Upgrade to remove ads
Only ₩37,125/year
-
Flashcards
-
Learn
-
Test
-
Match
-
Flashcards
-
Learn
-
Test
-
Match
Terms in this set (44)
MASM has built-in range checking for effective addresses.
False
Adding 0FFh and 05h in an 8-bit register sets the Overflow flag.
False
The MOVZX instruction is only used with unsigned integers.
True
The MOVSX instruction sign-extends an integer into a larger operand.
True
What are valid uses of the XCHG instruction?
XCHG mem, reg
XCHG reg, mem
XCHG reg ,reg
The INC instruction does not affect the Carry flag.
True
If the LOOP instruction sets ECX to zero, a jump to the destination label does take place.
False (weird question)?
Implement the following expression. Do not permit dword1, ECX, or EDX to be modified:
eax = -dword1 + (edx - ecx) + 1
mov eax,dword1
neg eax
mov
ebx,edx
sub ebx,ecx
add eax,ebx
inc eax
The formal name of the LOOP instruction is
Loop According to ECX Counter
Carry flag
indicates unsigned integer overflow
Overflow flag
indicates signed integer overflow
Zero flag
indicates that an operation produced zero
Sign flag
indicates that an operation produced a negative result
Parity flag
indicates whether or not an even number of 1 bits occurs in the least significant byte of the destination operand, immediately after an arithmetic or Boolean instruction has been executed
Auxiliary Carry flag
set when a 1 bit carries out of position 3 in the LSB of the destination operand
List the valid MOV operations
MOV mem, reg
MOV reg, mem
MOV reg, imm
MOV mem, imm
MOV reg, reg
Which library procedure writes a single character to standard output?
WriteChar
Which library procedure generates a 32-bit pseudorandom integer in a caller-specified range?
Random32
Which library procedure writes an unsigned 32-bit integer to standard output in hexadecimal format?
WriteHex
Which library procedure sets the Zero flag if the AL register contains the ASCII code for a decimal digit (0-9)?
isDigit
A stack is also called a FIFO structure (First-In, First-Out) because the last value put into the stack is always the first value taken out.
False
Which library procedure locates the cursor at a specific row and column on the screen?
Gotoxy
Which register contains an integer before calling WriteDec?
eax
Which library procedure displays the CPU flags and 32-bit registers?
DumpRegs
Which I/O device is used for standard input?
keyboard
Which library procedure reads a string from standard input?
ReadString
How does the push instruction work (mechanically)?
It decrements the stack pointer (by 2 or 4) and copies the operand into the stack at the location pointed to by the stack pointer.
Which of the following CALL instructions writes the contents of EAX to standard output as a signed decimal integer?
call WriteInt
Which register contains the offset of a character array when calling GetCommandTail?
EDX
What will be the value of EAX when the following sequence of instructions has executed?
push 5
push 10
push 27
pop eax
27
A/An ________ procedure call occurs when a called procedure calls another procedure before the first procedure returns.
nested
List the instructions that manipulate the ESP register
pop, push, call, ret
A procedure is declared using the _____ and ____ directives.
PROC and ENDP
The MOVSX instruction is only used with unsigned integers.
False
The _____ operator, coupled with the ____directive, lets you list the names of all registers modified within a procedure.
USES and PROC
The ________ procedure advances the cursor to the beginning of the next line in the console window.
Crlf
Mechanically speaking, what does the the CALL instruction do?
It pushes its return address on the stack and copies the called procedure's address into the
instruction pointer.
By default, labels are visible only within the procedure in which they are declared.
True
Define a MASM constant for your name as a zero-byte terminated string.
MY_NAME EQU <"Name O. Student",0>
What is the size of the string in the following MASM data segment declaration?
data stones BYTE "You Can't Always Get What You Want.",10,13,0 38 Bytes
throwout
What is the purpose of a breakpoint during a program debugging session?
It pauses execution, so the programmer can view the contents of memory, registers, etc.
Which function key is used to execute a library procedure, without going into the details of the procedure?
F10
When execution is paused at a breakpoint, which function key is used to continue execution to the next breakpoint (or to the end of the program if no more breakpoints exist)?
F5
The MASM assembler is used for locating __________ errors, but the debugging system is used for locating _________ errors.
The MASM assembler is used for locating syntax errors, but the debugging system is used for locating logic, run-time, or execution errors.
Students also viewedCS 271 Module 3
14 terms
Bradbury-CPlus
CS271 Midterm Module 3 +4
13 terms
reyejona
Module 3 - CS 271
18 terms
Elliekhoury
CS271 Midterm Module 2
37 terms
reyejona
Sets found in the same folderOSU CS 271 final review
116 terms
shinningsea
cs 271 week5
12 terms
SerPenguin
Assembly - Exam #1
44 terms
ericsil24
CS271 Week 3
30 terms
Dominic_Wasko
Other sets by this creatorCAPVT I
22 terms
SerPenguin
General OOP and Programming
26 terms
SerPenguin
People and Professions (1)
14 terms
SerPenguin
Phonemes
8 terms
SerPenguin
Verified questions
computer science
Write a function named welcome() that asks the user to enter his or her name and displays it followed by a welcome message.
Verified answer
computer science
What is the maximum number of exchanges involving any particular element during selection sort? What is the average number of exchanges involving an element?
Verified answer
computer science
Write a method called randomlnRange that accepts two integer parameters representing a range such as 30 to 50. The method should return a random integer in the specified range (inclusive). Return zero if the first parameter is greater than the second.
Verified answer
computer science
Show that the worst-case running time of MAX-HEAPIFY on a heap of size n is Ω(lg n). (Hint: For a heap with n nodes, give node values that cause MAXHEAPIFY to be called recursively at every node on a simple path from the root down to a leaf.)
Verified answer
Recommended textbook solutionsInformation Technology Project Management: Providing Measurable Organizational Value
5th EditionJack T. Marchewka
346 solutions
Computer Organization and Design MIPS Edition: The Hardware/Software Interface
5th EditionDavid A. Patterson, John L. Hennessy
220 solutions
Starting Out with Python
4th EditionTony Gaddis
629 solutions
Introduction to Algorithms
3rd EditionCharles E. Leiserson, Clifford Stein, Ronald L. Rivest, Thomas H. Cormen
726 solutions
Other Quizlet setsLecture Outline #10
35 terms
taylorbrink18
Engr 220 Midterm 2 Bazai 2009
13 terms
charles_byun9
Chapter 5
38 terms
hflynn91
Chapter 11
27 terms
Bmkusay