Writes a MIPS assembly language program that reads an input string, reverses the order of its characters in memory, and displays the reversed string on the screen. Allocate space for 20 bytes in the data segment (18 characters + newline char + null char). Traverse the string character-by-character until your reach the newline or null character, whichever comes first. Here is a sample run: Enter a string (at most 18 characters): Hello The reversed string is: olleH
Q: What is open source in computer science?
A: This question comes from Internet Technologies which is a paper of computer science. Let's discuss i...
Q: Given the graph below. Break any ties alphabetically, If we use Breadth First search graph search th...
A: Breadth first search, BFS, is used to traverse graph. This algorithm can start from any node. It sta...
Q: Name three areas in a web site that style information can be placed.
A: The <style> element is included inside the <head>. It will be great to include the style...
Q: main Duties (testing, documentation and communication) Skills and toolbox Mobile devices Virtual mac...
A: NOTE :- As per our guidelines we are supposed to answer only one question. Kindly repost other quest...
Q: What are the benefits of running both subsystems and logical partitions on the same machine?
A: Intro the above question is about benefits of running both subsystems and logical partitions on the ...
Q: dentify and briefly describe five worldwide information-systems challenges.
A: Introduction: Global information systems are the systems that are used by many countries throughout ...
Q: Let 2 = {0,1,#}. Is the following language regular; context-free but not regular; or not context-fre...
A: Here, I have to provide a solution to the above question.
Q: What exactly is face validity?
A: Introduction: Validity signifies and states whether the test is actually and accurately measuring wh...
Q: Assume we have a computer with the following specifications: a magnetic disc with a delay of 15 mill...
A: Intro In this problem the computer has a following characteristic: The access latency of magnetic ...
Q: loop: and $t0, $s3, $s2 ori $t0, $t0, Ox1234 Iw $t1, 24($s0) sub $t3, $t1, $s1 slti $t9, $t3, 234 bn...
A: 2. loop: and $t0,$s3,$s2 $t0 = $s3 & $s2 R type InstructionInstruction format of R-type instruct...
Q: hat are the dangers of building a security infrastructure that is available to everyone?
A: Answer: With all of the buzz about cloud adoption, it's tempting to believe that on-premises IT infr...
Q: What are the many configurations or sizes available for an operating system?
A: An operating system is a software programme required to manage and operate a computing device like s...
Q: need to create a function called BridgeAnalysis. This function should take in the bridge deflection,...
A: Lets see the solution.
Q: What exactly is database security? What are two methods for keeping a database safe?
A: Introduction: What exactly is database security? What are two methods for keeping a database safe?
Q: Explain the operation of virtual memory in operating systems.
A: Introduction: The operating system moves data from inactive programmes out of RAM and stores it in v...
Q: Rewrite the following expression in post-fix notation. b. Then, write the assembly code for the e...
A: x=(f-e)/(b*a) postfix notation of the given expression is: fe-ba*/
Q: Write an explanation of polymorphism and its applications in software in no more than 250 words.
A: Intro Polymorphism: Definition The meaning of polymorphism is having many forms. Polymorphism is the...
Q: Binary search necessitates the sorting of data before it can be used. If we start with unsorted data...
A: Introduction: Binary search requires the array to be sorted before searching an element in the array...
Q: Use c++ Write a program that uses the STL list container to create a linked list of integers. The p...
A: code in c++ stl; #include <bits/stdc++.h> using namespace std; int main() { string fname, l...
Q: clared a dynamic array after the number of records is known. After data is read, perform the analysi...
A: In the below code the input data is stored in a Data.csv file as per the below example. ID,Income,Ho...
Q: DESCRIBE IMPLEMENTING SUBPROGRAMS IN PROGRAMMING PRINCIPLES? EXPLAIN IN BRIEF THE ABSTRACT DATA T...
A: Intro Implementing subprograms in principles of programming language: A section of a code with a n...
Q: Packets transmitted to a mobile host's home LAN are intercepted by its home agent on that LAN when i...
A: Intro Care-of address. when the Mobile host is not at home, it gets a temporary IP address. This IP ...
Q: Following the execution of the command umask 731, the permissions of all newly created files and fol...
A: Introduction; Permissions: In Linux operating system, the permissions are written in the format...
Q: SOLVE THE PROBLEM IN PHP Create a function that expands a decimal number into a unit of characters a...
A: Code: <?phpfunction ExtendedForm($n) { $string = sprintf("%f", $n); $arr =explode('.', $strin...
Q: In C programming In a main function declare an array of 1000 ints. Fill up the array with random ...
A: Step 1 : Start Step 2 : In the main function, Declare an array of 1000 integers. Step 3 : Declaring ...
Q: Use the pumping lemma to show that the following languages are not context-free. (a) {0 | n is a non...
A: Pumping lemma: If L is a context-free language, there is a pumping length p such that any string w ∈...
Q: What is a T1 line's maximum capacity?
A: A T1 line was developed by the AT&T Bell Laboratories in the late 1960s. It is a communications ...
Q: are these true or false (T/F) Parameters are declared in functions header (T/F) A function’s header...
A:
Q: Explore the following morphological techniques by explaining th approach and simulate it in Matlab: ...
A: Solution: • Region Filling• Connected Components• Convex Hull• Thinning ...
Q: How does CNT storage function?
A: Introduction: CNT and its working: The full form of CNT is Carbon Nanotubes with a cylindrical str...
Q: Define and describe two (2) upcoming computer technology devices and systems that can provide extra ...
A: Actually, there are two emerging computer technologies.
Q: PHP exercise 1 For your first PHP exercise, echo the following statement to the browser: “Twinkl...
A: <?php echo "Twinkle Twinkle little star\n"; $txt1 = "Twinkle";$txt2 = "star"; echo $txt1 ." ". $t...
Q: Describe the distinctions between replication and duplication.
A: Introduction: the distinction between DNA replication and duplication is that replication primarily ...
Q: Individuals like using digital social networks (such as Facebook and Twitter). Determine why people ...
A: Explanation : Social networking websites and apps allow users to create and exchange user-generated ...
Q: Give a transducer TM that takes #bi as input and computes #bi+1, where i is an integer and i>0, and ...
A: Here we draw simple turing machine, to accept the given string .take b and get back b+1. ===========...
Q: Computer science It's possible to sum up how device requests are handled in a few words.
A: Introduction: A computer system can be connected to several I/O devices. However, only a few I/O dev...
Q: What is wrong with these designs in terms of cohesion, and how might they be improved?
A: Introduction: In terms of cohesiveness, their designs are flawed.
Q: A Triangle will have 3 sides. The class will be able to keep track of the number of Triangle object...
A: the code is an given below ;
Q: Talk about solid-state storage, which includes solid-state drives, flash memory, and USB drives.
A: Introduction: Solid-state storage, which includes solid-state drives, flash memory, and USB drives, ...
Q: What are the different types of security control families?
A: Security controls are safeguards or countermeasures to avoid, detect, counteract, or minimize securi...
Q: What tools are available for configuring and managing both physical and virtual networking devices?
A: Let's see the solution in the next steps
Q: Write a program in C++ to define a class distance with necessary data members and member function.th...
A: #include <iostream>using namespace std; class Distance { private: int feet; ...
Q: Write a method using the following header that determines whether the day of the month is a working ...
A: Your Java program is given below as you required with an output .
Q: Write a Java program to take a string, print true if the string starts with "hi" and print false oth...
A: Required:- Write a Java program to take a string, print true if the string starts with "hi" and pri...
Q: i. {w| every odd position of w is a 1}
A: Task : Create the DFA for the language : {w | every odd position of w is a 1}
Q: 11. Write a C++ program to input the first names and scores of 5 players of a team in a coding conte...
A: #include <iostream> using namespace std; int main(){ string names[5]; int scores[5]; ...
Q: Write a program in C++ that lets the user enter a product code. The program should determine if the...
A: I have provided C++ CODE along with CODE SCREENSHOT and TWO OUTPUT SCREENSHOTS---------...
Q: open source in computer science?
A: What is open source? It can be a software or a platform that is accessible to anyone and it also all...
Q: What are the two benefits of DDR3 memory over DDR2 memory?
A: Introduction: DDR3 and DDR2 are two different kinds of Random Access Memories. DDR3 refers to the th...
Q: 12. Perform the given calculations in base-five notation. Assume that the numerals are already writt...
A: Base 5 notation numbers contains number from 0 to 4.
please make it simple with comments
Trending now
This is a popular solution!
Step by step
Solved in 2 steps
- visual studio using assembly language ctt Write the program for the 7th exercise ( copy string backwards) on page 138 of your book. You must display the reversed string . To display a string and you can use the The Irvine library functions as explained in the chapter 5 section 4. Here is the problem description: Copy a String in Reverse Order Write a program with a loop and indirect addressing that copies a string from source to target, reversing the character order in the process. Use the following variables: source BYTE "This is the source string",0 target BYTE SIZEOF source DUP('#')Using C++ Language Write a program to implement the following: • Declare two C-strings str1 and str2 of appropriate sizes. • Use strcpy() to copy the string “Hello World.” into str1 • Using a suitable message, read the user input into str2. The user may enter more than one word. • Determine and store the length of both char arrays using strlen() • Check if both char arrays are the same length using the stored lengths o If they are the same length, tell the user they are the same length o If they are not the same length, tell the user the strings are different and end the program using a return statement. • Compare both strings using strcmp to check if they are the same string. o If they are the same string, inform the user of this o If they are not the same string, inform the user of this o Note that you compare only if they are of the same length, hence the return statement in the earlier step.Step 1. The following code copies a string from source to target: .data source BYTE "This is the source string",0 target BYTE SIZEOF source DUP (0) . code L1: mov esi, 0 mov ecx SIZEOF source mov al source[esi] mov target[esi), al target inc eşi loop L1 mov edx, OFFSET source call WriteString mov edx, OFFSET target call WriteString ; index register ; loop counter ; get char from source ; store it in the ; move to next character ; repeat for entire string Rewrite the program using indirect addressing rather than indexed addressing.
