5..data count DWORD? .code mov ax, 5 mov ecx,2 mov count,ecx inc ax mov ecx,3 L2: dec ax call dumpregs loop L2 mov ecx,count loop L1 Given the above code After execution the ax value is * 5
Q: Why must the symbol or name used in the C++ inclusion guard on a library interface file be distinct?…
A: Your answer is given below.
Q: What is the difference between POP3 and IMAP Mail Server?
A: POP3 and IMAP both are Message Accessing Agent. One can utilize both of these conventions for…
Q: You must add a canvas. Then ask the user to click ok if he enjoyed 2020 and cancel if he did not.…
A: see the below code
Q: Explain what is Kerberos?
A:
Q: Discuss the various types of visuals that are used in technical papers to make them more legible…
A: The use of photography and video in anthropological study has a long history. Photography has a…
Q: The routing protocol has led to the discovery of how many networks?
A: Routing protocols share routing information between routers for routing choices. Routers must know…
Q: What are the minimum hardware requirements for this gaming PC to run Windows 10?
A: Definition: The most popular choice for gamers is Windows 10 Home, the finest version of Windows 10…
Q: Java Program I will give an upvote to one that can help me. Instructions: - Create a java program…
A: A phrase is a palindrome if, after converting all uppercase letters into lowercase letters and…
Q: We'll go through the key features and benefits of descriptive models in more detail down below.
A: DESCRIPTIVE MODEL: Descriptive research is a kind of research approach that explains all of the…
Q: ou need to run a legacy application that is no longer supported in Windows 10. Explain two ways…
A: let us see the answer:- Introduction:- The majority of apps (and other programmes, such as games or…
Q: My first choice was database management would be GUI ( graphical user interface).GUI has been…
A: The question is solved in step2
Q: In this question we use ^ to mean raise to the power. Suppose our algorithm performs 2n^5 + 15n +…
A: Answer: We need to write the what will be the correct appropriate Big-O complexity class so we will…
Q: Describe the elements of the backup plan in general. What is the difference between backup plans for…
A: Introduction: The term "backup" describes transferring physical or virtual information or databases…
Q: Explain The Lists in HTML.
A: HTML is the Hyper Text Markup Language that is widely used in web development to create and styling…
Q: Write HTML code which includes table.
A: An HTML table is created with an opening <table> tag and a closing </table> tag. Inside…
Q: What three data anomalies are caused by data redundancy? How to eliminate such anomalies
A: A database management system (or DBMS). It is essentially just a computer-based data storage system.…
Q: It is essential for multimedia projects to make use of fundamental building blocks. How can you make…
A: Introduction: Components of Multimedia: Textual MaterialsThe text transports us back to the early…
Q: What is the router's boot-up process?
A: The following describes how a router boots up: The router's power should be turned on. The ROM is…
Q: write multiword addition for the given data and give the content of the related memory locations…
A: Multiword addition for the given data after the execution of the code, DS: 0710; data segment :…
Q: At what point in time does antivirus software start to load?
A: Explanation: Booting Process in 6 Steps: 1. Turn on the fundamental input/output system (BIOS) 2.…
Q: What methods do software designers and developers use?
A: Software development methods are structured approaches to a software development project. Effective…
Q: systematically talk about how to make a Linux computer more secure. HTTPS-Everywhere \sGhostery
A: The protection of computer systems and networks from information disclosure, theft, or damage to…
Q: a) Construct a hash tree for the above candidate 3-itemsets. Assume the tree uses a hash function…
A:
Q: What is the database's level of security? Which two strategies do you believe are the most effective…
A: Database Protection: Data are one of the most critical aspects of our daily life. We must thus…
Q: The program is Java. Part 1. Create an abstract Parent Class called “Vehicle” strictly based on the…
A: ALGORITHM:- 1. Create the Vehicle class and add the corresponding methods in it. 2. Create Electric…
Q: This section should go over the IT Governance considerations that a company should think about…
A: Introduction: Before doing anything else, it is essential to determine the resources you already…
Q: Write a Paython program , without using def function Please . Let f be the function from A to B…
A: ALGORITHM : 1. Create an empty list first_elements2. Iterate over the function f3. For each element…
Q: Three analog-to-digital technologies should be listed. What inspired each transformation and why?
