The following Mic1 microcode excerpt shows support for a possible 7 bit opcode, 8 bit integer argument machine instruction (organized like the INSP instruction). This part of the microcode will be reached after the instruction opcode has been parsed and identified by earlier parts of the microcode and while the IR contains the complete instruction from memory (as usual for the IR).

100:a := band(smask, ir);
101:a := a + (-1); if n goto 0;
102:ac := lshift(ac); if n goto 104;
103:goto 101;
104:ac := ac + 1; goto 101;
If this possible instruction had a masm assembly pneumonic of XXXX , and was used in an assembly program as shown below:

.
.
LODD abc:
XXXX 7
HALT
.
.
abc: "lost"

What would the 16 bit content of the AC look like when we hit the HALT instruction?

a. 1 0 1 1 0 1 1 0 0 0 1 1 0 1 1 1
b. 0 1 1 0 1 1 1 1 0 1 1 0 1 1 0 0
c. 0 1 1 0 1 1 0 0 0 1 1 0 1 1 1 1
d. 0 0 1 1 0 1 1 1 1 0 1 1 0 1 1 0

Answers

Answer 1

Answer:

The answer is "Option A".

Explanation:

In the first 2 signatures in a string, the "ol" with both the "l" throughout the low byte environment is included, and so the initial bit layout becomes: Number of [tex]0 1 1 0 1 1 1 1 0 1 1 0 1 1 0 0[/tex] Its high 7 bits are moved to the lower 7 having come until the correct circular change of 7 is done:

[tex]0 1 1 0 1 1 1 1 0 1 1 0 1 1 0 0 \ \ \ to \ \ 1 0 1 1 0 1 1 0 0 0 1 1 0 1 1 1[/tex]


Related Questions

unanswered questionl

Answers

¿ ? ¿ ? Whattttt ? ¿ ? ¿

Answer: What

Explanation:

How can the adoption of a data platform simplify data governance for an organization?

Answers

Answer:

by implementing models that predict compliance with data protection and data privacy policies.

Explanation:

A data platform is an IT system that helps an organization to organize, control and coordinate a large volume of data with the aim of making organizational systems faster and optimizing the decision-making process with effective strategic solutions for organizational success .

A database can simplify data governance for an organization by the fact that data is available to users determined by the organization itself, which increases the security and control of business-critical data.

which software manages the functioning of the entire computer system

Answers

it’s the operating system

8. It is used to get qualitative data.​

Answers

Answer:

please give me brainlist and follow

Explanation:

Qualitative data describes qualities or characteristics. It is collected using questionnaires, interviews, or observation, and frequently appears in narrative form. For example, it could be notes taken during a focus group on the quality of the food at Cafe Mac, or responses from an open-ended questionnaire.

The order of slides can be changed here.

Answers

ANSWER:

Yes

WHY:

Not enough information is explained


MARK ME BRAINLIEST PLEASE

list out and discuss the characteristics of big data​

Answers

Answer:

Volume: Volume refers to the sheer size of the ever-exploding data of the computing world. It raises the question about the quantity of data.

Velocity: Velocity refers to the processing speed. It raises the question of at what speed the data is processed.

Variety: Variety refers to the types of data.

Explanation:

combination of star topology and star topology can consider as hybrid?​

Answers

Answer:

no

Explanation:

A hybrid topology is a type of network topology that uses two or more differing network topologies. These topologies can include a mix of bus topology, mesh topology, ring topology, star topology, and tree topology.

The five types of personal computers are: desktops, laptops, tablets, smartphones, and

Answers

Answer:

microcomputers

Explanation:

8.9 Lesson Practice edhesive

Answers

Answer:

1. search

2. False

3. Our algorithm did not find the element we were looking for.

Explanation:

discuss five domains of Instructional technology​

Answers

Answer:

Design, Development, Utilization, Management, and Evaluation.

The city of Green Acres is holding an election for mayor. City officials have decided to automate the process of tabulating election returns and have hired your company to develop a piece of software to monitor this process. The city is divided into five precincts. On election day, voters go to their assigned precinct and cast their ballots. All votes cast in a precinct are stored in a data file that is transmitted to a central location for tabulation.

Required:
Develop a program to count the incoming votes at election central.

Answers

Answer:

Explanation:

The following program asks the user to enter the precinct number and then loops to add votes until no more votes need to be added. Then it breaks the loop and creates a file called results to save all of the results for that precinct.

precinct = input("Enter Precinct Number: ")

option1 = 0

option2 = 0

while True:

   choice = input("Enter your vote 1 or 2: ")

   if int(choice) == 1:

       option1 += 1

   else:

       option2 += 1

   endVote = input("Vote again y/n")

   if endVote.lower() != 'y':

       break

f = open("results.txt", "w")

f.write("Precinct " + precinct + ": \nOption 1: " + str(option1) + "\nOption 2: " + str(option2))

places where computer are used​

Answers

Answer:

Banks and financial.

