Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Explain advantage of static storage class
The second and more subtle use of 'static' is in connection with external declarations. With external constructs it provides a privacy mechanism that is very important for program modularity. By privacy, we mean visiblilty or scope restrictions on otherwise accessible variables or functions. The difference between 'extern' and 'static extern' is that static external variables are scope-restricted external variables. The scope is the remainder of the source file in which they are declared. Thus, they are unavailable to functions defined earlier in the file or to functions defined in other files, even if these functions attempt use the 'extern' storage class keyword.
Example:
void f()
{
}
Statements; /* count is not available here */
static int count; /* Static External Variable*/
void s()
Statemetns; /* count can be used here */
A interrupt that can be turned off by the programmer is called as Maskable interrupt.
how to hack facebook account?
Discuss the advantages of Electronics Data Exchange (EDI). Advantages of EDI: Electronics Data Exchange's saves needless re-capture of data. It leads to faster transfer of d
Zero address instruction format is used for (A) RISC architecture. (B) CISC architecture. (C) Von-Neuman architecture. (D) Stack-organized architecture.
S tends to aAS/a and A tends to SbA/SS/ba
Describe the essential properties of the Real Time operating systems. Real time operating system has following essential properties: Time constraint result Priority
What is Locking? When two users at the same time attempt to access the similar data record, this is synchronized by a lock mechanism
Explain new services of CPU Based Exchange. These new services are termed as supplementary services and several of the prominent ones are given below as: Category 1:
Suppose you have to develop an error recovery protocol for a link that is unreliable and delay sensitive, which of the following protocol would you choose? (i) Stop & wait.
Write a program that computes the minimum and maximum of elements in an array in Assembly 8086.
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd