Module 3 questions from LAB
.docx
keyboard_arrow_up
School
Southern New Hampshire University *
*We aren’t endorsed by this school
Course
360
Subject
Computer Science
Date
Jun 27, 2024
Type
docx
Pages
1
Uploaded by ChiefRainHamster28
Jorge Torres SNHU CS350 Emerging Sys Arch & Tech Module 3 Milestone 2
How does the macro UART_DATA_BINARY impact the UART? It initialized at 0 and the message would mean the data is not processed and this then prevents data processing during read write steps.
How does the macro UART_RETURN_FULL impact the UART? It unblocks or sends callbacks when the buffer is full.
What driver call would you use to write 10 characters out of the UART? CONFIG_TI_DIRVERS_UART_COUNT
What does the driver call to turn off LED 0? CONFIG_GPIO_LED_0
What is the UART baud rate?
115200
Discover more documents: Sign up today!
Unlock a world of knowledge! Explore tailored content for a richer learning experience. Here's what you'll get:
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Related Questions
The standard library function int fseek(FILE *fp, long offset, int origin) is identical to Iseek except that fp is a file pointer instead of a file descriptor and the return value is an int status, not a position. Write fseek. Make sure that your fseek coordinates properly with the buffering done for the other functions of the library.
arrow_forward
142.
The subsystem responsible for the allocation of buffer space is called as _______
a.
Buffer allocator
b.
Buffer manager
c.
Buffer enhancer
d.
Buffer intermediary
arrow_forward
5
arrow_forward
Instructions
Your job is to write a program to encrypt outgoing messages and decrypt incoming messages using a Vigenere Cypher.
In this assignment, you will parse a string of words from a file into tokens using the strtok_s command with pointers and then use the Vigenere Cypher algorithm to encrypt and decrypt the parsed words.
Before you can perform any encryption/decryption activities, the first step is to read in messages from a file and parse the messages into individual words.
The Program: Setting up classes and understanding tokenization
The first step in encrypting/decrypting messages is to parse the messages into words before applying the encryption/decryption algorithms to them. This parsing process is called “tokenization.”
Read the contents of a file into this array using the getline command.
The objective of this assignment is to demonstrate the use of pointers in a program utilizing c-strings and tokenization. The use of pointers is foundational in C++. This…
arrow_forward
Problem
Write code that when executed in PowerShell, will satisfy the following requirements:
Display the contents of the c:\program files directory recursively.
• Include only the name, last write time, and length in the output.
• Pipe the result into a command that will send the output to an interactive table in a separate window.
• Include an error action that would continue without displaying any errors.
• Use only one line to solve the problem.
●
Solution
PS C:\>
Question ID: na-2101-0119-8212
arrow_forward
Q1. One of the major tasks of operating system is to maintain the recently accessed files. There are many algorithms are available to keep the index of the file in a sequence they are accessed, out of which the most common is Last In First Out algorithm. If you are asked to write program to implement that which data structure would you prefer? Why?
arrow_forward
2.3 Describe the defences against buffer overflows that can be implemented when running programs.
arrow_forward
Describe the format of a read buffer, along with the code for the rio_readinitb function that initializes it.
arrow_forward
A file whose file descriptor is fd contains the following sequence of bytes: 3, 1, 4, 1, 5,9, 2, 6, 5, 3, 5. The following system calls are made:lseek(fd, 3, SEEK_SET);read(fd, &buffer, 4);
where the lseek call makes a seek to byte 3 of the file. What does buffer contain after the read has completed?
I guess the answer is 1,5,9,2, but I'm not sure. Please tell me the detailed steps ,thanks
arrow_forward
The term for safety time added to chains other than the critical chain is: Feeding buffer, first (also known as feeding buffering).B. project buffer serves as a stand-in for C. path buffer, a kind of buffer that holds a file's path.The crucial buffer, in D
arrow_forward
IOT multithreading
What is HandleGet() method function?a) Current buffer state, with changingb) Current buffer state, without changingc) Previous buffer state, with changingd) Previous buffer state, without changing
arrow_forward
The ReadString procedure reads a string from the keyboard, stopping when the user presses the Enter key. Pass the offset of a buffer in EDX and set ECX to the maximum number of characters the user can enter, plus 1 (to save space for the terminating null byte). The procedure returns the count of the number of characters typed by the user in EAX. Sample:
.data
buffer BYTE 21 DUP(0) ; input buffer
byteCount DWORD ? ; holds counter
remrk byte “Enter a string: “,0
.code
main proc
mov edx,OFFSET buffer ; point to the buffer
mov ecx,SIZEOF buffer ; specify max characters
call ReadString ; input the string
mov byteCount,eax ; number of characters
ReadString automatically inserts a null terminator in memory at the end of the string. The following is a hexadecimal and ASCII dump of the first 8 bytes of buffer after the user has entered the string “ABCDEFG”
Question: Reverse a string but the string from a user using ReadString procedure. Please comment…
arrow_forward
Make a distinction between file storage structure and structure storage structure.
arrow_forward
Implementation of a Disk-based Buffer Pool
A buffer pool is an area of main memory that has been allocated for the purpose of caching datablocks as they are read from disk. The main purpose of a buffer pool is to minimize disk I/O.Tasks: Implement a disk-based buffer pool application based on the below three buffer poolreplacement schemes: FIFO (first in, first out), LRU (least recently used), and LFU (Leastfrequently used) buffer pool replacement strategies.FIFO (First In, First Out): the oldest data block in the buffer pool is replaced.LRU (Least Recently Used): the least recently accessed data block in the buffer pool is replaced.LFU (Least Frequently Used): the least frequently accessed data block in the buffer pool isreplaced.Initially, the buffer pool is free. Disk blocks are numbered consecutively from the beginning ofthe file with the first block numbered as 0. When I execute your program,First, it asks the user to input the following parameters:o ?: number of blocks in the…
arrow_forward
The redo log buffer and Shared pool are elements of?
a) PGA
b) Buffer cache
c) PGA and Buffer cache
d) SGA
arrow_forward
In C programming, write a method int ksyscall_proc_get_name(char *name).
