arrays and strings, Basic Computer Science

Assignment Help:
This is a C file.
1. The program starts by printing your name with an end sign ">". For example, "NAME >";
2. Then, you can type in a string. If the string is not "vi xxx", you print "I don''t know this command." You keep getting a string until you get a string starting with "vi". For example, "vi myp.c". You program will then open "myp.c" for reading. If the file does not exist, then there is nothing to read.
3. Read the file into a fixed array of "mytext[1000][ 81]". Presumably, the "myp.c" text file is not too large with each line 80 characters or fewer. If there are more characters than 80 in a line, you can just ignore the characters beyond 80.
4. Close your file.
5. Change all your texts to upper case, and display the first 20 lines on your screen.
6. Then, your program will wait for a command from the keyboard.
7. If you type ":w", your program will open the same file for writing, and write your array of text into that file.
8. If you type ":q!", your program will quite.
9. If your type ":w myp1.c", your program will open "myp1.c" and write into that file. You should always close your file after finish. Remember to use function calls instead of a program of one function.
Each function should be shorter than two pages.

Related Discussions:- arrays and strings

C programming, hello do have c programming experts

hello do have c programming experts

Explain TCP and UDP features in detail and compare, Which applications requ...

Which applications require TCP and why? Also specify which applications require UDP and why? A4) TCP is also known as connection-oriented: setup required between client and server

What are the different types of props, Question 1 Explain the importance o...

Question 1 Explain the importance of edge loops and anatomical body functions in animation Question 2 What are the three sets of curves for the hair system? Questio

Artificial intelligence-search in problem solving, Search in Problem Solvin...

Search in Problem Solving If Artificial Intelligence can notify the extra sciences about something, it is about trouble solving and, in exacting, how to search for solutions to

Distinguish between buffering and caching, QUESTION (a) Describe what y...

QUESTION (a) Describe what you understand by (i) "openness" and (ii) "Scalability" of a distributed system (b)What is the role of middleware in a distributed system? (c)

Trap doors and Logic Bombs, Trap doors:  This is a way of bypassing normal...

Trap doors:  This is a way of bypassing normal authentication procedure (windows/ operating system user name  and password) to access a system. Once a system is compromised (impac

Computer security, concepts and components of computer security

concepts and components of computer security

Write a long note on computer languages, Question 1 Explain the importan...

Question 1 Explain the importance of graphics in multimedia. What are few of the tips to keep in mind while using graphics for the web? Question 2 Write a long note on co

Write down dijkstra''s algorithm, QUESTION (a) Write down the Update ...

QUESTION (a) Write down the Update Step in the Dijkstra's algorithm explaining its complexity. (b) Propose a Generic Algorithm for Depth-First Search Algorithm, assuming

Perverse software, Perverse software: Perverse software is a program w...

Perverse software: Perverse software is a program which causes hindrances in other programs execution in such a way resulting in modification or complete destruction of data w

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd