For the makefile write down the targets and their prerequisites. If the dummy target install is removed, what targets will be built by the make command when it is run without an argument?write down the targets and their prerequisites. If the dummy target install is removed, what targets will be built by the make command when it is run without an argument?

What will be an ideal response?


Target Prerequisites
Install client, server
client client.o, miscc.o, rcopyc.o
client.o client.c, netc.h, rcopy.h
miscc.o miscc.c
rcopyc.o rcopyc.c, rcopy.h
server server.o, miscs.o, rcopys.o
server.o server.c, nets.h, miscs.h
miscs.o miscs.c
rcopys.o rcopys.c

If make install is removed, only the client will be built. This includes the targets client, client.o, miscc.o, rcopyc.o.

Computer Science & Information Technology

You might also like to view...

Which of the following is true about this code?

Suppose Animal is an interface that specifies a single method – speak. Now suppose the Dog class implements the Animal interface. In addition to the speak method, the Dog class also has a method called wagTail. Now consider the following code. ``` Animal a = new Dog(); a.wagTail(); ``` a) It will result in a compile-time error. b) It will result in a run-time error. c) It will call the speak method defined in the Animal interface. d) It will call the wagTail method defined in the Dog class. e) none of the above are true.

Computer Science & Information Technology

The _______ task must be completed before the Sense Keys task can be completed.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Which of the following most completely describes the steps for setting up event handling for a GUI component?

a. Create a class that represents the event handler, attach the JFrame to a JWindow object and register the event handler. b. Implement an appropriate event-listener interface and register the event handler. c. Create a class that represents the event handler and implement an appropriate event-listener interface. d. Create a class that represents the event handler, implement an appropriate event-listener interface and register the event handler.

Computer Science & Information Technology

The threat of ____ involves a malicious individual observing another's password by watching the victim while they are performing system login activities.

A. packet monkeys B. intellectual property C. shoulder surfing D. script kiddies

Computer Science & Information Technology