are the principles of transport layer? Transport layer: This layer is the first end-to-end layer. Header of transport layer includes information which helps send the

Interpolation search, Interpolation Search The next task is to implemen...

Interpolation Search The next task is to implement a variable size decrease-and-conquer solution to search. See Levitin [2007] pp 190 for a detailed description of the interpol

Risc approach - computer architecture, RISC Approach - computer architectur...

RISC Approach - computer architecture: The RISC processors only use easy instructions that can be executed within one clock cycle. therefore, the "MULT" command discussed abov

Convert the decimal number to excess-3 code, Convert the decimal number 430...

Convert the decimal number 430 to Excess-3 code ? Ans. Excess  3  is  a  digital  code  acquired  from  adding  3  to  every  decimal  digit  and  after that converting the res

The extra key inserted at the end of the array, The extra key inserted at t...

The extra key inserted at the end of the array is called a Sentinel is the extra key inserted at the end of the array

DBMS, DEFINE FILE ORGANISATION

DEFINE FILE ORGANISATION

Explain microcode and VLSI technology, Q. Explain Microcode and VLSI Techno...

Q. Explain Microcode and VLSI Technology? It is considered that CU of a computer be assembled using two ways; create micro-program which execute micro-instructions or construct

Padovan string , A Padovan string P(n) for a natural number n is defined as...

A Padovan string P(n) for a natural number n is defined as: P(0) = ‘X’ P(1) = ‘Y’ P(2) = ‘Z’ P(n) = P(n-2) + P(n-3), n>2 where + denotes string concatenation. For a string of t

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd