1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
VMariaS [17]
3 years ago
9

Design and implement a program to display each directory entry information (files and directories) of current directory, and wit

h "chdir" call to change (current working directory) to its subdirectory.
Computers and Technology
1 answer:
FromTheMoon [43]3 years ago
3 0

Answer: The code below can display directory as stated in the question

Explanation:

char *

gnu_getcwd ()

{

 size_t size = 100;

 while (1)

   {

     char *buffer = (char *) xmalloc (size);

     if (getcwd (buffer, size) == buffer)

return buffer;

     free (buffer);

     if (errno != ERANGE)

       return 0;

     size *= 2;

   }

}

You might be interested in
Outside of a C program, a file is identified by its ________while inside a C program, a file is identified by a(n) ________. fil
Alexxandr [17]

Answer: name, file stream object

Explanation:

4 0
2 years ago
Allie needs to add a long row of numbers. She should enter a
ikadub [295]
I believer the answere is a formula hope this helped
8 0
2 years ago
Read 2 more answers
In risk management what does risk evaluation involved
VLD [36.1K]

Answer:

Explanation:Risk management is the decision-making process involving considerations of political, social, economic and engineering factors with relevant risk assessments relating to a potential hazard so as to develop, analyze and compare regulatory options and to select the optimal regulatory response for safety from that hazard.

5 0
3 years ago
Proszę daje wszystko potrzebuje tego
Stolb23 [73]
I’m sorry I do not speak that
5 0
3 years ago
Read 2 more answers
Need the answer ASAP!!! I’ll mark brainliest if correct
san4es73 [151]

Answer:

update standerds

Explanation:

7 0
3 years ago
Other questions:
  • If you’re storing some personal information like Debit/Credit card numbers or Passwords etc, on different sites for running you’
    10·1 answer
  • When you identify the data elements in a new database, you typically subdivide data elements into?
    14·1 answer
  • Online Book Merchants offers premium customers 1 free book with every purchase of 5 or more books and offers 2 free books with e
    11·1 answer
  • Circular error are caused by adding the cell name of a/an cell to aformula
    7·1 answer
  • What happens when a computer gets a virus?
    6·2 answers
  • What is modularity? Help asap
    9·1 answer
  • What is the difference between private inheritance and composition?
    11·1 answer
  • SNMP is a protocol used to query hosts, servers, and devices about performance or health status data. This protocol has long bee
    7·1 answer
  • Which line of code outputs the decimal portion of a float stored in the variable x? print (x % 1000) print (x) O print (x / 1000
    13·1 answer
  • Define operating system?explain the types of operating system on the basis of use.​
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!