1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
natka813 [3]
3 years ago
6

What are the disadvantages of using pointers?

Computers and Technology
1 answer:
garik1379 [7]3 years ago
5 0

Explanation:

The pointer is the variable that will store the address of the other variable of the same datatype.

Following are the disadvantages of using a pointer.

1. Pointer sometimes causes a segmentation fault in the program.

2. Sometimes pointer leads to a memory leak.

3. A pointer variable is slower than normal variable.

4. Sometimes the program is crash if we using pointer because sufficient memory is not allocated during runtime.

5. If we using pointer it is difficult to find the error in the program.

You might be interested in
In a typical e-mail address, the "host" is user: which one of the following word processing features saves you the most time whe
gayaneshka [121]
Find-and-replace . hope this helps !
4 0
3 years ago
The PATH environment variable.
enot [183]

Answer:

Answer explained below

Explanation:

Yes, you can let Set-uid program that is owned by root to run your code instead of /bin/ls but it has it's own drawbacks and is actually not safe.

As you can not rely on that since some of the shells if different from the ruid drop an euid which is actually not safe.

execl("/bin/ls", "ls",(char *)0);  

run this under your main program.

Since it can have a root previlege,

-$ cd /tmp/

/tmp$ sudo su

:/tmp# gcc -o system system.c

:/tmp# chmod u+s system // changing file permissions

:/tmp# exit

exit

:/tmp$ cp /bin/sh /tmp/ls

:/tmp$ ./system

<u>Steps: </u>

1. The first thing you need to do is copy /bin/sh to /tmp.

2. After copying /bin/sh to /tmp set a new name ls but make sure your sh ->.zsh.

3. Set PATH to current directory. /tmp.

4. Compile

5. Run the program system and you can get your root previledge.

Now, with the above exmaple if you change /bin/sh soo that it points back to /bin/bash and repeat all the previous steps, you will not be able to get your root previledges.

8 0
4 years ago
Join my among us <br><br> code GNLMJF
ryzh [129]

Answer:

i cant

Explanation:

i would but im on a chromebook rn

sorry but thanks

take care

8 0
3 years ago
Read 2 more answers
Read the following scenario. How might Sarah correct successfully complete her task?
nexus9112 [7]

Answer:

Explanation:

A: To permanently remove a file from her computer, Sarah doubled-clicked on the My Computer icon and searched for her file under the “Uninstall or change a program” menu option.

or

b: empty the recycle bin : You can permanently delete a program file installed in the computer by following the procedure in option A. The option above will take you to the control panel and you'll be able to select the program you'd want to permanently remove. If you had initially deleted a file like a picture or a document or anything else that you necessarily do not need, it will go to recycle bin. You can head over there and select the Empty the Recycle Bin option to permanently delete the file.

4 0
3 years ago
True or false? A medical assistant can check for available exam rooms and providers using an electronic scheduling system.
lutik1710 [3]
This is true m8 hope this helps
4 0
3 years ago
Other questions:
  • (04.01 MC)
    11·1 answer
  • 3. The invention of the transistor was important to the development of computers because it
    5·1 answer
  • Craig wants to create a computing infrastructure that will allow developers within his company to build applications on a primar
    9·1 answer
  • Ignorance of policy is a legal excuse for an employee. TRUE or FALSE
    11·1 answer
  • What file in the user account folder stores user settings?
    8·1 answer
  • Which would a student most likely do in a digital laboratory?
    13·2 answers
  • While reviewing system logs, a security analyst notices that a large number of end users are changing their passwords four times
    13·1 answer
  • What alternative to leased lines is used by VPNs? As an alternative to leased lines, VPNs use ______ connections.
    11·1 answer
  • Typically, a DVD has how many times more capacity than a CD?
    12·1 answer
  • Which of the following is NOT an example of one of the six primary ways businesses use the Internet?
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!