*Copies the current process name to the buffer provided
* char *name - pointer to the buffer to copy the name.
If there is an error return -1, if success return 0.
arrow_forward
A file whose file descriptor is fd contains the following sequence of bytes 3,1,4,1,5,9,2,6,5,3,5
Lseek (fd,3,SEEK_SET);
read(fd,&buffer,4);
Where the lseek call makes a seek to byte 3 of the file .what does buffer contain after the read has completed.
arrow_forward
B10 qwetion only selct mcq ans b8 explain.in detail
arrow_forward
Python script:
Create a python script that will automate importing argument data from excel to test out an application. The python script needs to check that the file is .xslx extension and not empty. The python script will need to call multiple part file rest call for service to import data. The python script needs to accept an argument from a user for the file to be imported. Program needs to accept file from user as an absolute or relative path, or the name of the file if in same path directory.
arrow_forward
SEE MORE QUESTIONS
Recommended textbooks for you
Np Ms Office 365/Excel 2016 I Ntermed
Computer Science
ISBN:9781337508841
Author:Carey
Publisher:Cengage
Related Questions
- The standard library function int fseek(FILE *fp, long offset, int origin) is identical to Iseek except that fp is a file pointer instead of a file descriptor and the return value is an int status, not a position. Write fseek. Make sure that your fseek coordinates properly with the buffering done for the other functions of the library.arrow_forward142. The subsystem responsible for the allocation of buffer space is called as _______ a. Buffer allocator b. Buffer manager c. Buffer enhancer d. Buffer intermediaryarrow_forward5arrow_forward
- Instructions Your job is to write a program to encrypt outgoing messages and decrypt incoming messages using a Vigenere Cypher. In this assignment, you will parse a string of words from a file into tokens using the strtok_s command with pointers and then use the Vigenere Cypher algorithm to encrypt and decrypt the parsed words. Before you can perform any encryption/decryption activities, the first step is to read in messages from a file and parse the messages into individual words. The Program: Setting up classes and understanding tokenization The first step in encrypting/decrypting messages is to parse the messages into words before applying the encryption/decryption algorithms to them. This parsing process is called “tokenization.” Read the contents of a file into this array using the getline command. The objective of this assignment is to demonstrate the use of pointers in a program utilizing c-strings and tokenization. The use of pointers is foundational in C++. This…arrow_forwardProblem Write code that when executed in PowerShell, will satisfy the following requirements: Display the contents of the c:\program files directory recursively. • Include only the name, last write time, and length in the output. • Pipe the result into a command that will send the output to an interactive table in a separate window. • Include an error action that would continue without displaying any errors. • Use only one line to solve the problem. ● Solution PS C:\> Question ID: na-2101-0119-8212arrow_forwardQ1. One of the major tasks of operating system is to maintain the recently accessed files. There are many algorithms are available to keep the index of the file in a sequence they are accessed, out of which the most common is Last In First Out algorithm. If you are asked to write program to implement that which data structure would you prefer? Why?arrow_forward
- 2.3 Describe the defences against buffer overflows that can be implemented when running programs.arrow_forwardDescribe the format of a read buffer, along with the code for the rio_readinitb function that initializes it.arrow_forwardA file whose file descriptor is fd contains the following sequence of bytes: 3, 1, 4, 1, 5,9, 2, 6, 5, 3, 5. The following system calls are made:lseek(fd, 3, SEEK_SET);read(fd, &buffer, 4); where the lseek call makes a seek to byte 3 of the file. What does buffer contain after the read has completed? I guess the answer is 1,5,9,2, but I'm not sure. Please tell me the detailed steps ,thanksarrow_forward
- The term for safety time added to chains other than the critical chain is: Feeding buffer, first (also known as feeding buffering).B. project buffer serves as a stand-in for C. path buffer, a kind of buffer that holds a file's path.The crucial buffer, in Darrow_forwardIOT multithreading What is HandleGet() method function?a) Current buffer state, with changingb) Current buffer state, without changingc) Previous buffer state, with changingd) Previous buffer state, without changingarrow_forwardThe ReadString procedure reads a string from the keyboard, stopping when the user presses the Enter key. Pass the offset of a buffer in EDX and set ECX to the maximum number of characters the user can enter, plus 1 (to save space for the terminating null byte). The procedure returns the count of the number of characters typed by the user in EAX. Sample: .data buffer BYTE 21 DUP(0) ; input buffer byteCount DWORD ? ; holds counter remrk byte “Enter a string: “,0 .code main proc mov edx,OFFSET buffer ; point to the buffer mov ecx,SIZEOF buffer ; specify max characters call ReadString ; input the string mov byteCount,eax ; number of characters ReadString automatically inserts a null terminator in memory at the end of the string. The following is a hexadecimal and ASCII dump of the first 8 bytes of buffer after the user has entered the string “ABCDEFG” Question: Reverse a string but the string from a user using ReadString procedure. Please comment…arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Np Ms Office 365/Excel 2016 I NtermedComputer ScienceISBN:9781337508841Author:CareyPublisher:Cengage
Np Ms Office 365/Excel 2016 I Ntermed
Computer Science
ISBN:9781337508841
Author:Carey
Publisher:Cengage