A: Introduction Thinking back to the 1970s and prior fundamental technology being used was analog…
Q: and list processing You will write a program to read grade data from a text file, displays the…
A: def read_grades(): # prompts for a file, read grades from file into a list and return the list…
Q: Write java code to Demonstrates the use of a map to manage a set of objects.
A: code to Demonstrates the use of a map to manage a set of objects given below:
Q: Explain the XML Elements with their types.
A: XML Elements: XML elements are the basic building blocks of an XML document. They are user-defined…
Q: What exactly is the key distinction between bytecode and assembly language?
A: Introduction: Bytecode is virtual machine object code. It may execute on a virtual machine (such as…
Q: How to perform subnet addressing?
A:
Q: If you're working on a software team to create a smartphone user interface, you'll need to have a…
A: Given Why are user interfaces difficult to build, please? There are five tasks to execute a user…
Q: Explain The Lists in HTML.
A: There are three list types in HTML: unordered list used to group a set of related items in no…
Q: 1.Write a python Program to find out the prime numbers not exceeding 100
A: A prime number is a whole number that can be divided exactly only by 1 and the number itself. Prime…
Q: Wireless sensor networks (WSNs) are an example of a network that may facilitate communication.…
A: Definition: Focus on the scenario where we have an algorithm that can be broken down into smaller…
Q: For any [x] EZ/n and any kEZ, we can define k[x] by k[x] = [x] + [x] + ... + [x] k times where the…
A: The question is to find the multiples of [3] in z/9 and z/8.
Q: What is MUX and explain how mux works?
A:
Q: In this lab, you complete a partially written C++ program that computes hotel guest rates at…
A: In this lab, you complete a partially written C++ program that computes hotel guest rates at…
Q: Describe each option you can choose from when configuring and installing Linux.
A: Installing the Linux Software. You can now install the software after resizing your current…
Q: How would i create this chip in hdl (hardware description language) this is what ive got so far…
A: Hello sir
Q: How to perform subnet addressing?
A: Dividing large network into many small networks is called as Subnetting. In the process of subnet…
Q: Is there a comprehensive catalog of malicious software and the harm they cause
A: Introduction Malware:- Malware, which includes spyware, ransomware, and other harmful software, is a…
Q: I'm confused about this thing called the "Medium Term Scheduler."
A: Process Planning: Process scheduling oversees the preparation, running, and start stages. The…
Q: Fill in the function body of the Python function sumOfMultiples (you should leave the function…
A: In this question we need to write a program in Python. We need to implement the given function such…
Q: 2 h
A: Dear Student, The answer to your question is given below -
Q: In this question you need to write a program and execute it with the given input, the output of your…
A: import math from decimal import…
Q: For all of the following words, if you move the first letter to the end of the word, and then spell…
A: The correct C++ code is given below with modifications The output screenshot is also given
Q: Explain what is Kerberos?
A: Definition: Kerberos provides a centralised authentication server whose function is to authenticate…
.
Trending now
This is a popular solution!
