A.
Explanation of Solution
Hex address of the relocated reference to “sum”:
From the given Figure 7.12(a), the function “sum” in line 5 is
4004de: e8 05 00 00 00callq 4004e8 <sum>sum()
From the given Figure 7.12(a), the value of “ADDR(s)”, “ADDR(r.symbol)” and “r.addend” is given below
Now calculate the reference address for given line using the below formula.
B.
Explanation of Solution
Hex value of the relocated reference to “sum”:
From the given Figure 7.12(a), the function “sum” in line 5 is
4004de: e8 05 00 00 00callq 4004e8 <sum>sum()
From the given Figure 7.12(a), the value of “ADDR(s)”, “ADDR(r.symbol)” and “r.addend” is given below
Now calculate the reference address for given line using the below formula.
Then,
Want to see the full answer?
Check out a sample textbook solutionChapter 7 Solutions
Computer Systems: A Programmer's Perspective (3rd Edition)
- (3) (a) Consider the following interaction with Python: x= [1,2,34 ,5 ,6 , np.nan] y= (10,i,2,5, 'Missing',6.3) z= [0.1, 1.2 , np.nan , 4,5.1,0.5] df1=DataFrame ({'col1':Series (z),'co12':Series (y), 'col3': Series (x)}). df1.index= ['a','b','c', 'd','e','f'] Replace the NaN value in coll with -9, the Missing value in col2 with -99, and the NaN value in col3 with -999 with relevant functions. Name as dfl_replaced (b) Consider the following interaction with Python: df2=DataFrame (np. array ( [[1, np.nan ,3, 8], [np.nan , 2,3,5] , [10,2,3, np.nan], [10,2,3 , np.nan], [10,2,3,11]])) df2.columns = ['one', 'two', three', four '] df2. index= ['a','b','c 'd','e'] Remove the rows that have nan values from df2 and name as df2_row. Remove the columns that have nan values from df2 and name as df2_column. Use relevant functions.arrow_forward(c) The following Sigma 16 program has been loaded into memory at address 0000: load R3,y[RO] load R4,x[RO] lea R5, 2[RO] sub R1,R4,R3 mul R2,R1,R5 store R2,w[RO] trap RO,RO,RO x data 10 y data 12 w data 0 Show the content of the memory writing hexadecimal representation and using a table with 3 columns: the memory address, the contents of that memory address, and an explanation of what "the content (of that memory address) means". As a reference, here are the opcodes for RRR instructions: add 0, sub 1, mul 2, trap c. And here the opcodes for RX instructions: lea 0, load 1, store 2. [7]arrow_forward(TCOs 7, 9) Address each of the following:(a) Define cloud computing.(b) List and discuss the advantages and disadvantages of cloud computing.(c) Differentiate among three different types of cloud services and give an example of each.arrow_forward
- Laboratory #1 (part 1) of programming and application of the Assembler instruction set. Exercise 1: Design a program that determines the area of a rhombus and the perimeter of a prism. Note: Explain step by step and put comments on each line of code explaining what each one does. Remember to make the code in assembler and NOT IN C.arrow_forwardProblem 5. (C65. (5. s) Sort 3, 1, 4, 1, 5, 9, 2, 6, 5, 3, 5 using quicksort with median-of-three partitioning and a cutoff of 3.arrow_forwardProblem 1 jt"¡1, The following program is run on a machine where memory reference instructions take 8 cycles, arithmetic instructions take 6 cycles, and branches take 3 cycles. It is known that the “sqrt" procedure executes 7 instructions and requires 30 clock cycles. $s0, 20 ($s2) $t1, $s3, $s3 lw add j L1 $t1, $t1, $t1 $t1, $t1, $6 $a0, 0 ($t1) sqrt addi $s3, $s3, 1 beq $s0, $v0, Exit add L1: add lw jal (a). How long will it take to run this program if the machine has a 500 MHz clock? (b). What is the CPI for this program?arrow_forward
- Problem 3. (Encryption Program) Write a program called encrypt.py that accepts the public-key n (int) and e (int) as command-line arguments and a message to encrypt from standard input, encrypts each character in the message, and writes its fixed-width binary representation to standard output. 'A tuple is like a list, but is immutable. You create a tuple by enclosing comma-separated values within matched parentheses, eg, a = (1, 2, 3). If a is a tuple, a[i] is the ith element in it. 5 / 7 Project 4 (RSA Cryptosystem) >- "/workspace/project4 $ python3 encrypt.py 3599 1759 Cs110 000110000000010011010100001010100011001010100011001110000110010111100100 Directions: • Accept public-key n (int) and e (int) as command-line arguments. • Get the number of bits per character (call it width) needed for encryption, ie, number of bits needed to encode n. • Accept message to encrypt from standard input. • For each character c in message: - Use the built-in function ord() to turn c into an integer x.…arrow_forwardProblem 1.10: Simplify F(A, B,C, D) = ACD+ A'B + D'arrow_forward(C PROGRAMMING ONLY) 1. Point Me Thereby CodeChum Admin I was supposed to be your tour guide but I don’t know where our destination is. I have a list here that contains all the destinations where we are going to go. Each destination is basically represented with an integer. But it seems that I'm confused. Please help me by pointing me to the correct address. Instructions: In the code editor, you are provided with a main() code that asks for an integer input from the user and stores this to the variable n.Your task is to set the value of the destination_ptr found at line 9 to the address of the variable n.Aside from this, do not edit anything else.Input 1. An integer value Output Enter the destination number: 2Found it!arrow_forward
- (c) "Earliest-Deadline-First Scheduling can provide the improvement over Rate-Monotonic Scheduling". State whether the given statement is true or false. Justify your answer with suitable example.arrow_forward(a) (b) (c) 6.4 Given the following properties, draw trees that satisfy them: Number of nodes: 14 • Number of nodes with depth 2: 6 Height of the tree: 3 • Number of nodes: 12 • Number of leaf nodes: 6 Height of the tree: 6 Number of nodes: 23 Height of the tree: 3arrow_forward(d) You are working on a redesign of a simple 16-bit computer which supports at most 64 kilobytes of memory. Currently, memory is word-addressed and all memory accesses load or store a 16-bit value. For example, LDA Ox6502 loads a 16-bit value from address Ox6502 into register A. The change is to support additionally 8-bit accesses, thanks to an expanded machine language (already designed by a colleague) which now supports instructions such as: ; load 16 bits from addr 6502 into A ; load 8 bits from addr 6502 into A LDAW Ox6502 LDAB Ox6502 Outline, at a high level, how you would bring about this change in the CPU design, and mentioning any difficulties you expect to encounter.arrow_forward
- Database System ConceptsComputer ScienceISBN:9780078022159Author:Abraham Silberschatz Professor, Henry F. Korth, S. SudarshanPublisher:McGraw-Hill EducationStarting Out with Python (4th Edition)Computer ScienceISBN:9780134444321Author:Tony GaddisPublisher:PEARSONDigital Fundamentals (11th Edition)Computer ScienceISBN:9780132737968Author:Thomas L. FloydPublisher:PEARSON
- C How to Program (8th Edition)Computer ScienceISBN:9780133976892Author:Paul J. Deitel, Harvey DeitelPublisher:PEARSONDatabase Systems: Design, Implementation, & Manag...Computer ScienceISBN:9781337627900Author:Carlos Coronel, Steven MorrisPublisher:Cengage LearningProgrammable Logic ControllersComputer ScienceISBN:9780073373843Author:Frank D. PetruzellaPublisher:McGraw-Hill Education