Assume you want to use a featurethat is optional for systems to support. Describe three potential strategies to dealing with the possibility that the featuremight not be present on a system on which you want to run your program.
What will be an ideal response?
Use sysconf to determine if the feature is supported. If it is, use it. Otherwise, potential approaches are: 1. Reduce your program to use the least common denominator—whatever featurethat is supported universally that allows you to accomplish the task at hand.
2. If this is insuf?cient, consider providing your own implementation of the featurefor the platforms missing it.
3. If all else fails, you could run your program in a virtual machine using a guest operating system that provides the desired feature. You can communicate with the processes running in the host (native) operating system with sockets, if necessary
You might also like to view...
private fields of a base class can be accessed in a derived class
a) by calling private methods declared in the base class b) by calling public or protected methods declared in the base class c) directly d) All of the above
Discuss what a firewall is and its role in a company's overall security scheme.
What will be an ideal response?
Explain the advantages and disadvantages of wireless networks
What will be an ideal response?
Update salary of newly transferred employee from EMPLOYEE table to EMP30 table with MERGE statement, and INSERT employees who are not in EMP30 table.
Use the N2 Corporation database tables to design the following subqueries. (Use the spooling method to capture all queries and results in the CHAP8SP1.LST file.)