answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vinvika [58]
2 years ago
13

Create a procedure named FindLargest that receives two parameters: a pointer to a signed doubleword array, and a count of the ar

ray's length. The procedure must return the value of the largest array member in EAX. Use the PROC directive with a parameter list when declaring the procedure. Preserve all registers (except EAX) that are modified by the procedure. Write a test program that calls FindLargest and passes three different arrays of different lengths. Be sure to include negative values in your arrays. Create a PROTO declaration for FindLargest.
Computers and Technology
1 answer:
Kay [80]2 years ago
6 0

Answer:

See explaination

Explanation:

FindLargest PROC,

array_num: PTR DWORD,

arraySize: DWORD

mov esi, array_num

mov ecx, arraySize

mov eax, [esi]

dec ecx

scan_array:

add esi, 4

mov ebx, [esi]

cmp ebx, eax

JLE check_number

mov eax, ebx

check_number:

loop scan_array

ret

FindLargest ENDP

END

You might be interested in
Suppose that you need to maintain a collection of data whose contents are fixed- i.e., you need to search for and retrieve exist
Keith_Richards [23]

Answer:

Option a: a sorted array

Explanation:

Since the expectation on the data structure never need to add or delete items, a sorted array is the most desirable option. An array is known for its difficulty to modify the size (either by adding item or removing item). However, this disadvantage would no longer be a concern for this task. This is also the reason, linked list, binary search tree and queue is not a better option here although they offer much greater efficiency to add and remove item from collection.

On another hand,  any existing items from the sorted array can be easily retrieved using address indexing and therefore the data query process can be very fast and efficient.

4 0
2 years ago
A large gambling company needs to be able to accept high volumes of customer wagers within short timeframes for high-profile spo
ElenaW [278]

Answer:

a mobile app that only accepts wagers based on the user's location.

Explanation:

One effective Cloud Solution would be a mobile app that only accepts wagers based on the user's location. This app would allow the clients to safely and effectively place any wagers which are sent to the gambling company's cloud servers which would be third-party Cloud services. These services will make sure that the gambling company can handle any number of wages at any given time. The mobile app would also only accept wagers from individuals in specific locations in which the law does not prohibit gambling. Therefore, preventing the gambling company from being liable for any losses.

5 0
2 years ago
Access to sensitive or restricted information is controlled describes which of the key communications and information systems pr
Viktor [21]

Answer:

C: Security

Explanation:

Communications and information systems principles need to be, among other things, secure. They need to be able to protect sensitive information from those who intentionally not need to know. Some incident information like voice, networks, and data, are very sensitive and thus, should be secure to the right levels and should comply with privacy laws and data protection.

4 0
2 years ago
In a survey of 7200 T.V. viewers, 40% said they watch network news programs. Find the margin of error for this survey if we want
olga_2 [115]

Answer:

Margin of Error=M.E= ± 0.0113

Explanation:

Margin of Error= M.E= ?

Probability that watched network news programs = p = 0.4

α= 95%

Margin of Error =M.E= zₐ/₂√p(1-p)/n

Margin of Error=M.E= ±1.96 √0.4(1-0.4)/7200

Margin of Error=M. E = ±1.96√0.24/7200

Margin of Error=M. E- ±1.96* 0.005773

Margin of Error=M.E= ±0.0113

The Margin of Error is the estimate of how much error is possible as a result of random sampling.

6 0
2 years ago
Recall that TCP can be enhanced with SSL to provide process-to-process security services, including encryption. Does SSL operate
Irina-Kira [14]

Answer:

SSL has operate in Application Layer to encrypt the information from user and  pass it to the TCP. To enhance TCP security developer can integrate the code of SSL with application layer.

Explanation:

SSL certificate is used to enhance the security of user data and encrypt the information of passwords, data transfer and other information to make it secure. This certificate is  installed at application layer to make all the information secure and send it to the Transmission Control Protocol (TCP) to send it further. The TCP can be enhanced more by adding SSL code to the application Layer of the Network.

4 0
2 years ago
Other questions:
  • Samantha was calculating a mathematical formula on an electronic spreadsheet. She used multiple values to recalculate the formul
    12·2 answers
  • Which computer applications can Mr. Crowell use to make the classroom learning more stimulating and interesting? Mr. Crowell has
    9·2 answers
  • Because of the density of vehicle in urban areas, you should ____.
    8·2 answers
  • Write a algorithm to attend birthday party​
    8·2 answers
  • Select the examples that best demonstrate likely employers for Journalism and Broadcasting workers. Check all that apply.
    11·2 answers
  • What output is produced by the following program segment? Why? (Recall that name.charAt(i) is the i-th character in the string,
    11·1 answer
  • The attack in which the attacker sends a forged packet with the same source IP address and destination IP address in which the v
    10·1 answer
  • Represent the logic of a program that allows the user to enter a value for one edge of a cube. The program calculates the surfac
    10·1 answer
  • Explain the history of computing of mechanical era
    14·2 answers
  • What is the value of the variable result after these lines of code are executed?
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!