1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Len [333]
3 years ago
9

What is the binding time for the following in C/C++ program. Explain. a. The location of memory of a local variable in a functio

n. b. The meaning of the keyword while c. The size in memory of a variable of type int d. The location in memory of a global static variable e. The code for the printf function f. The type of local variable in a function g. The values assigned to a variable h. The size in memory of a pointer
Computers and Technology
1 answer:
Evgen [1.6K]3 years ago
6 0

Answer:

Explained

Explanation:

Binding is the association of an object with its attributes, operations, or name  there are many different types of bindings and bindings can occur at different times .

for example:

1)language definition time binding: for example-binding * to multiplication

2)language implementation time binding: int size and operations

3)compile time binding: binding type to a variable

for instance in int x; x will be treated as an int from here forward

4)link time binding: binding function name to a specific function definition

5)load time binding: binding variable to memory location

6)run time binding: binding variable to memory location or bind a polymorphic variable to specific class type .

 binding time for the

a)6  run time binding

b)1  language definition time binding

c)2  language implementation time binding

d)5  load time binding

e)4  link time binding

f)3  compile time binding

g)3  compile time binding:

h)6 run time binding

You might be interested in
The following is a sequence of undo-log records written by two transactions T and U: < START T>; ; < START U>; ; ; ;
tatiyna

Answer:

Giving that: The following is a sequence of undo-log records written by 2 transactions T and U:

< START T >;

< T,A,10 >;

< START U >;

< U, B, 20 >;

< T, C, 30 >;

< U, D, 40 >;

< Commit U >;

< T, E, 50 >;

< Commit T >;

1. < START U >

      Recovery action in this case will be undo(-1) and undo(0). All restored to its original Value

     log records < T, A, 10 >,  < T, abort >; as written out

2. < T, E, 50 >

      Recovery action in this case will be undo(8) and redo(0). A and C is restored to its original value, B and D are set to 20 and 40

      log records <T, C, 30 >,  < T, A, 10 >,  < T, abort >  are written out

3. < Commit T >

      Recovery action in this case will be redo(7) and redo(4). A and C are set to 10 and 30, B and D are set to 20 and 40

7 0
3 years ago
Which of these is system software? Check all
Darya [45]

Answer:

Windows OS is software....

6 0
3 years ago
Maxwell says three things Level Two Leaders do well are:
IRINA_888 [86]

Answer:

true

Explanation:

3 0
3 years ago
Pamela finds that she is constantly spelling the word “color” as “colour” when she is typing. Even though this is how the word i
Oduvanchick [21]
She can hit always replace

7 0
3 years ago
Read 2 more answers
Write a C++ code that will read a line of text and echo the line with all uppercase letters deleted. Assume the maximum length o
andriy [413]

Answer:

#include<bits/stdc++.h>

using namespace std;

int main()

{

   string st;

   getline(cin,st);

   int i=0;

   while(i<st.length())

   {

       if(isupper(st[i]))

       {

           st.erase(st.begin()+i);

           continue;

       }

       i++;

   }

   cout<<st<<endl;

   return 0;

}

Explanation:

I have included the file bits/stdc++.h which include almost most of the header files necessary.

For taking the input as a string line getline is used.

For checking the upper case isupper() function is used. cctype header file contains this function.

For deleting the character erase function is used.

6 0
3 years ago
Other questions:
  • In an is framework, ________ is the bridge between the computer side on the left and the human side on the right
    12·1 answer
  • For an external usb hard drive attached to a computer, which is more suitable: a writethrough cache or a block cache
    14·2 answers
  • Web crawlers or spiders collect information from Web pages in an automated or semi-automated way. Only the text of Web pages is
    10·1 answer
  • Voice authentication requires speech to text capability Facial recognition may be used for authentication The human iris is uniq
    6·1 answer
  • ___________ system allows us to talk to any person in the world it any time​
    15·2 answers
  • What are the three basic classes of application
    14·2 answers
  • The list method reverse reverses the elements in the list. Define a function named reverse that reverses the elements in its lis
    10·1 answer
  • What happens to a message when it is deleted?
    5·2 answers
  • Teenagers and their parents will never understand each other-the generation gap is too big. Its for my grade 11 English speech​
    10·2 answers
  • How would you describe binary to someone ??<br> PLEASE ANSWER I WILL GIVE U BRAINLY!!
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!