Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

What is a collection of low-level subroutines that communicate directly with hardware devices? CPU BIOS DRAM CACHE What is the decimal representation of each of

  1. What is a collection of low-level subroutines that communicate directly with hardware devices?
    1. CPU
    2. BIOS
    3. DRAM
    4. CACHE

  1. What is the decimal representation of each of the following unsigned binary integers?
    1. 00110101 _______________________________
    2. 10010110 _______________________________
    3. 11001100 _______________________________

  1. If you XOR the following two binary numbers, what is the result?
    1. 11110101
    2. 00101001
    3. ____________

  1. Little endian order is when the least significant byte is stored
    1. At the first memory address allocated for data
    2. At the last memory address allocated for data

  1. A variable containing the address of another variable is called a ____________.

  1. Explain how a RET from subroutines is done in nested subroutines.

  1. In the code snippet below, first fill in the values of ax, and then explain why you cant use INC to get esi to point to the next value in the array.

.data

ArrayW WORD 1000h,2000Hh,3000h

.code

MOV esi,OFFSET ArrayW

MOV ax,[esi] ; ax =

ADD esi,2

MOV ax,[esi] ; ax =

ADD esi,2

MOV ax,[esi] ; ax =

Explain about INC question here:

  1. What would happen if the RET instruction was omitted in a subroutine?

True or False

  1. _____ EPROM can be erased slowly with ultra-violet light and then reprogrammed.

  1. _____ CMOS RAM on the system motherboard stores system setup information. It is refreshed by a battery, so its contents are retained when the computers power is off.

  1. _____ The principle of least astonishment (POLA), sometimes also referred to as Principle of Least Surprise, applies to user interface and software design, from the ergonomics standpoint.

  1. _____ If you allow critical and non-critical modules to use the same programming resources, there is a very real possibility of some error in the non-critical code which will adversely affect the critical code.

  1. _____ The LENGTHOF operator counts the number of elements in an array.
  2. _____ The SIZEOF operator multiplies the number of elements by the size of the elements.
  3. _____ JMP is a conditional transfer operation.
  4. _____ Before you use the LOOP instruction, you must be aware of how it uses the counter.
  5. _____ The LOOP instruction first checks to see whether ECX is not equal to zero; then LOOP decrements ECX and jumps to the destination label.

  1. _____ The run-time stack is handled by the BIOS.
  2. _____ The program counter is a pointer to the instruction.
  3. _____ Program labels arent necessary to assembled code because the offsets are part of the instruction,

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Data Access Patterns Database Interactions In Object Oriented Applications

Authors: Clifton Nock

1st Edition

0321555627, 978-0321555625

More Books

Students also viewed these Databases questions

Question

.... NH + NS .... NH + NS

Answered: 1 week ago

Question

What is Accounting?

Answered: 1 week ago

Question

Define organisation chart

Answered: 1 week ago

Question

What are the advantages of planning ?

Answered: 1 week ago

Question

Explain the factors that determine the degree of decentralisation

Answered: 1 week ago