In linux/ubuntu, list three actions that would update the change time while leaving other times unchanged.
Q: Develop adequate incident response methods to address the organization's varied risks and…
A:
Q: Exercise #1 Evaluate the following postfix notation of expression • 20 532^* + 30 - • 642-* 50 10 /…
A: For the given postfix expression we are going to evaluate its value using stack. Please refer to the…
Q: Suppose users in a network share a 4 Mbps communication link and each user requires 125 kbps when…
A:
Q: patterns play an important part in the development of software, and how can they be used most…
A: Design patterns are design-level solutions for recurring problems that we software engineers come…
Q: In concurrent programming, what is the impact of the interaction of processes?
A: Concurrent Programming: The term "concurrent programming" refers to the practice of running many…
Q: ou are researching the following wireless security features for your company network: WEP and WPA2…
A: Which combination of wireless security technologies are most appropriate in the enterprise, and why?…
Q: What if the cloud computing revolution influences member collaboration?
A: For businesses, moving to the cloud is no longer an option; instead, it is a need. Cloud…
Q: Distinguish between wide-area and local-area networks in terms of responsibilities, technology, and…
A: LAN: A local area network is a network that connects computers and other devices in a school, lab,…
Q: Is using static routing always a bad idea?
A: Routing Routing is the process of transferring data packets across networks via an inter network.…
Q: In what ways are machine language and assembly language distinct from one another?
A: Introduction: Here we are required to explain in what ways machine language and assembly language…
Q: oud computing affecting colla
A: Introduction: Cloud Computing Affecting Collaboration
Q: Briefly outline the purpose of a digital certificate. You should also describe how it is generated.
A: A digital certificate is a file or an electronic password that employs encryption and public key…
Q: BIG DATA HAS BECOME A PART OF EVERY ORGANIZATION'S INFORMATION TECHNOLOGY SYSTEMS IN TODAY's WORLD.…
A: Given: Big data has become a part of every organization's information technology systems in today's…
Q: Provide me with the Matlab code to swap the second and third rows of the matrix given below, m = 987…
A: Answer the above question are as follows
Q: Do you think that RSA based digital signature can be forged? Justify why or why not
A: The RSA digital signature system uses the RSA principle for signing and verifying the messages. The…
Q: What early use-cases for the unified process model did you build with clients in collaboration? Give…
A: Given: The Integrated Process has many cycles of extending and improving systems. Feedback and…
Q: In what ways are machine language and assembly language distinct from one another?
A:
Q: Draw the Gantt chart, Calculate the Average Turnaround Time AND Average Waiting Time for the…
A: ANSWER:-
Q: Which of the following statements is TRUE about the space complexity of sorting algorithms?
A: 2. The space complexity of any algorithm do not depends on the original order of array. 3. Merge…
Q: Q2\ write an oop program to read and print information about you ? 1 Add file
A: Start Take the input from user Read the input Print the data Stop
Q: When a change is made to the database schema, why is it beneficial for the DBMS to automatically…
A: Database schema: System tables are specific tables that the system employs to regulate data and the…
Q: Exactly what is routing? Differentiate between two common methods of routing.
A: answer is
Q: What are the most often used protocols for routing data? What factors are taken into account by…
A: Protocols for routing data: Exterior routing protocols are used to exchange routes across networks…
Q: How can a local area network's stability and availability be ensured?
A: Start: As used in computing, a local area network (LAN) is a collection of small computers or other…
Q: Encode õevõpov with Huffman coding. a. List all symbols and their probabilities b. Find the Huffman…
A: ANSWER:-
Q: What exactly is the distinction between syntax and semantics.
A: Introduction: Here we are required to explain what exactly is the distinction between syntax and…
Q: Exercise #3 Draw an expression tree corresponding to the following: 4+3x7-5/(3+4)+6
A: We are going to draw an expression tree for the given expression. In an expression tree, root and…
Q: Using the same query: SELECT major FROM student WHERE gender = 'F'; How many clauses are there in…
A: Only one clause mentioned that is Gender = 'F' Only one table is referenced that is Student Only…
Q: What do you mean by "pentesting" in the context of network programming?
A: Pen tests and ethical hacking are two more words to describe penetration testing (also known as…
Q: The OSI layer, its functions, and the protocols that operate at each layer will be discussed in this…
A: In Computer networks OSI layer stands for Open System Inerconnection. It is a architecture…
Q: Given a hard drive with the following characteristics: 1024 B sector 15,000rpm 4 ms average seek…
A: The rotational speed is 15000 rpm That is, 15000 rotation 60 second 1 rotation x…
Q: write a java program to print the mirror image of right angled in x-direction after taking number of…
A: Find:- After receiving a number of rows from the user, write a Java application to produce the…
Q: Despite the fact that the Cloud Computing Movement is still in its early stages, it has had an…
A: overview: In addition to cost savings and increased competitiveness of IT services given to public…
Q: Given the following Binary Tree 1. Write out the Post-Order Traversal output of the above tree 2.…
A: The algorithm for postorder traversal is Algorithm Postorder(tree): Postorder(left-subtree)…
Q: Each Ethernet card has a number assigned to it by the manufacturer. This is called the: a) NIC…
A: Each Ethernet card has a number assigned to it by the manufacturer. This is called the: Answer:…
Q: What if the shift to cloud computing has an impact on teamwork?
A:
Q: 6. Create a function called word_intersection that prompts the user for two English words, and…
A: There are many languages which are used in today's wold. Computer language can be described as a…
Q: Draw the Gantt chart, Calculate the Average Turnaround Time AND Average Waiting Time for the…
A:
Q: When it comes to advanced routing, what does "zone routing protocol" mean in terms of terminology?
A: The Answer is in step-2.
Q: What is deadlock avoidance? How can this be accomplished in the operating system?
A: A deadlock is a situation in which two computer programs sharing the same resource are effectively…
Q: Multiple choice (a) Vending machine is accepting a regular set as input. (b) Vending machine is…
A: Almost all real word programs are used context free set. It gives the syntax of the c++ language. It…
Q: ence on collaboration from the Cloud-Com
A: Introduction: Employees can collaborate on documents and other data types that are stored…
Q: Internet Protocol (IP) and computer networking Congestion control and flow control are often…
A: Internet Protocol: Provide an example of each main kind of memory flashbulb memory and explain how…
Q: Describe how TCP connects, how it controls its flow, and how it handles congestion
A: Lets see how TCP connects and establishes connection:---> Establishing a TCP Connection:--->…
Q: There are a lot of questions about routing, therefore here are some answers: Two popular methods of…
A: Define: Moving from one page to another is known as routing. It may be used to create a Single Page…
Q: A vertex cover of a graph is a set of vertices that includes at least one endpoint of every edge of…
A: Introduction: Vertex cover: It is a set of vertices that includes at least one endpoint of every…
Q: How do you make a step-by-step distribution diaphragm?
A: Given: Diaphragms are horizontal devices that transfer seismic forces to vertical lateral…
Q: What is deadlock avoidance? How can this be accomplished in the operating system?
A: Deadlock: Deadlock is an unwanted condition that blocks the process from acquiring resources held…
Q: Explain how interruptions are crucial to the machine using one practical example.
A:
Q: Cooperation may have been affected by the Cloud Computing Movement, but the degree of that effect…
A: Cloud based infrastructure has gained a lot popularity recently.
Step by step
Solved in 2 steps
- Access Control List (ACL) and Capability Lists are the most common implementations for controlling access to objects in a system. Which of the two methods are used in UNIX/Linux file systems? What simplifications have been made to make the implementation more efficient?From Operating System Concepts By Gagne, Galvin, Silberschatz. 10th edition Chapter 2 Project, implementation has to be in C: This assignment will involve designing two kernel modules: 1. Design a kernel module that creates a /proc file named /proc/jiffies that reports the current value of jiffies when the /proc/jiffies file is read, such as with the command cat /proc/jiffies. Be sure to remove /proc/jiffies when the module is removed. 2. Design a kernel module that creates a proc file named /proc/seconds that reports the number of elapsed seconds since the kernel module was loaded. This will involve using the value of jiffies as well as the HZ rate. When a user enters the command cat /proc/seconds your kernel module will report the number of seconds that have elapsed since the kernel module was first loaded. Be sure to remove /proc/seconds when the module is removed.Linux System ProgrammingCode a C++ program, named processes.cpp that receives one argument, (i.e., argv[1]) upon itsinvocation and searches how many processes whose name is given in argv[1] are running onthe system where your program has been invoked. To be specific, your program shoulddemonstrate the same behavior as:$ ps -A | grep argv[1] | wc -lImplement processes using the following system calls:1. pid_t fork( void ); creates a child process that differs from the parent process only interms of their process IDs.2. int execlp( const char *file, const char *arg, ..., (char *)0 ); replaces the currentprocess image with a new process image that will be loaded from file. The firstargument arg must be the same as file. The last argument is a NULL pointer of type“char *”.3. int pipe( int filedes[2] ); creates a pair of file descriptors (which point to a pipestructure), and places them in the array pointed to by filedes. filedes[0] is for readingdata from the pipe, filedes[1] is for…
