Computer Systems: A Programmer's Perspective (3rd Edition)
3rd Edition
ISBN: 9780134092669
Author: Bryant, Randal E. Bryant, David R. O'Hallaron, David R., Randal E.; O'Hallaron, Bryant/O'hallaron
Publisher: PEARSON
expand_more
expand_more
format_list_bulleted
Expert Solution & Answer
Chapter 3.10, Problem 3.46PP
A.
Explanation of Solution
Stack after line 3:
The stack details are shown below:
00 00 00 00 00 40 00 76 |
01 23 45 67 89 AB CD EF |
Return address
Saved %rbx
buf = %rsp
Explanation:
- Each box in table represents 8 bytes...
B.
Explanation of Solution
Stack after line 5:
The stack details are shown below:
00 00 00 00 00 40 00 34 |
33 32 31 30 39 38 37 36 |
35 34 33 32 31 30 39 38 |
37 36 35 34 33 32 31 30 |
Return address
Saved %rbx
buf = %rsp
Explanation:
- Each box in table represents 8 bytes...
C.
Explanation of Solution
Address of program return:
- The program attempts to return to address “0x040034”.
- The low-order 2 bytes ...
D.
Explanation of Solution
Registers with corrupted values:
- The register “%rbx” has saved value that is set to “0x3332313039383736”...
E.
Explanation of Solution
Error in get_line code:
- The call to “malloc” method has argument “strlen(buf)”.
- The argument should be “strlen(buf)+1” instead of “strlen(buf)”...
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
C++ Programming.
Topic:
Working with pointers and dynamic memory. Indicators. Working with dynamic memory. Dynamic arrays and their use as function parameters.
Task :
Describe a void function named Swap(x,y) that swaps the values stored in the variables x and (x is a real type parameter and is both input and output). Using this function , for the given variables of real type a, b, c, d, one should sequentially replace the values of the pairs (a, b), (c, d) and (b, c) and let a, b, c, d be new values .
(10)
Question 2.2
NOTE: Pointers must be used to solve the following problem. You will 8 marks if pointers are not used, even if
the solution is correct.
Write a function createPassword() with no return value to randomly select 8 capital letters from the alphabet.
The function receives the address of the first characters of the password string as parameter.
Hint: Declare a characters string that contains all the capital letters of the alphabet and use the index values
of the characters in the string for random selection of characters, e.g.
5
char alpha [27] = “ABCDEFGHIJKLMNOPQRSTUVWXYZ”;
char *pAlpha = alpha;
(python)
9. Create a function based on the following information:
You are given two strings with words separated by commas. Try to find what is common between these strings. The words in the same string don't repeat.
Your function should find all of the words that appear in both strings. The result must be represented as a string of words separated by commas in alphabetic order.
Input: Two arguments as strings.
Output: The common words as a string.
Return: Nothing is returned
Chapter 3 Solutions
Computer Systems: A Programmer's Perspective (3rd Edition)
Ch. 3.4 - Prob. 3.1PPCh. 3.4 - Prob. 3.2PPCh. 3.4 - Prob. 3.3PPCh. 3.4 - Prob. 3.4PPCh. 3.4 - Prob. 3.5PPCh. 3.5 - Prob. 3.6PPCh. 3.5 - Prob. 3.7PPCh. 3.5 - Prob. 3.8PPCh. 3.5 - Prob. 3.9PPCh. 3.5 - Prob. 3.10PP
Ch. 3.5 - Prob. 3.11PPCh. 3.5 - Prob. 3.12PPCh. 3.6 - Prob. 3.13PPCh. 3.6 - Prob. 3.14PPCh. 3.6 - Prob. 3.15PPCh. 3.6 - Prob. 3.16PPCh. 3.6 - Practice Problem 3.17 (solution page 331) An...Ch. 3.6 - Practice Problem 3.18 (solution page 332) Starting...Ch. 3.6 - Prob. 3.19PPCh. 3.6 - Prob. 3.20PPCh. 3.6 - Prob. 3.21PPCh. 3.6 - Prob. 3.22PPCh. 3.6 - Prob. 3.23PPCh. 3.6 - Practice Problem 3.24 (solution page 335) For C...Ch. 3.6 - Prob. 3.25PPCh. 3.6 - Prob. 3.26PPCh. 3.6 - Practice Problem 3.27 (solution page 336) Write...Ch. 3.6 - Prob. 3.28PPCh. 3.6 - Prob. 3.29PPCh. 3.6 - Practice Problem 3.30 (solution page 338) In the C...Ch. 3.6 - Prob. 3.31PPCh. 3.7 - Prob. 3.32PPCh. 3.7 - Prob. 3.33PPCh. 3.7 - Prob. 3.34PPCh. 3.7 - Prob. 3.35PPCh. 3.8 - Prob. 3.36PPCh. 3.8 - Prob. 3.37PPCh. 3.8 - Prob. 3.38PPCh. 3.8 - Prob. 3.39PPCh. 3.8 - Prob. 3.40PPCh. 3.9 - Prob. 3.41PPCh. 3.9 - Prob. 3.42PPCh. 3.9 - Practice Problem 3.43 (solution page 344) Suppose...Ch. 3.9 - Prob. 3.44PPCh. 3.9 - Prob. 3.45PPCh. 3.10 - Prob. 3.46PPCh. 3.10 - Prob. 3.47PPCh. 3.10 - Prob. 3.48PPCh. 3.10 - Prob. 3.49PPCh. 3.11 - Practice Problem 3.50 (solution page 347) For the...Ch. 3.11 - Prob. 3.51PPCh. 3.11 - Prob. 3.52PPCh. 3.11 - Practice Problem 3.52 (solution page 348) For the...Ch. 3.11 - Practice Problem 3.54 (solution page 349) Function...Ch. 3.11 - Prob. 3.55PPCh. 3.11 - Prob. 3.56PPCh. 3.11 - Practice Problem 3.57 (solution page 350) Function...Ch. 3 - For a function with prototype long decoda2(long x,...Ch. 3 - The following code computes the 128-bit product of...Ch. 3 - Prob. 3.60HWCh. 3 - In Section 3.6.6, we examined the following code...Ch. 3 - The code that follows shows an example of...Ch. 3 - This problem will give you a chance to reverb...Ch. 3 - Consider the following source code, where R, S,...Ch. 3 - The following code transposes the elements of an M...Ch. 3 - Prob. 3.66HWCh. 3 - For this exercise, we will examine the code...Ch. 3 - Prob. 3.68HWCh. 3 - Prob. 3.69HWCh. 3 - Consider the following union declaration: This...Ch. 3 - Prob. 3.71HWCh. 3 - Prob. 3.72HWCh. 3 - Prob. 3.73HWCh. 3 - Prob. 3.74HWCh. 3 - Prob. 3.75HW
Knowledge Booster
Similar questions
- AIM- Write an 8085 sequence to check whether the first set of reading is higher than the second one or not. PROBLEM STATEMENT- The pressure of two boilers is monitored and controlled by a microcomputer works based on microprocessor programming. A set of 6 readings of first boiler, recorded by six pressure sensors, which are stored in the memory location starting from 2050H. A corresponding set of 6 reading from the second boiler is stored at the memory location starting from 2060H. Each reading from the first set is expected to be higher than the corresponding position in the second set of readings. Write an 8085 sequence to check whether the first set of reading is higher than the second one or not. If all the readings of first set is higher than the second set, store 00 in the 'D' register. If any one of the readings is lower than the corresponding reading of second set, stop the process and store FF in the register 'D'. Data (H): First set: 78, 89, 6A, 80, 90, 85 Second Set:71, 78,…arrow_forwardQuestion #2: (5 Points). Write a function in C++ which accepts a 2D array of integers and its size as arguments and displays the elements of middle row and the elements of middle column. [Assuming the 2D Array to be a square matrix with odd dimension i.e. 3x3, 5x5, 7x7 etc...] Example, if the array contents is 3 5 4 7 6 9 2 1 8 Output through the function should be : Middle Row :769 Middle column : 5 6 1arrow_forwardC++ Program (Markov matrix) An n by n matrix is called a positive Markov matrix if each element is positive and the sum of the elements in each column is 1. Write the following function to check whether a matrix is a Markov matrix. const int SIZE = 3; bool isMarkovMatrix(const double m[][SIZE]); Write a test program that prompts the user to enter a 3 by 3 matrix of double values and tests whether it is a Markov matrixarrow_forward
- Task - Encode a string (C Language) Modify Project #2, Task #1 (given below) so that input characters are command line arguments. Requirements Name your program project5_encode.c. Input characters are command line arguments. There can be any number of command line arguments. Assume the total number of input characters is no more than 1000. Character handling library functions in ctype.h are allowed. The program should include the following function: void encode(char *input, char *output); The function expects input to point to a string containing the string to be encoded, output to point to a string containing the result. The program should also check if the number of arguments on the command line is greater than or equal to 2. If the number of arguments is 1, the program should display the message "Invalid input!". Examples (your program must follow this format precisely) Example #1 $ ./a.out 7 + 8Output: 3_4 Example #2 $ ./a.out usf.eduOutput: ayl_kja Example #3 $…arrow_forwardQ5 (a) What is the data type of pointer variables? Suppose that we don't know the name of a variable but we do know its address. Can we access the contents of that variable? Explain briefly. (b) Write a program which defines three integer variables, varl, var2 and var3, & initializing them to the values 100, 200 & 300, it then prints out their addresses. Needed code in C++ Only part Barrow_forwarda. Write a statement that declares votes to be pointer of type int. b. Write a C++ code that dynamically creates a two-dimensional array of 50 rows and 10 columns and votes contains the base address of that array. c. Write a C++code that outputs the data stored into the array votes one row per line. d. Write a C++ code that deallocates the memory space occupied by the two-dimensional array to which votes points.arrow_forward