- python: def shakespeare_position(role, section): """ Question 2 - Regex You are reading a Shakespeare play with your friends (as one frequently does) and are given a role. You want to know what line immediately precedes YOUR first line in a given section so that you are ready to go when it is your turn. Return this line as a string, excluding the character's name. Lines will always begin with the character's name followed by a ':' and end in a "." or a "?" Each line is separated by a single space. THIS MUST BE DONE IN ONE LINE. "" Args: role (str) section (str) Returns: str section_1 = 'Benvolio: By my head, here come the Capulets. Mercutio: By my heel, I care not. ' + 'Tybalt: Gentlemen, good den - a word with one of you. Mercutio: And but one word with one of us?' >>> shakespeare_position('Tybalt', section_1) 'By my heel, I care not.' >>> shakespeare_position('Mercutio', section_1) 'By my head, here…Create a program in MIPS assembly language that takes a string input and tells the user if the string is a palindrome or not. Create your program in the palindrome.asm file. Prompt the user to enter a word Store the word in memory Determine if the word is a palindrome or not Display the word back to the user stating if it is or is not a palindrome. Example of the program running: Please enter a word: **** user input : racecar That is a palindrome -- program is finished running -- Reset: reset completed. Please enter a word: **** user input : noon That is a palindrome -- program is finished running -- Reset: reset completed. Please enter a word: **** user input : trashcan That is not a palindromeA substring in programming represents all characters from a string, between two specified indices. Given a variable string called seq, a student writes the following program that will generate all nonempty substrings of seq: for i in range(len(seq)) : # line 1 for j in range(i) : # line 2 print(seq[j:i]) # line 3 Which of the following changes make the above program correct? A. Program is correct as it is. B. Change line 1 to: for i in range(len(seq)+1) : C. Change line 3 to: print(seq[j:i+1]) D. Change line 2 to: for j in range(i+1) :
- Write a program that reads in a 16 digit credit card number NNNN NNNN NNNN NNNN, where N is a digit between 0 and 9, into four int type numerical variables and prints it to the screen as a string after storing it in a single c-string variable (that is character array) in the form NNNN-NNNN-NNNN-NNNN. For example, Input: 1234 5678 9123 4567 Output: 1234-5678-9123-4567 Note: use c-string (that is character arrays). Do not use the string class type. Utilize the _itoa_s function from cstdlib library, in addition to strncpy_s and strncat_s from cstring library. In C++IN JAVA SCRIPT Programming Create a function that takes a string as an argument and returns true if each letter in the string is surrounded by a plus sign. Return false otherwise. Examples plusSign("+f+d+c+#+f+") → true plusSign("+d+=3=+s+") → true plusSign("f++d+g+8+") false plusSign("+s+7+fg+r+8+") → falseDNA sequences are strings made of combinations of four letters: A, C, G, and T. A substring refers to a string that is a continuous segment of a larger string; in the context of DNA, this would be a fragment of our DNA sequence. Write a program that asks the user for two input strings: a complete DNA sequence a DNA fragment whose occurrence is to be found in our complete DNA sequence. The program must display the number of matches as the output. Make sure to validate that your sequence is a DNA sequence -- i.e., that it contains no letters aside from A, C, G, and T.
- Python Pgogram Write a program that incorporates an algorithm with a function that will check whether or not a string is in a valid password format with the following rules: A password must have at least ten characters.A password consists of only letters, digits and symbol(s).A password must contain at least two digits. A password must contain at least one uppercase letter A password must contain at least one special symbol Your program should continue to prompt until the user enters a valid password. Regular expressions (regex) are not allowed!///-In python-/// def get_words_last_1():"""The function should take a list of wordsas an input parameter and return a new list of stringswith the last character removed. (Use string slicing)If the word is empty or has only 1 character, then skip it.""" pass The code should aslo have if __name__ == "__main__" section.In C language Prompt the user to enter a string of characters and hit enter. Your would be writing a program to parse each character. If there are duplicates , you program will stop and print duplicate charcter entered. You would not be using any arrays. A skeleton program is given to you here. unsigned int temp = 0; char ch; printf ( "enter a string \n"); while ( ( ch = getchar ( ) ) != '\n' ) { } When you find a duplicate char, print duplicate found and exit the program or print all characters are unique