answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Morgarella [4.7K]
2 years ago
10

Show the stack with all activation record instances, including static and dynamic chains, when execution reaches position 1 in t

he following skeletal program. Assume bigsub is at level 1. function bigsub() { function a(flag) { function b() { ... a(false); ... } // end of b ... if (flag) b(); else c(); ... } // end of a function c() { function d() { ... <------------------------1 } // end of d ... d(); ... } // end of c ... a(true); ... } // end of bigsub The calling sequence for this program for execution to reach d is bigsub calls a a calls b

Computers and Technology
1 answer:
il63 [147K]2 years ago
8 0

Answer:

<u>Stack for all the active record instances:</u>

The initial calling sequences is bigsub

-The bigsub calls funa.

  • In static chain funa finishes their processes then it return back to bigsub
  • In dynamic chain funa finishes their processes then it return back to bigsub

-The funa calls funb.

  • In static chain funb finishes their processes then it return back to funa
  • In dynamic chain funb finishes their processes then it return back to funa

-The funb calls funa.

  • In static chain funa finishes their processes then it return back to bigsub
  • In dynamic chain funa finishes their processes then it return back to funb

-The funa calls func.

  • In static chain func finishes their processes then it return back to bigsub
  • In dynamic chain func finishes their processes then it return back to funa

-The func calls fund.

  • In static chain fund finishes their processes then it return back to func
  • In dynamic chain fund finishes their processes then it return back to func

Explanation:

See the stack diagram.

You might be interested in
A time-saving strategy that helps define unfamiliar words involves using
yuradex [85]

The correct answer is A. Familiar words for clues

Explanation:

Finding unfamiliar words is common while reading, especially in texts that belong to a specific field such as medicine, technology, etc. This can be handled through multiple strategies such as using a dictionary, guessing the meaning of the word based on its parts, and using context clues.

In this context, one of the easiest and most time-saving strategy is the use of context clues that implies using the familiar words as clues to guess the meaning of an unfamiliar word. This is effective because in most cases the meaning of an unknown word can be determined using the context of the word or words around the unknown word. Also, this strategy takes little time because you only need to analyze the sentence or paragraph where the unknown word is. Thus, the time-saving strategy to define unfamiliar words involves using familiar words for clues.

6 0
1 year ago
Read 2 more answers
Describe different types of intrusions such as SQL PL/SQL, XML, and other injections.
Finger [1]

<em>Intrusion means unauthorized and harmful activities happening in your system. Any irregularities in the system is considered as intrusion and therefore monitored by administrators and can be detected using Intrusion Detection System. </em>

<em>Examples of Intrusion attacks in a network are: </em>

  • <em>Denial of Service (Dos) - denial of service means flooding the system causing it to crash and unable to respond to a service request. Normally, a DoS attack is facilitated by numbers of hosts sending enormous request to a victim computer. The requests can be in a form of code that would flood the system and making it to unresponsive.  </em>
  • <em>Man in the Middle Attack (MiM) - a hacker would be in the middle of the communication between a client computer and a server computer. The hacker can mimic IPs within the network and steal information then sends it to the intended receiver.  </em>
  • <em>SQL Injection - For websites that runs database like SQL, a code by the hacker can be added to the website and making him gained access to the database information successfully.</em>
8 0
2 years ago
A company has a file server that shares a folder named Public. The network security policy specifies that the Public folder is a
klasskru [66]

Answer:

authentication

Explanation:

At the authentication process, there is a way of identifying a user, this is typically done by having the user enter a valid user name and valid password before access is granted. Here at authentication the process is based on each user having a unique set of criteria for gaining access.

The AAA server have to ascertain by comparing a user's authentication credentials with other user credentials stored in a database. In the event the credentials match, the user is granted access to the network. But on the other hand, If the credentials varies, and authentication fails then network access will be denied.

3 0
2 years ago
Fiona is drawing polygons on a computer. She wants to map a regular 9-sided polygon back onto itself using a reflection. Which s
Rus_ich [418]
The answer is "<span>B) any perpendicular bisector of one of the sides".
</span>
We can define a line of reflection as the line in which a shape is reflected, or we can say that it is the mirror in which the shape is reflected. The line of reflection is the perpendicular bisector of any pair of corresponding points. If you want to join sets of corresponding points on the object and image, then the line of reflection will slice the lines framed down the middle.
4 0
1 year ago
Read 2 more answers
The class Date has a single constructor that accepts the integer value: a month- (1 for January through 12 for December), a day
vaieri [72.5K]

Answer:

public class Date{

Public Date(int month,int day,int year){

}

}

void main(){

Date datep=new Date(3,12,2006);

}

Explanation:

Here we declared a class "Date" and defined one public constructor which will take month,day and year. In main we created an object to that Date class by invoking this parameterized constructor and assigned that object to "dateap" Date variable

8 0
2 years ago
Other questions:
  • Sarah is creating and formatting a newsletter for her school. Which page layout rules should she consider when doing this?
    13·2 answers
  • In a spreadsheet, the instructions for carrying out calculations are called __________. recalculations formulas templates macros
    13·1 answer
  • Given a scanner reference variable named input that has been associated with an input source consisting of a sequence of strings
    14·2 answers
  • Choose all items that represent characteristics of a functional resume. based on data obtained from a career portfolio lists pri
    13·2 answers
  • In its simplest form, communication is defined as ________.
    7·1 answer
  • Identify two entities and 2 of their attributes from the given scenario.
    9·1 answer
  • Define a new object in variable painter that has properties "name" storing "Vincent van Gogh"; "artworks" storing "The Starry Ni
    13·1 answer
  • A sine wave is offset 1/9 cycle with respect to time 0. What is its phase in degrees and radians? Which simple signal has a wide
    12·1 answer
  • A ______________ deals with the potential for weaknesses within the existing infrastructure to be exploited.
    10·2 answers
  • Where can the Field Service Manual containing Critical Callout, Disassembly and Reassembly instructions be found?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!