Business.

Communication.

Defense and military.

Education.

Internet.

Medical.

Transportation.

etc..

Answer:

businesses, schools, colleges, medical offices, banks.

els
2.4
The SPCA receives an amount of R8 500 per annum from an undisclosed
donor. The amount has been growing at a rate of 7.5% per annum
IE
REQUIRED
Calculate how much the donor must have invested as a lump sum to be able
to continue with these payments indefinitely.
(2)​

Answers

Answer:

ds2d2d2d2dd

Explanation:

Write a program that will filter a list of non-negative integers such that all duplicate values are removed. Integer values will come from standard input (the keyboard) and will range in value from 0 up to 2,000,000,000. Input will be terminated by the special value, -1. Once the input is read in you should output (to the screen) the list of numbers as a sorted list (smallest to largest) with one value listed per line where all duplicates have been removed. The primary difficulty with this program is that there are an enormous number of input values and an expected large number of duplicate numbers.

Answers

Answer:

The program in python is as follows:

original = []

inp = int(input(": "))

while inp>=0:

   if inp<=2000000000:

       original.append(inp)

   inp = int(input(": "))

newlist = []

for i in original:

if i not in newlist:

 newlist.append(i)

newlist.sort()

for i in newlist:

   print(i)

Explanation:

This initializes the original list

original = []

This gets input for the list

inp = int(input(": "))

The following loop is repeated while input is not negative

while inp>=0:

This ensures that only inputs from 0 and 2000000000 enters the list

   if inp<=2000000000:

       original.append(inp)

Prompt the user for another input

   inp = int(input(": "))

This initializes a newlist

newlist = []

Iterates through the original list

for i in original:

Check for duplicate

if i not in newlist:

Each number is entered to the new list, without duplicate

 newlist.append(i)

This sorts the new list in ascending order

newlist.sort()

This prints the list item one per line

for i in newlist:

   print(i)

In the recursive function findMatch(), the first call is findMatch(array, 0, 4, key) . What are the remaining function calls to find the character 'e'?
public class FindMatch {
public static int findMatch(char array[], int low, int high, char key) {
if (high >= low) {
int mid = low + (high - low) / 2;
if (array[mid] == key) {
return mid;
}
if (array[mid] > key) {
return findMatch(array, low, mid, key);
}
else {
return findMatch(array, mid + 1, high, key);
}
}
return -1;
}
public static void main(String args[]){
char array[] = {'a','b','c','d','e'};
char key = 'e';
int result = findMatch(array, 0, 4, key);
if (result == -1) {
System.out.println("Element not found!");
}
else {
System.out.println("Element found at index: " + result);
}
}
}
a. (array, 2, 4, key) and (array, 3, 4, key)
b. (array, 2, 4, key), (array, 3, 4, key) and (array, 4, 4, key)
c. (array, 3, 4, key)
d. (array, 3, 4, key) and (array, 4, 4, key)

Answers

Answer:

The answer is "Option D".

Explanation:

In the given question "(array, 3, 4, key) and (array, 4, 4, key)", the element 'e' to also be searched is concentrated mostly on the right-hand side of the array since it is in the last place. This same middle value is 2 but findMatch(array, mid + 1 high, key) is labeled twice to move the center pointer to its last position, that is, so move that search item's 'e.'

Write a program that demonstrates how various exceptions are caught with catch(Exception exception). This time define classes ExceptionA (which inherits from class Exception) and ExceptionB (which inherits from class ExceptionA). In your program, create try blocks that throw exceptions of types ExceptionA, ExceptionB, NullPointerException and IOException. All exceptions should be caught with catch blocks specifying type Exception.

Answers

Answer:

Sorry mate I tried but I got it wrong!

Explanation:

Sorry again

Four reasons why users attach speakers to their computer

Answers

Sound
Quality
Easier
Reliable

The phone in your hand is a computer. So too is the machine that occupies a 100,000 square foot data center. Given their vast differences in size, how can they both be computers?

Answers

Answer:

Well when you think about it they both do the same thing but they are diffirent, they have the same perpose but diffirent parts in them so, when you compair them the phone is smaller and slower, the bigger the computer the better it is depending on the amount of money spent on parts.

What methods do phishing and spoofing scammers use?

Answers

Answer:

please give me brainlist and follow

Explanation:

There are various phishing techniques used by attackers:

Installing a Trojan via a malicious email attachment or ad which will allow the intruder to exploit loopholes and obtain sensitive information. Spoofing the sender address in an email to appear as a reputable source and request sensitive information

why do we need to settle technology in business?​

Answers

Answer:

Technology has important effects on business operations. No matter the size of your enterprise, technology has both tangible and intangible benefits that will help you make money and produce the results your customers demand. Technological infrastructure affects the culture, efficiency and relationships of a business.

What menu and grouping commands is the "SORT" tool? ( please answering meeeee)

A)Home - editing

B) Edit - format

C )Page layout - sheet options

D) File - edit

Answers

C, sorting is meant to arrange therefore layout falls under that

What is the effect when one part of a system changes? A. The entire system changes or could stop working. B. The closed-loop system becomes an open-loop system. C. The open-loop system becomes a closed-loop system. D. The larger system is not affected.

Answers

Answer:

c is the answer hope you get it right

The effect when one part of a system changes C. The open-loop system becomes a closed-loop system.

Systemic change is generally understood to require adjustments or transformations in the policies, practices, power dynamics, social norms or mindsets that underlie the societal issue at stake. It often involves the collaboration of a diverse set of players and can take place on a local, national or global level.

How does a systemic change happen?

All systems organize individual pieces into some sort of interrelated whole. Put simply, systemic change occurs when change reaches all or most parts of a system, thus affecting the general behavior of the entire system.

Why is systems change important?

A systems-change approach is more appropriate for problems that are complex, unpredictable, and context-dependent. For example, the challenge of inadequate access to educational opportunities for children from low-income neighborhoods cannot be addressed with a straightforward, logistical fix.

To learn more about A systems-change, refer

https://brainly.com/question/20798008

#SPJ2

PLS HELP SO I CAN PASS WILL GIVE BRAINLINESS AND 30 POINTS
Charlie Chaplin is know for developing

a
The Dramedy
b
Early Special Effects
c
Slap-Stick
d
The Prat-Fall
Question 2 (1 point)
Chaplin felt it was important for the audience to

a
turn off their cellphones during the movie.
b
believe the stunts were real by doing them himself.
c
escape from their problems by avoiding difficult topics.
d
have an emotional connection with the characters.
Question 3 (3 points)
Match the silent film with its modern influence

Column A
1.
Metropolis:
Metropolis
2.
The Kid:
The Kid
3.
Nosferatu:
Nosferatu
Column B
a.Freddy Kruger
b.The Simpsons
c.Sharknado
d.Star Wars
Question 4 (1 point)
How did Nosferatu change the Vampire cannon (story)?

a
Vampires are friendly
b
Vampires can be killed by sunlight
c
Vampires can become invisible
d
Vampires can be repelled by garlic
Question 5 (1 point)
Metropolis was the first film to

a
have religious undertones.
b
use special effects.
c
have humanoid robots.
d
use Gothic Imagery.


movies being the kid , nosferatu , and metropolis

Answers

Answer:

a

have religious undertones.

b

use special effects.

c

have humanoid robots.

d

use Gothic Imagery.

Explanation:

Describe how operating system use the following security tools: firewall, automatic updating, antivirus software, spyware and malware detection software

Answers

Answer:There are several software products and settings you can make that will help alert you to or protect you from certain kinds of technology attacks such as malware, viruses, and so on.   Use these programs and keep them up to date so they can defend you against the latest threats.

Explanation:

You plan to make a delicious meal and want to take the money you need to buy the ingredients. Fortunately you know in advance the price per pound of each ingredient as well as the exact amount you need. The program should read in the number of ingredients (up to a maximum of 10 ingredients), then for each ingredient the price per pound. Finally your program should read the weight necessary for the recipe (for each ingredient in the same order). Your program should calculate the total cost of these purchases, then display it with 6 decimal places.

Example There are 4 ingredients and they all have a different price per pound: 9.90, 5.50, 12.0, and 15.0. You must take 0.25 lbs of the first, 1.5 lbs of the second, 0.3 lbs of the third and 1 lb of the fourth. It will cost exactly $29.325000.

Answers

Answer:

In Python:

prices = []

pounds = []

print("Enter 0 to stop input")

for i in range(10):

   pr = float(input("P rice: "+str(i+1)+": "))

   pd = float(input("Pound: "+str(i+1)+": "))

   if pr != 0 and pd != 0:

       prices.append(pr)

       pounds.append(pd)

   else:

       break

amount = 0

for i in range(len(pounds)):

   amount+= (pounds[i]*prices[i])

print("Amount: $",amount)

Explanation:

These initialize the prices and pounds lists

prices = []

pounds = []

This prompts the user to enter up to 10 items of press 0 to quit

print("Enter 0 to stop input")

This iterates through all inputs

for i in range(10):

This gets the price of each item

   pr = float(input("P rice: "+str(i+1)+": "))

This gets the pound of each item

   pd = float(input("Pound: "+str(i+1)+": "))

If price and pound are not 0

   if pr != 0 and pd != 0:

The inputs are appended to their respective lists

       prices.append(pr)

       pounds.append(pd)

If otherwise, the loop is exited

   else:

       break

This initializes total to 0

amount = 0

This iterates through all inputs

for i in range(len(pounds)):

This multiplies each pound and each price and sum them up

   amount+= (pounds[i]*prices[i])

The total is then printed

print("Amount: $",amount)

Which of the following is probably not a place where it is legal to download the music of a popular artist whose CDs are sold in stores?

Answers

Answer:

A. Personal blogs

Explanation:

I did the quick check, and there you go...it's A.

Why are microcomputers installed with TCP/IP protocols?

Answers

Answer:

microcomputers are installed with TCP/IP protocols because its a set of standardized rule that allows the computer to communicate on a network such as the internet

Explanation:

To understand, read, and give meaning to data in
tables and charts is to perform which of the
following?

A interpretation

B analysis

C assessment

D data collection

Answers

Answer:

teh answer is b

Explanation:

which of the

following?

A interpretation

B analysis

C assessment

D data collection

Answer:

interpretation

Explanation:

1

This is a glitch ? 


 











































Answers

Answer:

I think no...Brainly might not allow unique text's.

Answer:

dunno???

Explanation:

what is descriptive research​

Answers

Answer:

Descriptive research is used to describe characteristics of a population or phenomenon being studied. It does not answer questions about how/when/why the characteristics occurred. Rather it addresses the "what" question

Other Questions
Ameen went to the salon and had 3/8 of an inch of hair cut off. The next day she went back and asked for another 1/2 of an inch to be cut off. How much hair did she have cut off in all? Write your answer as a fraction in simplest form please I need help i will give 30 points Please help me with this ASAP ASAP please please help please please Du triffst dich mit einem guten Freund und mchtest wissen wie es ihm geht.Wie geht's, wie steht's?Wie?Sei gut?Hast du einen Vogel? Who is not allowed in the Meeting Hall in Philadelphia? What is Moon Shadows point of view of the demons and the Land of the Golden Mountain? A long, uninsulated steam line with a diameter of 89 mm and a surface emissivity of 0.8 transports steam at 200C and is exposed to atmospheric air and large surroundings at an equivalent temperature of 20C. (a) Calculate the heat loss per unit length for a calm day. (b) Calculate the heat loss on a breezy day when the wind speed is 8 m/s. (c) For the conditions of part (a), calculate the heat loss with a 20-mm-thick layer of insulation (k 0.08 W/m K). Would the heat loss change significantly with an appreciable wind speed what is the following product? 3sqrt4 times sqrt3 Which president signed the Privacy Act Amendments to the Freedom of Information Act into Law? Find the height of ABD The number of mold spores on a piece of bread after a different amount of time or listed in the table belowWhich function models the number of mold spores on the bread after X days What sentence is used incorrectly On a coordinate plane, a line goes through (negative 4, 0) and (4, negative 4). A point is at (2, 3).What is the equation of the line that is parallel to the given line and passes through the point (2, 3)?x + 2y = 4 x + 2y = 82x + y = 42x + y = 8 how did NATO contribute to the cold war If x + sin^2 theta + cos^2 theta = 4, then what is the value of x? What is the probability of the spinner landing on a vowel? Leandro Corp. manufactures wooden desks. Production consists of three processes: cutting, assembly, and finishing. The following costs are given for April: Cutting Assembly Finishing direct materials $7,000 $10,000 $3,000 direct labor 3,000 14,000 2,000 applied overhead 4,000 5,000 6,000 There were no work in process inventories and 1,000 podiums were produced. What is the cost transferred out of the assembly department. a.$29,000 b.$43,000 c.$54,000 d.$14,000 e.None of these choices are correct. Reading Comprehension "Who Understands Me but Me ".What does the following line mean?" Who understands me when I say that I have found other freedoms?"a) the speaker is planning to escapeb) the speaker is imagining freedomc) the speaker has found freedom within themselves d) the speaker is not restrained in the real world Ruben, Gerald, and Norma all work for the same company. Gerald and Norma both evaluate the companys financial picture, but Gerald looks at liabilities and Norma looks at expenditures. Both Gerald and Norma make reports for Ruben, who makes the decisions for the company. Which best describes the jobs of the three employees?Ruben is the Risk Management Specialist, Gerald is the Budget Analyst, and Norma is the Treasurer.Ruben is the Treasurer, Gerald is the Risk Management Specialist, and Norma is the Budget Analyst.Ruben is the Treasurer and Gerald and Norma are the Risk Management Specialists.Ruben is the Treasurer and Gerald and Norma are the Budget Analysts. What is the best summary of this excerpt?