Can a register be use as the actual parameter in macro call

Assignment Help Operating System
Reference no: EM13869538

1. One way to do (static) linking is as follows. Before scanning the library, the linker builds a list of procedures needed, that is, names defined as EXTERN in the modules being linked. Then the linker goes through the library linearly, extracting every procedure that is in the list of names needed. Does this scheme work? If not, why not and how can it be remedied?

2. Can a register be used as the actual parameter in a macro call? How about a constant? Why or why not?

Reference no: EM13869538

Questions Cloud

Describe mckinnon in the context of the frameworks : Describe McKinnon in the context of the frameworks and theories of cyber-crime and cyber criminals discussed in the classroom
Major design and implementation challenges : Our project is to design a functional jacket that will charge a mobile device on the go. Most people have had their cellphone lose charge at a time when it is inconvenient or impossible to recharge it. Our project aims to eliminate that problem by..
The quoted market price per share of common stock : On January 1, 2009, as a form of executive compensation,
Can a dll be mapped into two process virtual address spaces : Can a DLL be mapped into two process' virtual address spaces at different virtual ad- dresses? If so, what problems arise? Can they be solved? If not, what can be done to eliminate them?
Can a register be use as the actual parameter in macro call : One way to do (static) linking is as follows. Before scanning the library, the linker builds a list of procedures needed. Can a register be used as the actual parameter in a macro call? How about a constant? Why or why not?
What role should disaster recovery play in organizational : What role should disaster recovery play in organizational security?
Each share of preferred stock is convertible into twelve sh : On January 2, 2010, the Bray Corporation issues 900 shares of $100 par convertible preferred stock for $117 per share. On January 7, 2011, all the preferred stockholders convert their shares to common stock.
Write a symbol table package consisting of two routines : Write a symbol table package consisting of two routines: enter(symbol, value) and lookup(symbol, value). The former enters new symbols in the table and the latter looks them up. Use some form of hash coding.
Explain and design an mssql solution for high availability : Explain and design an MSSQL solution for high availability

Reviews

Write a Review

Operating System Questions & Answers

  Handling the situation as a system administrator team leader

While working with the System Administration group, they tell you that a huge part of the administrator's duties focus on troubleshooting troubles within the network.

  Human centered and user centered approaches

Discuss the differences between the human centered and user centered approaches? Do you consider that human centered approach is more effective?

  1 what are the advantages and disadvantages of having a

1. what are the advantages and disadvantages of having a small number of sectors per disk cluster? hint you may want to

  What is the application layer protocol involved

What is the full (expanded) address of the abbreviated IPv6 address FDEC::CF:0:FFFF - what is the type of block of the abbreviated IPv6 address

  Assume that the passwords were eight characters

Assume that the passwords were eight characters long but that the salt length was increased to 24 bits. Again, the salts (and the corresponding algorithms) are known to all users. What would be the expected time to find all users' passwords using ..

  Select one of two possible short reportsfor your second and

select one of two possible short reportsfor your second and final assignment in this class i would like to ask you to

  Establish shared-memory object between parent and child

the child process must output the sequence of numbers generated from the algorithm specified by the Collatz conjecture because the parent and child have their own copies of the data.

  The state of the waiting thread to blocked

Which IPC mechanism does not change the state of the waiting thread to blocked?

  Circular-wait scheme with various deadlock-avoidance scheme

Compare the circular-wait scheme with thevarious deadlock-avoidance schemes  banker's algorithm)

  One page document describing security

Analyze the Internet and construct a one page document describing how security is maintained while transacting business over the Internet.

  Describe the differences between symmetric and asymmetric

Describe the differences between symmetric and asymmetric multiprocessing. What are three advantages and one disadvantage of multiprocessor systems?

  Question 1agiven memory partition of 100 kb 500kb 200kb

question 1agiven memory partition of 100 kb 500kb 200kb 300kb and 600 kb in order how would each of the first-fit

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd