what is wrong here?
Q: In light of the internet and globalisation, is there more or less social cohesion? What can you do…
A: Globalization: There is a more complex and intricate web of international economic linkages. While…
Q: How can you tell the difference between real and bogus content on social media?
A: Definition: Fake news is deceptive or false information that masquerades as genuine news.…
Q: What are the primary benefits of data mining?
A: There are various benefits to data mining, including the following: Data mining is a technique for…
Q: What does "phishing" mean to you?
A: Introduction What does "phishing" mean to you?
Q: #include using namespace std; int main() { int x = 1; while (x < 10) { if (x == 5) break; cout<<x<<…
A: #include <iostream> using namespace std; int main(){ int x = 1; while(x < 10){…
Q: What purpose do coding norms serve? Examine the Java programming language's coding principles.
A: Motivation behind coding norms - 1) Coding standard gives an appropriate appearance to the code…
Q: Logical communication requests from the _____ are translated into hardware-specific actions by the…
A: Logical communication requests from the data link layer are translated into hardware-specific…
Q: What exactly is a Web server, and what function does it play in the World Wide Web are two important…
A: Web servers are computers that perform various web-based tasks. For example, web hosting, virtual…
Q: Efficacy, efficiency, and effectiveness are the three characteristics that a successful network must…
A: Overview: Efficient performance is defined as the ability to execute a task with the least amount of…
Q: Defintion of Inverse ARP?
A: Inverse ARP: Inverse ARP is a protocol for resolving addresses in the reverse direction. Inverse ARP…
Q: Q3. Apply the clipping tests for following lines using Cohen Sutherland line clipping algorithm.
A:
Q: - Let's assume that a system can handle 2,000 users. a UNIX security system that permits 1,990 users…
A: In a complex system, change is unavoidable for the following reasons: Updates to software are…
Q: Define the computer environment and describe THREE unique computer environments that may be…
A: Intro The computer environment should be distinguished to lay out the extent of the product item's…
Q: Which network architecture is the most appropriate for a school? Additionally, what kind of…
A: Network Architecture: The network architecture is the best fit for a school's requirements. A local…
Q: When a physical layer data transmission frequency rises, what happens to the period?
A: Given: information that has been suppliedIn the context of data transmission at the physical layer,…
Q: ete a
A: Introduction: A file is a container for storing data in a computer system. Computer files have many…
Q: What are the similarities between a reference and a pointer?
A: Introduction: Here we are required to explain what are the similarities between a reference and a…
Q: Consider what critical functions your operating system would offer if you were creating one. Provide…
A: A computer system's operating system is its backbone. The operating system should have a variety of…
Q: It's important to understand the relationship between cohesion and coupling in software design and…
A: Cohesion is concerned with interconnection:CouplingIn software design, the "degree of reliance"…
Q: Please explain the shmat system function to me, including what a shared memory file is, how a…
A: System Function: The C/C++ standard library includes the system() function. It is used to send…
Q: What use does HTTP serve in network applications? What further components are required to create a…
A: Hypertext Transfer Protocol: HTTP (hypertext transfer protocol) is a method of encoding and…
Q: Define a function named get_unique_sorted (list1, list2) that takes two integer lists as parameters.…
A: As there is no programming language mentioned, we are using Python here The complete Python code is…
Q: As software engineers, we should ask ourselves this question. How would you suggest improving the…
A: In order to: To list the four most significant traits. Software development has four key…
Q: 1) Suppose hashing is being done by using open addressing with linear probing. The hash function to…
A:
Q: technologies ar
A: Wireless communication (or simply wireless, when the setting allows) is the transfer of information…
Q: Expansion cards may be used to improve the computational power of a microcomputer.
A: Microcomputer: An expansion card (also known as an expansion board, adapter card, or accessory card)…
Q: What are the long-term implications of the cloud computing revolution?
A: In the below step I can explain implications of cloud computing.
Q: What exactly is a (computer) cookie? What ethical and privacy concerns do cookies raise?
A: Introduction: What exactly is a (computer) cookie? What ethical and privacy concerns do cookies…
Q: The actions below are necessary if you delete a file accidently and desire to recover it.