Step by step
Solved in 2 steps
- 5..data count DWORD? .code mov ax, 5 mov ecx,2 mov count,ecx inc ax mov ecx,3 L2: dec ax call dumpregs loop L2 mov ecx,count loop L1 Given the above code After execution the ax value is * 5PHONE DIRECTORYDescription: Create a phonebook directory that will store the contact numbers of N persons. Your program should allow the user to add, view, delete, and update the contacts in the phonebook. Note that one person can have multiple contact numbers. The program will stop when the user command is ‘X’. Program command and entry should not be case-sensitive. That means commands ‘I’ or ‘i’ and the name “Jacky” or “JACKY” are the same. Each contact number can be 7 digits or 11 digits only. The user should input a string containing the command, name, and contact number(s) (Limit the contact number of each person to three). This string should be broken down into fields in order to separate the different values and store them in their appropriate variables. Use linked list in the implementation. Your node must declare at least four instance variables. Program flow: Command> I Jacky 09211234567 Remarks: New contact has been added. Command> V Jacky Contact…Octave assignment 1-Introduction to Octave Introduction This assignment is meant to be a gentle introduction to Octave, the free version of Matlab. It assumes that you have no prior coding experience. Objectives Download Octave and run it or use https://octave-online.net/ Learn the basics of the Octave GUI. • Learn how to create a short executable file called an m-file (.m extension) and run it. • Learn what a data type is. • Learn how to declare variables of different data types. • Learn how to create matrices. • Learn how to use several of Octave’s functions for creating objects with random numbers. Instructions 1.) Create a file call it with the form exercise_1_first name_last name. Include the underscores in your file name. At the top of the file add the comment "“My first Octave assignment. I'm so excited, I just can't hide it." 2.) Create the following variables a = 2.3; b = -87.3; A = [1,2; 4,5]; Create a matrix 2 × 2 B using the rand() function. Create two random complex…
- #include <stdio.h> struct clientData { unsigned int acctNum; char lastName[15]; char firstName[10]; double balance; }; unsigned int enterChoice(void);void textFile(FILE* readPtr);void updateRecord(FILE* fPtr);void newRecord(FILE* fPtr);void deleteRecord(FILE* fPtr); int main(void) { FILE* cfPtr; if ((cfPtr = fopen("accounts.dat", "rb+")) == NULL) { puts("File could not be opened."); } else { unsigned int choice; while ((choice = enterChoice()) != 5) { switch (choice) { case 1: textFile(cfPtr); break; case 2: updateRecord(cfPtr); break; case 3: newRecord(cfPtr); break; case 4: deleteRecord(cfPtr); break; default: puts("Incorrect…Unix assignment Purpose: The purpose of this assignment is to use various concepts of the C Shell. 0. Change your default login shell to the C Shell. 1. Create a .cshrc file in your home directory that will do the following: * Create the alias (lsall) that will do all of the following: display the date, and a recursive long list of all files in a directory. * Create the alias (whoson) that will display the date and a sorted list of users logged in. * Declare the LOCAL variable that controls the size of your history list to the value 200. * Declare the shell variable that will cause the C Shell to send a message to your terminal whenever one of your background commands complete. 2. Create a .login file in your home directory to do the following. * Declare the GLOBAL Terminal Type variable to the value vt100. Display the value of the variable. Logout and log back in to make sure your .cshrc and .login files are automatically executed. Create a lab8.scr…Code: (emu8086) #START = THERMOMETER.EXE##START = LED_DISPLAY.EXE#.STACK 100H .MODEL SMALL .DATA MSG1 DB 10,13,' WELCOME ', DB 10,13,' CHOOSE TYPE OF FOOD ', DB 10,13,'1.) PIZZA 2.) BAKED MACARONI 3.) FRENCH FRIES', DB 10,13,'ENTER: $' MSG2 DB 10,13,'PLEASE SELECT WHAT WILL BE THE MAX TEMPERATURE', DB 10,13,'1.) 20 DEG', DB 10,13,'2.) 40 DEG', DB 10,13,'3.) 60 DEG', DB 10,13,'4.) 80 DEG', DB 10,13,'5.) 100 DEG', DB 10,13,'6.) 119 DEG', DB 10,13,'ENTER: $' NUM1 DB 20 NUM2 DB 40NUM3 DB 60NUM4 DB 80NUM5 DB 100NUM6 DB 119 TIMEOP1 DB 10,13,'SET THE TIMER', DB 10,13,'ENTER 1: 00:00:50', DB 10,13,'ENTER 2: 00:01:40', DB 10,13,'ENTER 3: 00:02:30', DB 10,13,'ENTER 4: 00:03:20', DB 10,13,'ENTER 5: 00:04:10', DB 10,13,'ENTER: $' A DB 0B DB 0C DB 0D DB 0 OPTIONERROR DB 10,13,'INVALID OPTION $' DONE DB 'DONE','$' RESTARTMENU1 DB 10,13,'PRESS 1 TO GO BACK TO…
- from dateutil import parserimport datetimefrom datetime import datetimeusernames = []passwords = [] def reg_user():"""Return for registering new user"""withopen('user.txt', 'a') asfile1: iflogin_username == "admin": new_username = input("Enter a username: ") whilenew_usernameinusernames:print("This username already exists.")new_username = input("Enter a username: ") new_password = input("Enter a password: ")confirm_password = input("Re-enter the password: ")whileconfirm_password != new_password:print("Passwords do not match.")new_password = input("Enter your password: ")confirm_password = input("Re-enter your password: ")else:print("Welcome ", new_username) whilenew_passwordinpasswords:print("This password already exists.")new_password = input("Enter a password: ")confirm_password = input("Re-enter the password: ") else:print("User not authorised to register a new user.")return file1.writelines(f"\n{new_username}, {new_password}") def add_task():"""Return for adding…Directions: Use a file city.txt for answering the questions that follow each scheduling algorithm. This file has three columns (comma separated): the first column contains the job Id, the second column indicates the CPU burst, and column three is the arrival time of the corresponding job. Parallel Programming It is vaccine season! COVID19 vaccines are out, and everyone is rushing to get one. Vaccines are available from six different brands and you have been entrusted to write a program to count the total number of vaccines of each brand administered across 21 cities in the state. Write a multithreaded program (in the file vaccines.cpp) that counts the number of vaccines in 21 different files of numbers. Each line in each of the files will contain either one of the following brand names: v1, v2, v3. Your program must count the number of units for each vaccine brand administered, across all 21 cities, and display the total number of units for each brand. The files are named…Directions: Use a file city.txt for answering the questions that follow each scheduling algorithm. This file has three columns (comma separated): the first column contains the job Id, the second column indicates the CPU burst, and column three is the arrival time of the corresponding job. Parallel Programming It is vaccine season! COVID19 vaccines are out, and everyone is rushing to get one. Vaccines are available from six different brands and you have been entrusted to write a program to count the total number of vaccines of each brand administered across 21 cities in the state. Write a multithreaded program (in the file vaccines.cpp) that counts the number of vaccines in 21 different files of numbers. Each line in each of the files will contain either one of the following brand names: v1, v2, v3. Your program must count the number of units for each vaccine brand administered, across all 21 cities, and display the total number of units for each brand. The files are named "city1.txt",…
- Repeat the example below but this time you should do the following : - Maintain a database in a file: - Add any new vehicle to the fleet. Vehicle information should include -Model year -Make Model name -License plate number -Rent a vehicle to the registered customer -Receive rented vehicle back from customer #include <stdio.h> #include <string.h> #include <stdlib.h> typedef struct { int id; char name[50]; char phone[15]; /* data */ } Customer; void addCustomer(Customer *arr, int size); void searchCustomer(Customer *arr, int size); int main() { Customer arr[10]; int size = 0; addCustomer(arr, size++); addCustomer(arr, size++); searchCustomer(arr, size); } void addCustomer(Customer *arr, int size) { int id; char name[50]; char phone[15]; printf("Enter Customer ID\n"); scanf("%d", &arr[size].id); printf("Enter name\n"); scanf("%s", arr[size].name); printf("Enter phone\n"); scanf("%s", arr[size].phone); } void searchCustomer(Customer *arr, int size) {…Course:Data Structure and Algorithms Kindly do this correct as soon as possible: I am providing the a menu base programs in java for address book by using doubly LinkedList and arrayList in a menu which are following: 1.Enter 1 for using Doubly linkedList 2.Enter 2 for using arrayList YOU have to use File handling which create person.text file like this: Perform these steps while application is loading up. You can add a new method loadPersons.• Establish a data channel with a file by using streams• Start reading data (person records) from file line by line• Construct PersonInfo objects from each line you have read• Add those PersonInfo objects in arraylist/ doublylinked list persons.• Close the stream with the fileRead records from a text file named persons.txt. The person records will be present in thefile in the following format. Add at least 50 records in text file, Ali,defence,9201211 Usman,gulberg,5173940…In Python: If you call the index method to locate an item in a list and the item is not found, this happens A ValueError exception is thrown An InvalidIndex exception is thrown The method returns -1 Nothing happens, The method does not return anything and the program continues execution