- Please solve and show steps, work, and information related to this problem. Thank you. The following C++ code performs a set of various arithmetic operations using both pointers and references: Fill in a memory table that shows the final values for both function a and function b. Indicate the final values of each parameter, passed in variable(s), and the return value of the function. Provide a separate copy of this memory table for each function.arrow_forward1. Assuming the base address of array A is in $X20, and base address of array B is in $X21. Also assume variables i and k are stored in register $X25 and $X26, respectively. What are the corresponding LEGV8 code for the following C code statements? a) A [ 8] = B[ 8] +B[ 2]- 16 b) A [i+ 4] = 4*A[ i] - k c) B[8] = 2*A[i-k]arrow_forwardObjectives: practice with math, while-loops, sentinels, input validation, functions Starting with the provided file circles.py, write a program that uses functions to compute the area and circumference of a circle of a user-specified radius. The program consists of a main () function and two other functions, as follows: main (): Asks the user for the radius of a circle (floating point number). If the user enters a radius of zero, the program prints “Goodbye!" and ends. If the user enters a negative radius, the program prints “Invalid radius!", and asks again for a radius, and keeps asking until the user enters zero or a positive number. If the user enters a positive number, the program calls the two other functions and prints: A circle of radius R has circumference C and area A. (where R is the radius number, C is the calculated circumference, and A is the calculated area.) After printing the circumference and area, the program asks again for a new radius. [20 pts] circumference (r) :…arrow_forward
- Problem 6 (TOP 3) Write a function called top3(d) that takes a dictionary as its single input parameter. The input dictionary will always have integers for its values. The function will find the three largest values in the dictionary and return a list of value-key pairs (as a list) for these three values. The output of the returned list will be in decreasing order of values iterate through the list finding the three greatest integers in the dictionary and then print them out (along with their keys). {'a': 100, 'b': 400, 'с':300, 'd': 50ө, 'е':250'} top3(d) >>> d %3D >>> big3 >>> print (big3) [ [500, 'd'], [400, 'b'], [300, 'с'] ] %3D Page 4 of 5 You can assume that (1) the dictionary has at LEAST three key:value pairs and that (2) the values in the dictionary are UNIQUE. Note: the output has a value-key ordering instead of key-value ordering.arrow_forwardFill in the blanks. Line # Code 1 i-1 2 for (x = 2; xarrow_forward(python) 10. Create a function based on the following information: Your mission is to encrypt a secret message (text only, without special chars like "!", "&", "?" etc.) using Caesar cipher where each letter of input text is replaced by another that stands at a fixed distance. For example ("a b c", 3) == "d e f" Input: A secret message as a string (lowercase letters only and white spaces) and number to move text Output: The same string, but encrypted Return: The same string, but encryptedarrow_forwardarrow_back_iosSEE MORE QUESTIONSarrow_forward_ios
Recommended textbooks for you
- Database System ConceptsComputer ScienceISBN:9780078022159Author:Abraham Silberschatz Professor, Henry F. Korth, S. SudarshanPublisher:McGraw-Hill EducationStarting Out with Python (4th Edition)Computer ScienceISBN:9780134444321Author:Tony GaddisPublisher:PEARSONDigital Fundamentals (11th Edition)Computer ScienceISBN:9780132737968Author:Thomas L. FloydPublisher:PEARSON
- C How to Program (8th Edition)Computer ScienceISBN:9780133976892Author:Paul J. Deitel, Harvey DeitelPublisher:PEARSONDatabase Systems: Design, Implementation, & Manag...Computer ScienceISBN:9781337627900Author:Carlos Coronel, Steven MorrisPublisher:Cengage LearningProgrammable Logic ControllersComputer ScienceISBN:9780073373843Author:Frank D. PetruzellaPublisher:McGraw-Hill Education
Database System Concepts
Computer Science
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:McGraw-Hill Education
Starting Out with Python (4th Edition)
Computer Science
ISBN:9780134444321
Author:Tony Gaddis
Publisher:PEARSON
Digital Fundamentals (11th Edition)
Computer Science
ISBN:9780132737968
Author:Thomas L. Floyd
Publisher:PEARSON
C How to Program (8th Edition)
Computer Science
ISBN:9780133976892
Author:Paul J. Deitel, Harvey Deitel
Publisher:PEARSON
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781337627900
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
Programmable Logic Controllers
Computer Science
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education