1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
alexira [117]
3 years ago
7

The following code will create a zombie child process because the child process is terminated and the parent process is busy in

a loop without calling wait() function. now, modify this program by handling sigchld signal so that no zombie process is created. the parent process cannot call wait()directly in the main(). however, calling wait() from inside the signal handler is fine. the main still must go to the infinite while loop. you can add helper functions.
int main(){
if (fork()== 0) // child process
exit(0);
else // parent process
while (true);
}
Computers and Technology
1 answer:
Georgia [21]3 years ago
5 0

Answer:

what on earth

Explanation:

You might be interested in
Different network scenarios require the
Vladimir [108]

Answer:

a) Viruses

Explanation:

Vulnerability assessment is performed by variety of tools and these can be protocol analyzer, vulnerability scanner, Honeypots, port scanners, honey nets and banner grabbing tools.

Port scanners : they are used to scan the ports which can be exploited by attackers. Most of TCP/IP applications communicate using different ports and attackers can exploit these ports if they are found vulnerable. for example : ports like 80 and 443 are commonly used for HTTP and SSL communication. 22 is used for SSH and if they are open to world then it will allow attackers to use those to get the entry into the system.

Protocol Analyzers : They are used to analyze the packet captures. tools like wireshark, tshark, these tools will help user to decode HTTP/SSL/HTTPS/FTP/RSTP or any application protocols communication. this will help user to understand any unwanted or non-anticipated traffic.

Vulnerability Scanners : They are used to detect the vulnerabilities in the network or systems. these will help administrators to get the alerts whenever there are unanticipated activity. It will have two types of scanners one is active scanner and other is passive scanner. Active scanners will keep on sending probes at the fixed time slots and passibe scanners will be in listening mode all the time. These scanners will alert when a new nodes comes up or goes down or if any system gets compromised.

Honeypots and Honey nets : They are devices or softwares which are having limited security. These devices are made vulnerable purposefully so that attackers can try and attack.  This will help softwares to detect the attackers when they try to exploit these open vulnerabilities. They are deceptions created with purpose.

Banner grabbing Tools : These are tools which will capture the banner information like HTTP protocol version, underlying operating system, open ssl versions being used, server software and similar information. these are important as it will open up potential vulnerabilities in the underlying software. for ex : SSLv3 has a vulnerability known to world and can be exploited by anyone.

4 0
3 years ago
Write a short reflection piece (it may consist of three bulleted items, with one explanatory sentence) on three things you learn
nydimaria [60]

Answers

  • OS(The Operating System) sends <em>interrupts to the processor</em> to stop whatever is being processing at that moment and computer architecture send <em>data bus</em>. This bus sends<u> data between the processor,the memory and the input/output unit.</u>
  • The operating system is a low-level software that supports a <em>computer’s basic functions</em>, such as <u>scheduling tasks and controlling peripherals</u> while the computer architecture has the <em>address bus bar</em>. This bus carries <u>signals related to addresses between the processor and the memory. </u>
  • The interface between <em>a computer’s hardware and its software</em> is its Architecture while An operating system (OS) is<u> system software that manages computer hardware and software resources and provides common services for computer programs.</u>

Explanation:

In short explanation,the Computer Architecture specifically <em>deals with whatever that's going on in the hardware part of the computer system </em>while the Operating System is the computer program <em>which has been program to execute at some instances depending on the programming instructions embedded in it</em>. An example is the MS Office.

5 0
3 years ago
What is a computer ?it types​
Keith_Richards [23]
Um can you be more descriptive
8 0
3 years ago
Read 2 more answers
You are a desktop administrator for Nutex Corporation. A user reports that he is unable to access network resources. You notice
Tju [1.3M]

Answer:

The right answer is wire crimper tool.

Explanation:

According to the scenario, the most appropriate answer is the wire crimping tool because the wire crimping tool is a tool that can strip the wire then cut it in proper shape and then crimp the wire in the RJ45 connector very effectively.

RJ45 connector is a connector which is used in ethernet cables to connect to computers i.e. cat 5, cat 5e, cat 6, etc. these cable has 4 pairs of different color codes.

A wire crimper effectively connects the end of the cable to an RJ45 connector.

4 0
3 years ago
Until the 1990s scaling up was almost always a more cost-effective strategy to increase available computer power because communi
salantis [7]

Answer:

The answer is "Option A"

Explanation:

A single computer component also known as a single-board computer, it is a total machine, which is built on a single silicon chip with functional devices like microcontroller, (I / O), and storage.  

  • It normally uses a device, which has a fanless, small-power computation system, and small-profile design.
  • This model provides very slow communication between the components of single computers, that's why the given statement is true.

8 0
3 years ago
Other questions:
  • The computer mouse is used to
    11·1 answer
  • I am having trouble figuring out if this is correct. Can someone please help me ASAP?
    10·1 answer
  • Write a program that will generate 100 integers between 0 and 1000. Store the even numbers in a sorted linked list called evens.
    12·1 answer
  • "You have installed a point-to-point connection using wireless bridges and Omni directional antennas between two buildings. The
    8·1 answer
  • (TCO B) The symbol shown as a three-sided box that is connected to the step it references by a dashed line is what?
    12·1 answer
  • What is meant by versatility in terms of features of computer?​
    9·2 answers
  • Someone help me out eh?
    10·2 answers
  • Capstone Project part 11 quiz
    6·1 answer
  • According to Okun's law, if the unemployment rate goes from 7% to 4%, what
    15·1 answer
  • Meaning of mesh topology​
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!