Answer:
See explanation
Explanation:
My explanation to the author is that:
The reduction in size of the attachment doesn't mean that some parts of the book (i.e. the attachment) has been deleted.
I'll also made him understand that the book will retain its original size and contents after downloading by the recipient of the mail.
Answer:
True is the correct answer for the above question
Explanation:
- The OSI security architecture is a security framework that is used to secure the data packets when it is going to transfer on the internet for communication.
- It is used to define the security rules and mechanism which need to secure the data packets.
- It mainly focuses on Security services, Security attacks, Security mechanisms.
- The above question-statement states about the framework which defines the security mechanism to secure from the attacks are known as OSI Security architecture which is the correct statement which is described above. Hence True is the correct answer.
Answer:
Option a
Explanation:
The Critical Path Method is the arrangement of booked exercises that decides the term of the task. These planned exercises must be performed if the venture is to be viewed as a triumph.
Therefore, options b, c, d and e can't be true because:
b. Activities in the Critical Path Method has no or zero slack.
c. The duration of the critical path in CPM determined on the basis of the latest activity and the earliest initiation.
d. The CPM method schedules the activity of the longest duration.
Answer:
I get 0x55 and this the linking address of the main function.
use this function to see changes:
/* bar6.c */
#include <stdio.h>
char main1;
void p2()
{
printf("0x%X\n", main1);
}
Output is probably 0x0
you can use your original bar6.c with updaated foo.c
char main;
int main() // error because main is already declared
{
p2();
//printf("Main address is 0x%x\n",main);
return 0;
}
Will give u an error
again
int main()
{
char ch = main;
p2(); //some value
printf("Main address is 0x%x\n",main); //some 8 digit number not what printed in p2()
printf("Char value is 0x%x\n",ch); //last two digit of previous line output
return 0;
}
So the pain in P2() gets the linking address of the main function and it is different from address of the function main.
Now char main (uninitialized) in another compilation unit fools the compiler by memory-mapping a function pointer on a char directly, without any conversion: that's undefined behavior. Try char main=12; you'll get a multiply defined symbol main...
Explanation: