Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

Need help solving question

String manipulation, loops, branches, and subroutine calls in MIPS

Background:

.asciiz stores a string with the null terminator

.ascii stores a string without a null terminator

Since MIPS stores a string as ASCII bytes, it will make sense to use the lbu/sb load/store byte instructions.

Write a MIPS program to copy a lowercase string to another string, converted to uppercase. For example: "hola" should become "HOLA". Store string lower as .asciiz and reserve space for string upper using .space.

Look up an ASCII table in hex online or in the notes and notice the difference in hex between upper and lower case letters to figure out how to easily convert from one to the other. Your program should loop until it encounters the null terminator.

Take a screen shot of the program code. Take another screen shot of the memory area after the program ran, but check the ASCII box below the memory window.

Table 1: Rubric for Problem 1

Task

Points

Code screen shot

10

Memory screen shot

5

Loop ends at '\0'

5

Code comments, formatting

5

Total

25

Rewrite your program in #1 to use a procedure for the conversion. In other words, if you send "apple" to the procedure it will return "APPLE". Leave the rest of the code in main.

Test it on the source strings: "loop2:" and "Elephant!" In other words, code in your main program calls the procedure twice, once for each source string. You should print a memory screen shot after the program runs, showing that both strings were converted - check the ASCII box.

You should add code to check if each byte is in fact a lowercase letter, and only convert if it is; otherwise it should just copy it.

In the program for problem 1 you could use $tn registers but in this program you should follow the conventions for using $sn and $tn registers.

Also, use the directive .space for the upper case strings, reserving at least 10 bytes for each of the 2 upper strings.

Table 2: Rubric for problem 2

Task

Points

Code and screen shot

5

Memory screen shots for 2 inputs

10

Correct procedure usage

5

Code checks a-z range

5

Correct use of $tn and $sn

5

Main code calls procedure twice

5

Code comments, formatting

5

Total

40

Single-step through your program through the first subroutine call and back, then answer the following questions. Copy a-g below and paste your answers/screen shot here.

What is the value of PC before you execute the jal?

What is the value of $ra before you execute the jal?

Set a breakpoint to the jr instruction and run until then. What is the value of PC before the jr?

Single step back to the main program. What address is in the next instruction?

What value is in the PC?

Write a 2-3 sentence summary describing how the PC and $ra registers change when a subroutine is called and when we return from a subroutine.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M93067546

Have any Question?


Related Questions in Computer Engineering

Assignmentsuppose you are a manufacturer of product abc

Assignment Suppose you are a manufacturer of product ABC, which is composed of components A, B, and C. Component A is further composed of parts X and Y. Each time a new product ABC is created, it must be recorded in the ...

Discussion a network-based intrusionimagine you live by

Discussion : A Network-Based Intrusion Imagine you live by yourself on a quiet street. Each day, you leave your house in the morning and drive to work. One day while you are at work, someone breaks into your house by kic ...

Here is a series of address references given as word

Here is a series of address references given as word addresses: 1, 4, 8, 5, 20, 17, 19, 56, 9, 11, 4, 43, 5, 6, 9, 17. Using this references, show the hits and misses and final cache contents for direct-mapped cache with ...

What is the difference between dekkers algorithm and igloo

What is the difference between Dekkers Algorithm and Igloo approach? Please provide examples that can explain this.

Question i you are part of a disaster recovery team charged

Question: I. You are part of a disaster recovery team charged with completing the asset inventory at a small business that primarily sells a small selection of products to the public. 2. Establish a sample hardware asset ...

Subject digital securityimagine a scenario that you go to a

Subject: Digital security Imagine a scenario that you go to a restaurant and pay the meal using your credit card. What communication parties are involved and what information is exchanged in order to complete this transa ...

If we take infinite samples of size n 49 from a population

If we take infinite samples of size n = 49 from a population with a distribution with high kurtosis and standard deviation 7, select the best answer below. * The sampling distribution of the sample means will have a stan ...

1 what would be the purpose for a user to protect a

1. What would be the purpose for a user to protect a file from "read" or "write" access by other users? 2. Is there a reason why it would be safer for administrators to use two different accounts when working with a comp ...

Program in cit is often times advantageous to be able to

*Program in C* It is often times advantageous to be able to transfer data between two arrays. Need a help with program (transfer.c) that add a range (by start index and end index) of numbers from array #1 to array #2 at ...

What are the characteristics of perfect competition and

What are the characteristics of perfect competition, and does is exist in the real world?

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As