![subject](/tpl/images/cats/informatica.png)
Computers and Technology, 30.10.2019 22:31 connor3434
Write a program using the loop instruction with indirect addressing that copies a string from source to target, reversing the character order in the process. use the folling variables: source byte "this is the source string", 0 target byte sizeof source dup('#') insert the following statements immediately after the loop to display the hexadecimal contents of the target string: mov esi, offset target ; offset of variable mov ebx, 1 ; byte format mov ecx, sizeof target ; counter call dumpmem if your program works correctly, it will display the following sequence of hexadecimal bytes: 67 6e 69 72 74 73 20 65 63 72 75 6f 73 20 65 68 74 20 73 69 2073 69 68 54
![ansver](/tpl/images/cats/User.png)
Answers: 3
![](/tpl/images/ask_question.png)
![](/tpl/images/ask_question_mob.png)
Another question on Computers and Technology
![question](/tpl/images/cats/informatica.png)
Computers and Technology, 24.06.2019 13:00
Refer to the figure and match the theorem that supports the statement.1.if chords are =, then arcs are =.if bc = de, then arc bc = arc de2.if arcs are =, then chords are =.if arc bc = arc de, then bc = de3.diameters perpen
Answers: 3
![question](/tpl/images/cats/informatica.png)
Computers and Technology, 24.06.2019 15:50
Andy would like to create a bulleted list. how should he do this? andy should click on the bullet icon or select the bullet option from the menu and then type the list. andy should press the shift key and the 8 key at the beginning of each line of text. andy should type the text and then click on the bullet command. andy should press return and the bullets will automatically
Answers: 2
![question](/tpl/images/cats/informatica.png)
![question](/tpl/images/cats/informatica.png)
Computers and Technology, 25.06.2019 08:00
In researching his history report about the civil war, why is ariq most likely to use secondary data than primary data? secondary data provides a starting point to find primary data. secondary data is easier and less time consuming to find. secondary data is always more reliable and credible. secondary data eliminates the need for other research.
Answers: 1
You know the right answer?
Write a program using the loop instruction with indirect addressing that copies a string from source...
Questions
![question](/tpl/images/cats/fizika.png)
![question](/tpl/images/cats/User.png)
![question](/tpl/images/cats/ekonomika.png)
![question](/tpl/images/cats/mat.png)
![question](/tpl/images/cats/mat.png)
Mathematics, 15.12.2020 16:10
![question](/tpl/images/cats/en.png)
![question](/tpl/images/cats/obshestvoznanie.png)
![question](/tpl/images/cats/en.png)
![question](/tpl/images/cats/ekonomika.png)
![question](/tpl/images/cats/ekonomika.png)
![question](/tpl/images/cats/mat.png)
![question](/tpl/images/cats/istoriya.png)
![question](/tpl/images/cats/mat.png)
Mathematics, 15.12.2020 16:10
![question](/tpl/images/cats/mat.png)
Mathematics, 15.12.2020 16:10
![question](/tpl/images/cats/istoriya.png)
History, 15.12.2020 16:10
![question](/tpl/images/cats/mat.png)
![question](/tpl/images/cats/en.png)
English, 15.12.2020 16:10
![question](/tpl/images/cats/mat.png)
Mathematics, 15.12.2020 16:10
![question](/tpl/images/cats/istoriya.png)
History, 15.12.2020 16:10