subject

Write a program using the "execvp" command to execute commands given from the command line. For example: the "./a. out who would run the "who" command. The program should support programs with arguments. Other examples could be: ./a. out cp bigfile. txt anotherfilename. txt ./a. out ls -1 /usr ./a. out md5sum bigfile You will overwrite your own executable with the new unix command that is the passed to your program. The program should be able to handle any number of command arguments up to 50. Using the getrusage() function which is located in sys/resource. h find out what your child is doing. Print out the time your child spent in user mode and kernel mode. Comment in your report on what you found. Report Individual work only (no collaboration is allowed). Submit via Canvas. Along with the program source code, please also submit a short report (< 1 page) including the details of your implementation, such as on what platform (machine) did you develop and test your programs, what compilers you use, and how you compiled your programs, etc. You may also include any other discussion that you think is relevant. Please do NOT submit compiled binary files. Code from non-class sources does must be cited, and your program must contain original content. Write a program using the "execvp" command to execute commands given from the command line. For example: the "/a. out who would run the "who" command. The program should support programs with arguments. Other examples could be: ./a. out cp bigfile. txt anotherfilename. txt /a. out ls -1 /usr /a. out md5sum bigfile You will overwrite your own executable with the new unix command that is the passed to your program. The program should be able to handle any number of command arguments up to 50. Using the getrusage() function which is located in sys/resource. h find out what your child is doing. Print out the time your child spent in user mode and kernel mode. Comment in your report on what you found.

ansver
Answers: 3

Other questions on the subject: Computers and Technology

image
Computers and Technology, 22.06.2019 17:00, Janznznz1121
Your computer running windows 10 is doing some very strange things with the operating system. you are fairly certain it is not a hardware issue. you need to try to get further insight into what is going on within the operating system. which tool would be best suited for this?
Answers: 2
image
Computers and Technology, 23.06.2019 03:10, kyleereeves2007
Acomputer has a two-level cache. suppose that 60% of the memory references hit on the first level cache, 35% hit on the second level, and 5% miss. the access times are 5 nsec, 15 nsec, and 60 nsec, respectively, where the times for the level 2 cache and memory start counting at the moment it is known that they are needed (e. g., a level 2 cache access does not even start until the level 1 cache miss occurs). what is the average access time?
Answers: 1
image
Computers and Technology, 23.06.2019 19:30, wilkinsonei4069
Anul 2017 tocmai s-a încheiat, suntem trişti deoarece era număr prim, însă avem şi o veste bună, anul 2018 este produs de două numere prime, 2 şi 1009. dorel, un adevărat colecţionar de numere prime, şi-a pus întrebarea: “câte numere dintr-un interval [a, b] se pot scrie ca produs de două numere prime? “.
Answers: 1
image
Computers and Technology, 24.06.2019 02:30, sha273
Which option completes the explanation for conflict of interest in an organization
Answers: 1
You know the right answer?
Write a program using the "execvp" command to execute commands given from the command line. For exam...

Questions in other subjects:

Konu
Physics, 19.04.2021 17:10