COMPUTER SCIENCE ILLUMIN.-TEXT
COMPUTER SCIENCE ILLUMIN.-TEXT
6th Edition
ISBN: 2810016866372
Author: Dale
Publisher: JONES+BART
bartleby

Concept explainers

bartleby

Videos

Question
Book Icon
Chapter 11, Problem 48E

a.

Program Plan Intro

Path:

To represent the path of the file, first identify the type of the environment in the operating system.

  • The path is a string or a sequence of characters separated by a forward or backward slash that contains the specified location of file.
  • The path can be represented in two ways,
    • Absolute path:
      • It specifies the path of the file step by step, from the root of the directory.
      • The path of the file starts from the root directory.
      • Absolute path names can be represented with a forward slash (/) or backward slash (\) based upon the type of operating system.
    • Relative path:
      • It specifies the name from the current working directory.
      • Relative path names can be represented with two dots (..) preceded by the forward (/) or backward slash (\)based upon the type of operating system.

The following diagram represents the directory tree structure on UNIX environment.

COMPUTER SCIENCE ILLUMIN.-TEXT, Chapter 11, Problem 48E

  • Absolute path of the file in a UNIX environment is represented by separating the directories, subdirectories, and files by a forward slash (/).

Explanation of Solution

b.

Absolute path for “access.old” file:

From the above directory structure,

  • To specify an absolute path, the directories must be separated by forward slash (/) and it starts from the root directory.
  • Here, the root directory starts with the forward slash (/)...

Explanation of Solution

c.

Absolute path for “named.conf” file:

From the above directory structure,

  • To specify an absolute path, the directories must be separated by the forward slash (/) and it starts from the root directory.
  • Here, the root directory starts with the forward slash (/)...

Explanation of Solution

d.

Absolute path for “smith” directory:

From the above directory structure,

  • To specify an absolute path, the directories must be separated by the forward slash (/) and it starts from the root directory.
  • Here, the root directory starts with the forward slash (/)...

Explanation of Solution

e.

Absolute path for “week3.txt” file:

From the above directory structure -

  • To specify an absolute path, the directories must be separated by the forward slash (/) and it starts from the root directory.
  • Here, the root directory starts with the forward slash (/).
  • Under the root directory “/”, there are five parent directories such as:
    • usr
    • home...

Explanation of Solution

f.

Absolute path for “printall” file:

From the above directory structure,

  • To specify an absolute path, the directories must be separated by forward slash (/) and it starts from the root directory.
  • Here, the root directory starts with the forward slash (/).
  • Under the root directory “/”, there are five parent directories such as:
    • usr
    • home

Blurred answer
Students have asked these similar questions
The next problem concerns the following C code: /copy input string x to buf */ void foo (char *x) { char buf [8]; strcpy((char *) buf, x); } void callfoo() { } foo("ZYXWVUTSRQPONMLKJIHGFEDCBA"); Here is the corresponding machine code on a Linux/x86 machine: 0000000000400530 : 400530: 48 83 ec 18 sub $0x18,%rsp 400534: 48 89 fe mov %rdi, %rsi 400537: 48 89 e7 mov %rsp,%rdi 40053a: e8 d1 fe ff ff 40053f: 48 83 c4 18 add callq 400410 $0x18,%rsp 400543: c3 retq 0000000000400544 : 400544: 48 83 ec 08 sub $0x8,%rsp 400548: bf 00 06 40 00 mov $0x400600,%edi 40054d: e8 de ff ff ff callq 400530 400552: 48 83 c4 08 add $0x8,%rsp 400556: c3 This problem tests your understanding of the program stack. Here are some notes to help you work the problem: • strcpy(char *dst, char *src) copies the string at address src (including the terminating '\0' character) to address dst. It does not check the size of the destination buffer. You will need to know the hex values of the following characters:
A ROP (Return-Oriented Programming) attack can be used to execute arbitrary instructions by chaining together small pieces of code called "gadgets." Your goal is to create a stack layout for a ROP attack that calls a function located at '0x4018bd3'. Below is the assembly code for the function 'getbuf', which allocates 8 bytes of stack space for a 'char' array. This array is then passed to the 'gets' function. Additionally, you are provided with five useful gadgets and their addresses. Use these gadgets to construct the stack layout. Assembly for getbuf 1 getbuf: 2 sub $8, %rsp 3 mov %rsp, %rdi 4 call gets 56 add $8, %rsp ret #Allocate 8 bytes for buffer #Load buffer address into %rdi #Call gets with buffer #Restore the stack pointer #Return to caller. Stack Layout (fill in Gadgets each 8-byte section) Address Gadget Address Value (8 bytes) 0x4006a7 pop %rdi; ret 0x7fffffffdfc0 Ox4006a9 pop %rsi; ret 0x7fffffffdfb8 0x4006ab pop %rax; ret 0x7fffffffdfb0 0x7fffffffdfa8 Ox4006ad mov %rax,…
In each of the following C code snippets, there are issues that can prevent the compilerfrom applying certain optimizations. For each snippet:• Circle the line number that contains compiler optimization blocker.• Select the best modification to improve optimization.1. Which line prevents compiler optimization? Circle one: 2 3 4 5 6Suggested solution:• Remove printf or move it outside the loop.• Remove the loop.• Replace arr[i] with a constant value.1 int sum( int ∗ ar r , int n) {2 int s = 0 ;3 for ( int i = 0 ; i < n ; i++) {4 s += a r r [ i ] ;5 p r i n t f ( ”%d\n” , s ) ;6 }7 return s ;8 }2. Which line prevents compiler optimization? Circle one: 2 3 4 5 6Suggested solution:• Move or eliminate do extra work() if it’s not necessary inside the loop.• Remove the loop (but what about scaling?).• Replace arr[i] *= factor; with arr[i] = 0; (why would that help?).1 void s c a l e ( int ∗ ar r , int n , int f a c t o r ) {2 for ( int i = 0 ; i < n ; i++) {3 a r r [ i ] ∗= f a c t o r…
Knowledge Booster
Background pattern image
Computer Science
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
SEE MORE QUESTIONS
Recommended textbooks for you
Text book image
Database System Concepts
Computer Science
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:McGraw-Hill Education
Text book image
Starting Out with Python (4th Edition)
Computer Science
ISBN:9780134444321
Author:Tony Gaddis
Publisher:PEARSON
Text book image
Digital Fundamentals (11th Edition)
Computer Science
ISBN:9780132737968
Author:Thomas L. Floyd
Publisher:PEARSON
Text book image
C How to Program (8th Edition)
Computer Science
ISBN:9780133976892
Author:Paul J. Deitel, Harvey Deitel
Publisher:PEARSON
Text book image
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781337627900
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
Text book image
Programmable Logic Controllers
Computer Science
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education
Linux - Tutorial for Beginners in 13 MINUTES! [ UPDATED ]; Author: bai;https://www.youtube.com/watch?v=BMGixkvJ-6w;License: Standard YouTube License, CC-BY
What is Linux?; Author: Techquickie;https://www.youtube.com/watch?v=zA3vmx0GaO8;License: Standard YouTube License, CC-BY
Introduction to Linux and Basic Linux Commands for Beginners; Author: sakitech;https://www.youtube.com/watch?v=IVquJh3DXUA;License: Standard Youtube License