A: Given: The steps to recover a deleted file on Windows 10 are shown below as an example.
Q: What is the technique for configuring a piece of software? What are your thoughts on configuration…
A: Intro Start: Software configuration management (SCM or S/W CM) is a programmer's profession that…
Q: What is the difference between a hard disk drive and a solid-state drive? Are the two drives…
A: According to the information given;- We have to define the difference between a hard disk drive and…
Q: What three characteristics must a network possess in order to be useful and efficient? There was a…
A: As indicated by the inquiry network is that when the capacity do appropriately and effectively for…
Q: When it comes to building Big Data Clusters, cloud computing has already surpassed even conventional…
A: Big Data Clusters: A SQL Server big data cluster has an HDFS storage pool. This may be used to…
Q: Which phase of the software development life cycle includes creating user stories? Planning…
A: Software Development Life Cycle(SDLC) From planning to maintenance, the software development life…
Q: What kinds of data structures are there?
A: Given: When we think about data structures, we usually think of four types: Arrays and lists are…
Q: So, what exactly do you mean by "scalability in the cloud?" It's one of the key advantages of cloud…
A: Cloud scalability in cloud computing refers to the ability to increase or decrease IT resources as…
Q: Which network topologies do you believe are viable and which are the most effective?
A: Introduction: A Network Topology is the configuration of computer systems or network devices about…
Q: As a result of their inherent properties, wireless networks face a variety of issues. Three of these…
A: Introduction: In a company setting, Wi-Fi is an important component of your IT infrastructure.…
Q: When it comes to software development, there are several models to choose from. a. Glassboxing \sb.…
A: Software developer: The majority of software developers have a bachelor's degree in software…
Q: I'm attempting to use Matlab's 'filtfilt' function to conduct zero phase filtering on my data. The…
A: Given: y = filtfilt filtfilt filtfilt filtfilt filtfilt filtfilt filtfilt (b,a,x)filtfilt = filtfilt…
Q: Identify and explain three "needs" that 3D printing may meet for you. How would you address this…
A: Need for 3D printing are as follows: The advantages of using 3D printing for various disaster…
Q: How can a computer multitask on a single machine?
A: What role does a single machine play: It provides for arbitrary precedence constraints on jobs in…
Q: 9) Using the graph below, starting at node "A", find the following traversals using alphabetical…
A: The question is to perform breadth first search and depth first search for the given graph starting…
Q: Resource requests may be made by those who have reached a halt owing to the finding of deadlocks in…
A: Intro For the purpose of the stalemate argument, a system may be represented as a collection of…
Q: Do you have any thoughts on the importance of data quality in relation to data warehouses? What are…
A: Recommendations: In a letter of recommendation, the name of the person being suggested should be…
Q: In what ways are UBUNTU, Kali, and Fedora Linux different from each other?
A: Given: Ubuntu is a comprehensive Linux operating system that is both community and technical…
Q: points) 1. Please describe the process of developing test cases using decision table-based testing.
A: Given: Decision table testing is a software testing method for examining a system's behavior for…
Q: er the following functions by
A: Solution - In the given question, we have to arrange the given functions according to their order of…
Q: What causes bugs? How does a bug get into software? Give a few examples.
A: Given: Bugs occur when a software developer makes a mistake while developing it. Because the phases…
Q: What problems was early Internet research supposed to address? What were the solutions to these…
A: Introduction: The internet, the most advanced and established technology since the revolution of…
what is wrong here?
Step by step
Solved in 4 steps with 2 images
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
// Driver code
int main()
{
char name[100];
int PID;
printf("Enter the user name: ");
scanf("%s",name);
PID = fork();
if(PID == 0){
printf("\n%d This is child process %s",PID,name);
}
else{
printf("%d This is parent process %s\n",PID,name);
}
exit(0);
return 0;
} It does let me enter the number of fork but only 1 character can be enter in the username. If I type multiple character to username It does not let me enter the number of fork. I use ubuntu.
The command that I used in ubuntu
>gedit prog.c
(CODE FILE)
>cc -c prog.c
>cc -o prog prog.c
>./prog
Correct me please
- Problem 1. In C/C++ programming language, write down the lines of codes (and figure) to show -(a) assignment-by-sharing(b) dangling referenceProblem 2. Show the correspondingcodecontents in memory for themainmethod and draw thestackcontents while themainmethod starts execution and reaches at line 12. 1 #include<iostream> 2 using namespace std ; 3 int main () 4 { 5 int i ; 6 short j ; 7 char k ; 8 i = 30; 9 j = i ; 10 k = ( char ) j ; 11 i = k ; 12 13 return 0; 14 } Problem 3. (a) In C++, write down themainmethod including aforloop. The body of theforloop includes the followings :anifconditionan array (of any type & of any size)a structure variable (with at least two variables of any type) (b) Show the correspondingcodecontents in memory for themainmethod and drawthestackcontents while themainmethod starts execution and reaches at theline prior to return from yourmainmethod of Problem 3(a). (c) Create a symbol table structure (dynamic scoping) at the line before…for c++ Instructions Two stacks of the same type are the same if they have the same number of elements and their elements at the corresponding positions are the same. Overload the relational operator == for the class stackType that returns true if two stacks of the same type are the same; it returns false otherwise. Also, write the definition of the function template to overload this operator. Write a program to test the various overloaded operators and functions of class stackType.Please provide code in C language. I need code for staticsemantic.c and staticsemantic.h Please provide code according to local option: You may process all variables using local scope rules, or process variables before program as global and all other variables as local. Software support Implement a stack adapter according to the following Stack item type is String or whatever was your identifier token instance - the stack will process identifiers. You may also store line number or the entire token for more detailed error messaging You can assume no more than 100 items in a program and generate stack overflow if more Interface void push(String); just push the argument on the stack void pop(void); just remove int find(String); the exact interface may change, see below find the first occurrence of the argument on the stack, starting from the top and going down to the bottom of the stack return the distance from the TOS (top of stack) where the item was found (0 if at TOS) or -1 if not…
- C++ Code, Function below is a member function of Sequence class: template <class T> T& Sequence <T> ::entry(int pos) { if (pos < 0 || pos >= size) { cout << "Invalid, please check!\n"; T x; return x; } NodeRecord* current = head; for (int a = 0; a < pos; a++) { current = current->next; } return current->value; }// END entry For the function above, a. Draw the code diagrams with labels for statements and branches. b. Provide test cases for statement, branch, and path coverages (properly identifying all the test cases with correct labels and the respective function).Provide full C++ Code: Your code must have the following three files: Playlist.hpp - Class declaration for a linked list of Nodes (very similar to lab 08 but with some changes to methods, as described below) with following private data members: private:Node* first;Node* last;int size; Playlist.cpp - Class definition main.cpp - main() function Checkpoint A Build a playlist (of songs) by reading data members of several songs from a file and printing them. Implement the following methods: PlayList(); //Default constructorPlayList(string filename); //Parameterized constructor that reads data members of song from a file and builds the PlayList~PlayList(); //Deletes all nodes of the linked listbool InsertNodeLast(Node *myNewNode); //Inserts myNewNode at the end of the linked listbool InsertNodeFirst(Node *myNewNode); //Inserts myNewNode at the start of the linked listbool DeleteFirst(); //Deletes the first node of the linked listint Size() const { return size; }friend ostream&…1.Put the code into a complete C program int i = 0; void func(char *str1, char *str2) { char *ptr = malloc(sizeof(int)); char buf[1024]; int j; static int y; } 2. Compile the program using gcc in Linux. 3. Use gdb to debug and print the addresses of variables in the code. 4. Draw the stack frame of func() and point out the addresses of related variables.
