Computers and Technology

.text main: # Get numbers from user li $v0, 4 # Load 4=print_string into $v0 la $a0, p1 # Load address of first prompt into $a0 syscall # Output the prompt via syscall li $v0, 5 # Load 5=read_int into $v0 syscall # Read an integer via syscall add $s0, $v0, $zero # Copy from $v0 to $s0 li $v0, 4 # Load 4=print_string into $v0 la $a0, p2 # Load address of second prompt into $a0 syscall # Output the prompt via syscall li $v0, 5 # Load 5=read_int into $v022 syscall # Read an integer via syscall add $s1, $v0, $zero # Copy from $v0 to $s1 # Compute minimum add $a0,$s0,$0 # Put argument ($s0) in $a0 add $a1,$s1,$0 # Put argument ($s1) in $a1 jal minimum # Call minimum function, result in $v0 # Output results add $a0, $v0, $zero # Load sum of inupt numbers into $a0 li $v0, 1 # Load 1=print_int into $v0 syscall # Output the prompt via syscall # Exit li $v0, 10 # exit syscall # minimum function to compute min($a0, $a1): || |Put your code here| || return: jr $ra # Return to call

answer
Answers: 3

Other questions on the subject: Computers and Technology

image
Computers and Technology, 22.06.2019 02:30, shubbs1038a
Your boss wants you to configure his laptop so that he can access the company network when he is on the road. you suggest a vpn connection to him. he is very concerned about security and asks you how secure vpn is. what do you tell him?
Answers: 1
image
Computers and Technology, 23.06.2019 22:20, Izzyfizzy
Read “suburban homes construction project” at the end of chapters 8 and 9 (in the textbook) and then develop a wbs (work breakdown structure) in microsoft excel or in microsoft word (using tables)
Answers: 1
image
Computers and Technology, 24.06.2019 17:50, veneciaconton347
You will subnet the network address 172.31.103.0/24. the network has the following requirements: · room-114 lan will require 27 host ip addresses · room-279 lan will require 25 host ip addresses · room-312 lan will require 14 host ip addresses · room-407 lan will require 8 host ip addresses how many subnets are needed in the network topology?
Answers: 2
image
Computers and Technology, 24.06.2019 18:30, trevorhenyan51
Dereck works for long hours on his computer.  he frequently experiences physical strain by the end of the day because he does not follow an important rule of ergonomics with respect to the use of keyboards.  which of the following actions of dereck could lead to physical strain? a.  placing the keyboard exactly in front of him while typingb.  keeping hands and wrists straight while typingc.  using wrist pads throughout the dayd.  pounding at the keys on the keyboard while typinge.  resting his hands on the keyboard when he is not typing
Answers: 1
Do you know the correct answer?
.text main: # Get numbers from user li $v0, 4 # Load 4=print_string into $v0 la $a0, p1 # Load addre...

Questions in other subjects:

Konu
History, 25.01.2021 23:20
Konu
Mathematics, 25.01.2021 23:20
Konu
Mathematics, 25.01.2021 23:20
Konu
Mathematics, 25.01.2021 23:20