To understand this question, you need to understand the concepts of User mode and system/privileged mode of operation. In an operating system, there are (generally) two modes of operation: user mode...
Type: Posts; User: sk_seeker; Keyword(s):
To understand this question, you need to understand the concepts of User mode and system/privileged mode of operation. In an operating system, there are (generally) two modes of operation: user mode...
You mention operating systems. So, I will assume synchronous and asynchronous system calls. Let us take a non-CS example.
I want to buy some tablet and so I go to the medical store. I give the...
The question is not clear to me. So, let me state my interpretation and try to answer that.
RAM and ROM requirements come into the picture when dealing with an embedded system. This is where you...
Your question is not clearly posted. As I understand it, there is an array of 100, with each array element being a linked list. The hashing function takes a work, sums up the ascii values of the...
Try Brainbench. It may be a paid service though.
A pointer size is always fixed: either as the word size on the machine OR by the compiler. So, why not use an int * to access all data types?? Interesting question actually. Let me give some reasons....
The factors we can compare two pointers on are:
+ size of pointers
+ pointer arithmetic
+ performance
Let us assume that the size of an int is 4 bytes and float is 8 bytes.
Size of a...
Loading can mean many things in computer science. Are you refering to linkers/loaders OR something else?? A better phrased question, with some context, may get you an answer.
This is not right. Please read my post to understand the issues.
You are right.
A practical example is listed below.
Let us say that there are two types of blocks.
blk_type == A; dependent data is an integer
blk_type == B; dependent data is a char array...
I am not sure what the ISO standard says about this. But, this is what I know.
1. Depends on the bitness of the program of reference
On a 64bit architecture with a 64bit OS, we can have both...
Question is a bit vague: so treat the answer with a grain of salt.
It depends on the expression in #ifdef EXPR.
For example, if it is #ifdef __KERNEL, then standard user mode functions will...
If you have programmed in C, you should know most of the questions and answers. Some of the general debugging areas to test a candidate are:
+ What is a memory leak?? How do you debug it??
+ How do...
The answers to the latest questions you had asked can be easily obtained from any book or the internet. The impression it gives out is that you are not putting in an effort first. So, maybe next time...
Read about the evaluation of Polish Expressions.
Not quite. Lets take the same example that you initially quoted: 984506475.
Assuming an infinite size TLB, how many tlb hits will we have?? Since an infinite TLB size implies that we never have...
You haven't the foggiest idea huh?? Lets try and dispel the fog bit by bit.
What is a cache??
A mechanism where we maintain a copy of the data in a faster area as compared to the real data that...
There are many ways this question can be answered depending on how much back in time you want to go. So, I guess a better way to ask the question might be: what are the recent improvements in UNIX...
you have to be more clearer on what you want to learn about. Unix/linux is a very general and wide classification. Let us classify it a bit further. I will quote book examples to give you a feel for...
symbolic/soft links file systems usually provide a means for grouping files together i.e. All the files in a single group have something common among them. For example, in unix world, files can...
Processes and threads can be compared with three major design points: protection, parallelism and sharing.
A process abstraction provides implicit protection against other processes, but makes...
Let me give you a simple method to start becoming good in using pointers.
Make it a habit of never using global variables. Always pass arguments by reference (by pointer) and see how fast you...
This is wrong. Read my earlier post to get an idea or read a Unix Internals book like the one authored by Uresh Vahalia or some other book like that. Specifically, concentrate on the concept of inode...
This is a buggy program. Here is why:
1.
no = malloc(sizeof(char*)); // 4 bytes of characters
Memory space of 4 bytes (32 bit machine) is being allocated by malloc.
Let us say that the...
The expression inside the while loop is: *b++ = *a++.
Let us simplify this expression into two steps:
- *b = *a
- b++; a++
Since b and a are pointing to strings as per your email,
- *b = *a...