- IntroductionWrite a program that simulates managing jobs sent to a printer. The jobs are stored in a linked-list of pointers. Print jobs arrive at time specified by month/day/year plus hour/minute. The jobs are printed on a first come first serve basis. Here is the rest of the specification.Your solutionWrite a C++ program that has the following and does the following:• Write a struct that will represent a node in the linked list (This struct should be declared outside the LinkedLisst class). The data members of the struct should be:a) sequence number: type integerb) document_name: type stringc) month: type integerd) day: type integere) year: type integerf) hour: type integerg) minute: type integerh) owner: type stringi) service_required: type stringj) next: pointer to a node • Write a class whose data members are a head pointer to a node and a pointer to the last node. DO NOT USE C++11 STL containers such as list, dequeuer, queue, stack. The head will represent the start of a linked…C++ Code, Function below is not a member function of Sequence class: void subtractX(Sequence<int>& s, int& x) //! updates s //! clears x //! ensures: s = #s with all corresponding values of s reduced by value in #x { for (int k = 0, z = s.length(); k < z; k++) { // s1.1, s1.2, s1.3, s1.4 int y; s.remove(k, y); // s2 y -= x; // s3 s.add(k, y); // s4 } // end for x.clear(); // s5 } // END subtractX For the function above, a. Draw the code diagrams with labels for statements and branches. b. Provide test cases for statement, branch, and path coverages (properly identifying all the test cases with correct labels and the respective function).EXPLAIN THIS C++ PROGRAM STEP BY STEP WITH LOGIC #include<iostream>using namespace std;class Circle{private: //To Store center (x,y) and radius r double x,y,r; static int number_of_circles;public: //parameterized constructor Circle(double x1,double y1,double r1){ x=x1; y=y1; r=r1; update_number_of_circles(); } //Copy constructor Circle(Circle &c){ x=c.x; y=c.y; r=c.r; update_number_of_circles(); } //member function to display the values x,y,r void display(){ cout<<"Center : ("<<x<<" , "<<y<<") Radius : "<<r<<endl; } static void update_number_of_circles(){ number_of_circles++; } static int get_number_of_circles(){ return number_of_circles; } friend void updateCircle(double x,double y,double r,Circle &c){ c.x=x; c.y=y; c.r=r; }};int Circle::number_of_circles=0;int main(){…
- 1. Put the following code into a complete C program: int i = 0; void func(char *str1, char *str2) { char *ptr = malloc(sizeof(int)); char buf[1024]; int j; static int y; } 2. Compile the program using gcc in Linux. 3. Use gdb to debug and print the addresses of variables in the code. 4. Draw the stack frame of func() and point out the addresses of related variables. 5. Document your steps for each questionfor c++ need three files Dynlntstack, Dynlntqueue, and cpp file use those file i uploaded just creat cpp file please type the code so i can copy Error Testing The DynIntStack and DynIntQueue classes shown in this chapter are abstract data types using a dynamic stack and dynamic queue, respectively. The classes do not cur- rently test for memory allocation errors. Modify the classes so they determine whether new nodes cannot be created by handling the bad_alloc exception. here is the extention.h file please use it #ifndef DYNINTQUEUE_H #define DYNINTQUEUE_H class DynIntQueue { private: // Structure for the queue nodes struct QueueNode { int value; // Value in a node QueueNode *next; // Pointer to the next node }; QueueNode *front; // The front of the queue QueueNode *rear; // The rear of the queue int numItems; // Number of items in the queue public: // Constructor DynIntQueue(); // Destructor ~DynIntQueue(); //…IN c++ please ; apply_Irvine_libs.asm - A simple test program calling various Irvine library procedures,; code base modified from demo program AddTwo.asm ; include the Irvine's libraryINCLUDE Irvine32.inc .386.model flat,stdcall.stack 4096ExitProcess proto,dwExitCode:dword .data; strings(texts) for promptsprompt_1st_int BYTE "Please enter the first integer: ",0prompt_2nd_int BYTE "Please enter the second integer: ",0prompt_text_color BYTE "Please pick the text color (1=blue, 2=green, 4=red, or any number from 0-15): ",0prompt_proverb BYTE "Please teach me a proverb: ",0response_str BYTE "The proverb I just learned: ", 0 ; strings(texts) for output labels/descriptionsdec_sum_str BYTE "The sum in DEC is: ",0hex_sum_str BYTE "The sum in HEX is: ",0memory_dump_str BYTE "Memory Dump with operand_1, _2, and sum: ",0 ; variables definitionsoperand_1 SDWORD ?operand_2 SDWORD ?sum SDWORD ?color_code DWORD ?aString BYTE 80 DUP(0), 0 .codemain proc ;prompt the 1st number input mov edx,…