Highlights
Software
Assembly language is to be used to decode the secret message. You will be provided with a unique 1024 element array under separate email. You will also be provided with the method to decode the secret message in words and descriptions. This information is sufficient to crack the coded matrix. Luckily, you can just paste this huge matrix into your own assembly language file.
Methodology
Each array is unique and has its own decode method as well as a unique secret message. You are given this task in great secrecy and working in groups is not permitted. You are, of course, allowed to ask questions and seek advice from the professor.
Think of an overall approach to solving the problem and then try to formulate it into a working flowchart. Then split off the tasks of the overall working solution into subroutines using the knowledge you gained this semester.
Use breakpoints to your advantage while troubleshooting. Create subroutines to make your coding more manageable and modular. Creating breakpoints before and after subroutines allows you to “see” if the subroutine is doing its job based on the inputs and outputs you have defined.
Utilize your programming laminate to ease the transition between the flowchart and the actualization of the assembly code and syntax.
The following requirements are necessary for this project:
Commenting
a. Each line of assembly language must be commented
b. The main comment block at the top of the code is required
i. It must contain your name, date, and purpose of the project
ii. It must be descriptive enough to convey this information to someone other than yourself
c. Each subroutine / ISR must also have a comment block
i. It must describe the subroutines purpose
ii. It must define its required inputs and outputs
Coding & Related Requirements (continued)
1. Your algorithm must contain a “Software Interrupt”
a. This SWI should be used as the key routine that does the “decoding” of your matrix
i. It should be called each time a value is needed from the main array
ii. It is up to you on how to create the code for this routine but use it to your advantage. Recall that using the SWI removes the burden of saving and restoring registers (unlike a subroutine).
2. You may use as many or few subroutines needed
b. This is up to you and your algorithm, but think of:
i. Using subroutines breaks up tasks
ii. Using subroutines enables modularization of code
iii. You may have a subroutine from a previous lab that can be used
3. Your code must compile the secret message into an array called ‘message’
c. All secret messages are no larger than 20 characters (important)
d. Define this array in the variable area
e. When submitting the report, a screen capture of your array is required which clearly shows the secret message.
This IT Assignment has been solved by our IT Experts at My Uni Paper. Our Assignment Writing Experts are efficient to provide a fresh solution to this question. We are serving more than 10000+ Students in Australia, UK & US by helping them to score HD in their academics. Our Experts are well trained to follow all marking rubrics & referencing style.
Be it a used or new solution, the quality of the work submitted by our assignment experts remains unhampered. You may continue to expect the same or even better quality with the used and new assignment solution files respectively. There’s one thing to be noticed that you could choose one between the two and acquire an HD either way. You could choose a new assignment solution file to get yourself an exclusive, plagiarism (with free Turnitin file), expert quality assignment or order an old solution file that was considered worthy of the highest distinction.
© Copyright 2026 My Uni Papers – Student Hustle Made Hassle Free. All rights reserved.