Home
About Us
Contact Us
Bookmark
Saved Bookmarks
Current Affairs
General Knowledge
Chemical Engineering
UPSEE
BSNL
ISRO
BITSAT
Amazon
ORACLE
Verbal Ability
→
GATE
→
Cs 2022 in Gate
→
Which one of the following is NOT shared by the th...
1.
Which one of the following is NOT shared by the threads of the same process?(A) Stack(B) Address Space(C) File Descriptor Table(D) Message Queue
Answer»
Show Answer
Discussion
No Comment Found
Post Comment
Related InterviewSolutions
Consider the following C program:#include <stdio.h>typedef struct{char *a;char *b;} t;void f1(t s);void f2(t *p);main(){static t s = {"A", "B"};printf ("%s %s\n", s.a, s.b);f1(s);printf ("%s %s\n", s.a, s.b);f2(&s);}void f1(t s){s.a = "U";s.b = "V";printf ("%s %s\n", s.a, s.b);return;}void f2(t *p){p -> a = "V";p -> b = "W";printf("%s %s\n", p -> a, p -> b);return;}What is the output generated by the program ?(A) A BU VV WV W(B) A BU VA BV W(C) A BU VU VV W(D) A BU VV WU V
What is the output of the following program?#include <stdio.h>int funcf (int x);int funcg (int y);main(){int x = 5, y = 10, count;for (count = 1; count <= 2; ++count){y += funcf(x) + funcg(x);printf ("%d ", y);}}funcf(int x){int y;y = funcg(x);return (y);}funcg(int x){static int y = 10;y += 1;return (y+x);}(A) 43 80(B) 42 74(C) 33 37(D) 32 32
Consider the following C program which is supposed to compute the transpose of a given 4 x 4 matrix M. Note that, there is an X in the program which indicates some missing statements. Choose the correct option to replace X in the program.#include<stdio.h>#define ROW 4#define COL 4int M[ROW][COL] = {1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16};main(){int i, j, t;for (i = 0; i < 4; ++i){X}for (1 = 0; i < 4; ++i)for (j = 0; j < 4; ++j)printf ("%d", M[i][j]);}A)for(j = 0; j < 4; ++j){ t = M[i][j]; M[i][j] = M[j][i]; M[j][i] = t;}B)for(j = 0; j < 4; ++j){ M[i][j] = t; t = M[j][i]; M[j][i] = M[i][j];}C)for(j = i; j < 4; ++j){ t = M[i][j]; M[i][j] = M[j][i]; M[j][i] = t;}D)for(j = i; j < 4; ++j){ M[i][j] = t; t = M[j][i]; M[j][i] = M[i][j];}(A) A(B) B(C) C(D) D
A program attempts to generate as many permutations as possible of the string, ‘abcd’ by pushing the characters a, b, c, d in the same order onto a stack, but it may pop off the top character at any time. Which one of the following strings CANNOT be generated using this program?(A) abcd(B) dcba(C) cbad(D) cabd
A sender is employing public key cryptography to send a secret message to a receiver. Which one of the following statements is TRUE?(A) Sender encrypts using receiver’s public key(B) Sender encrypts using his own public key(C) Receiver decrypts using sender’s public key(D) Receiver decrypts using his own public key
Which of the following commands or sequences of commands will rename a file x to file y in a Unix system?I. mv y, xII. mvx, yIII. cp y, x (rm x)IV. cp x, y (rm x)(A) II and III(B) II and IV(C) l and III(D) II only
Which of the following objects can be used in expressions and scriplets in JSP (Java Server Pages) without explicitly declaring them?(A) session and request only(B) request and response only(C) response and session only(D) session, request and response
Which level of locking provides the highest degree of concurrency in a relational data base?(A) Page(B) Table(C) Row(D) Page, table and row level locking allow the same degree of concurrency
Which one of the following statements is FALSE?(A) TCP guarantees a minimum communication rate(B) TCP ensures in-order delivery(C) TCP reacts to congestion by reducing sender window size(D) TCP employs retransmission to compensate for packet loss
A software organization has been assessed at SEI CMM Level 4. Which of the following does the organization need to practice beside Process Change Management and Technology Change Management in order to achieve Level 5 ?(A) Defect Detection(B) Defect Prevention(C) Defect Isolation(D) Defect Propagation
Reply to Comment
×
Name
*
Email
*
Comment
*
Submit Reply
Your experience on this site will be improved by allowing cookies. Read
Cookie Policy
Reject
Allow cookies