Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

TRUE FALSE C Programming and LINUX __1. In C, NULL is 0. ____2. In Linux, command chmod 111 c.txt is to make the file c.txt

TRUE FALSE C Programming and LINUX

__1. In C, NULL is 0.

____2. In Linux, command chmod 111 c.txt is to make the file c.txt read-only.

____3. In a C program, if a string s is defined as

char s[]="hello world!";

then strlen(s) and sizeof(s) return the same value.

____4. Regular express [1-5] is the same as [12345].

____5. Regular express [eo$] is to match letter o or letter e at the end of a line.

____6. In a C program with the main function defined as int main(int argc, char argv[][]), the argv parameter is a two-dimensional array of characters.

____7. Statement int * a, b; is to define two pointers a and b.

____8. For two variables a and b created as follows unsigned int a=3, b=5, the value of a|b is 1.

____9. For two variables a and b created as follows unsigned int a=3, b=5, the value of b>>a is 1.

____ 10. For variables a created as follows char *a=abcdefgh; the value of a[3] is 'c'.

11 Different Linux Distribution may use the same Linux kernel

12 in Linux a program can call open() to FIFO

13 In Linux a program can maps a part of a file to its virtual space with mmap().

14. in a program with multiple thread sychronization is needed to prevent race condition

15. in C a two dimentional array is actully an array of pointers each of which points to a one dimentional array.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Students also viewed these Databases questions

Question

3. Understand the use of the power of attorney.

Answered: 1 week ago

Question

8-6 Who poses the biggest security threat: insiders or outsiders?

Answered: 1 week ago