- Linux: The complete path and filename for the Debian Package Management list of repositories is...Write a C program which creates a child process to find all txt files in the root directory (i.e., “/") and stores the output in a text file called “all_txt_files.txtť". If the child process execution takes more than t seconds (measured at the parent), the parent should abort the execution of that child. Otherwise, after the child process termination, the parent has to create another child which will count the number of records in all_txt_files.txt and print out the output. The program should not allow the creation of orphan processes. - You need to include the C header file time.h to roughly count the execution time of the child process and play with different values of t so that both cases may happen. Another option may be the alarm system call. - You can use redirection (i.e., “>") to redirect the output of find to a txt file (e.g., find / - name "*. txt" > all_txt_files.txt). It's not a problem if find cannot access some directories. - You can count the number of lines in a txt…Design a program in Python programming language which has the following points. Take input from user a file name with location which is present in client system. Copy the file to the server system with same format. The file can be at any format ( .txt, .jpg, .mp3 etc ). The file received status should be printed on server and sent to client. Use socket programming to perform the task. Paste the code and output snapshot. Server Output: Waiting… Client Output: Enter file name and location to send : d:\r.jpg Sending…. Server Output: Waiting… Receiving… Client Output: Enter file name and location to send : d:\r.jpg Sending…. File Sent to Server. Server Output: Waiting… Receiving… File Received from Client.
- Linux In C++ Using fork() and wait(), write a program where a parent process A creates a child process B, then B creates C, C sleeps for some time, wakes up, and terminates after telling B. B then terminates after signaling A, and finally A terminates.Write the C or C++ program system2 that reads, when being executed, OS commands via the "command line parameter" C/C++ feature, and then executes them. The command line parameters must be legal Unix/Linux commands. Print the number of commands entered. To prepare, read about argc, argv, and envp. Focus is only argc and argv. A sample execution by fictitious user "mike" is: herb$ ./a.out pwd ls whoami argc 4 pwd argv[1] Executing command /Users/mikey 'pwd' = ls argv[2] Executing command 'ls' Applications Contacts Music Pictures familie herb Downloads testl Favorites Library Movies testl.c pix_low_2020 test2 test2.c Desktop Public Documents a.out test.c argv[3] = whoami Executing command mikey 'whoami'Write in g++ Design and implement a simple, interactive shell program that prompts the user for a command, parses the command, and then executes it with a child process. In your solution you are required to use execv(), which means that you will have to read the PATH environment, then search each directory in the PATH for the command file name that appears on the command line.
- C++ PLEASE!! Working on a project that is about word count with MapReduce, need a file manager class to take care of reading all txt file from a directory with giving path. The file manager class need to open the directory with the giving path which the user will input, then open the path and open all the txt files in that directory and break the text into single line and pass it to another class to do mapping. Please help with the file manager class!! Thank you!!A dentist office is currently using paper files to manage all office activities. To make their work easier, the office decided to build a software system to manage those activities instead of using their old paper-way methods. The office patients can take their appointments either by phone or by walking in person to the office lobby. In either way, the receptionist schedules an appointment for the patient with the desired date and time. The system shall not allow scheduling appointments with the same doctor for a duration of less than 30 minutes. Of course, the system shall accept appointments for a specific doctor if the doctor is working on that time. This means that the system shall keep track of each doctor working schedule. The office receptionist enters doctors working schedule in the form of working days for each week. For example, a doctor work schedule can be on Monday, Wednesday, and Thursday from 9:00 am until 4:00 pm for all weeks until June 01, 2021. Now, the office…Assignment #3: Unix shell with redirects and pipes OCELOT UNIX OS **PLEASE INCLUDE PIPING, ANSWERS WITHOUT IT ARE NOT VERY HELPFUL SINCE THEY DONT INCLUDE IT** The purpose of this assignment is to learn to develop multi-process programs. You are expected to extend the myshell.c program and add pipelines and I/O redirections. In particular, your shell program should recognize the following: > - Redirect standard output from a command to a file. Note: if the file already exists, it will be erased and overwritten without warning. For example, COP4338$ ls > 1COP4338$ sort myshell.c > 2 Note that you're not supposed to implement the Unix commands (ls, sort, ...). You do need to implement the shell that invoke these commands and you need to "wire" up the standard input and output so that they "chain" up as expected. >> - Append standard output from a command to a file if the file exists; if the file does not exist, create one. For example, COP4338$ sort myshell.c >>…