Translate c++ code into mips assembly:
int main()
{
cout << "Numbers:" << endl;
int x[] = {18, 12, 6, 500, 54, 3, 2, 122};
int i;
for (i=0; i<8; i++)
{
cout << x[i] << endl;
}
return 0;
}
below is my code:
.data
str1: .ascii "Numbers:" str2:
.ascii "\n" x: .word 18,12,6,500,54,3,2,122
.text
.global main
main:
la $a0, str1
ori $v0, $0, 1
syscall
Exit:
ori $v0, $0, 10
syscall
In: Computer Science
The executive team of a Multinational Corporation (MNC) is interested in expanding into a host country. You have been hired to conduct a SWOT analysis to see if the project will be successful. In your post, state the industry, host country, fictional company name, and the structure of the venture, and conduct a SWOT analysis of the endeavor. The SWOT should be a visual such as a table or a chart with a 100- to 200-word analysis. Support your answer with at least one credible, recent source in addition to the course textbook. Do not write the SWOT as a narrative (first person); instead write the post in third person.
In: Operations Management
Choose a country or location.
i) Prepare an exhaustive list of positive and negative impacts of globalisation on ageing population in a location of your choice. Note: Part i needs a list!
ii) In 150 words, briefly summarize some challenges of creating a 'healthy public policy', targeted to to address negative impacts of globalisation on the ageing population listed in Part i.
Note: You can choose one or more negative impacts listed in Part i and focus on them for Part ii.
Word limit = Part i is an exhaustive list
Part ii : 150 words
In: Economics
e.Consider a codeword C=[110110010010110 ] . Is this a codeword of the above system? Provide suitable justification for your answer.
In: Electrical Engineering
Business Ethics
Briefly discuss the importance, purpose and difference between Code of Ethics and Code of Conduct. Address the issues in creating of Code of Ethics with reference to procedures in implementation of it in an Organization in Oman.
Instructions:
· Word limits are minimum 350 and maximum 500 words.
· All content should be write in your own words. No Copy and paste allowed.
· Plagiarism should less than 20%.
· Students should do individually.
· Last date of submission is on Moodle by June 19, 2020.
· Please clearly mention your name, ID, and subject name in the assignment on the first page.
In: Economics
For a particular DRAM design the cell capacitance is C,=50fF, Vpp=5 V and V=1.4 V. Each cell represents a capacitive load on the bit line of 2fF. The sense amplifier and other circuitry attached to the bit line has a 20fF. What is the maximum number of cells that can be attached to a bit line while ensuring a minimum bit line signal of 0.1 V? How many bits of row addressing can be used? If the sense amplifier gain is increased by a factor of 5 how many word line address bits can be accommodated.
In: Electrical Engineering
Write a business report (addressed to your supervisor) focused on how your company (Samsung) should use analytical models such as break-even and forecasting to make strategic business decisions. Provide examples that are not only specific to your current employer, but that also demonstrate your ability to create and apply these analytical models. Support your views with appropriate evidence. Your answer should be at least 500 words in length and presented in a professional manner (proper spelling, grammar, word usage, thoughts grouped by paragraph, etc.) with sources properly cited using APA style.
In: Operations Management
Write a complete shell script that first asks the user to enter a URL. The script should read the URL into a variable named url.
The shell script should then retrieve the file associated with the
URL by using the curl command.
The output of the curl command should be
redirected to a file named
html_file.
The shell script should then use the grep command to search the file named html_file for the word manhattan.
Finally, the shell script should make the file named
html_file readable to everyone by issuing the
appropriate chmod command to give "o" (others)
read permission on the file.
In: Computer Science
3. Many private security companies perform tasks similar to public law enforcement, and, because of that, much of the training of private security personnel is comparable to that of public law enforcement. In a 500-word response, compare and contrast the similarities and differences between the two entities. While much of their initial training may be similar, ongoing training for each entity is different. Evaluate the ongoing training of private security compared to public law enforcement. Critique three issues that cause shortfalls in private security and suggest ways these companies can overcome these shortfalls.
In: Operations Management
C++ needed
Create a loop which gives the player instructions on what to input. Then read input from the player. The input will be either one of three options:
• If the user enters the word “answer” or some other string you choose to indicate the player is ready to end the game and guess. In this case, output the hidden rule.
• Three numbers separated by spaces. Let’s call a trio of numbers and the corresponding output a Guess. Once a user makes a Guess. If the user enters a sequence that follows the rules, output “Yes!” Otherwise output “No.”
• Treat any other entry as an exception.
In: Computer Science