Delete command, Computer Engineering

When the user is inputting commands into your shell, it should properly handle delete and backspace. When one of these characters is detected, you will need to remove one character from the screen. For this, you can simply print a "\b" character to the screen. This will act as the backspace. Remember also to remove the character from the buffer you are using to store the

input. Here are the byte values for the delete and backspace characters:

delete  --> 127

backspace  --> 8

When the user presses delete or backspace, it should remove a character from the screen. But, it should not remove any of the prompts. For example, if the console looks like the following after the user typed the character "a",

/home/ p r o j e c t s / cs200 / spring12 / s h e l l >a

then if the user presses the backspace twice, the console should still look like:

/home/ p r o j e c t s / cs200 / spring12 / s h e l l >

Notice that the prompt is still intact.

Posted Date: 4/3/2013 2:58:13 AM | Location : United States







Related Discussions:- Delete command, Assignment Help, Ask Question on Delete command, Get Answer, Expert's Help, Delete command Discussions

Write discussion on Delete command
Your posts are moderated
Related Questions
What are the types of data warehouses? Various types of data warehouses are illustrated below: a) Financial Data Warehouses b) Insurance Data Warehouses c) Human Resou

Specify the goals of parsing. Goals: a. To check the validity of source string b. To agree on the syntactic structure of a source string. For invalid string this rep

Perform the - 48 - 23 operations using the 2's complement method. Ans. - 48 - 23 = - 48 + (-23)     -48     =  1 1 0 1 0 0 0 0     -23     =  1 1 1 0 1 0 0 1       = -71

Q. Explain Point-to-point Message Passing? In point to point message passing, one process transmits/receives message from/to another process. There are four communication modes

What are the stages of data mining? The procedure of data mining comprises three stages, which are given below: a) The initial exploration b) Model building c) Deploym

Bit Serial Associative Processor (BSAP) : When the associative processor accepts bit serial memory organization then it is known as bit serial associative processor. While only one

Consider that a list of record or a table is stored in the memory and you wish to find some information in that particular list. E.g. the list comprises three fields as displayed b

Recombination: Therefore during the selection and mating process then the GA repeatedly lines up pairs of individuals for reproduction. Hence the next question is how to gener

Artificial Intelligence Agents: We introduced what we'll be conversation about in Artificial Intelligence and why those things are necessary. This discussion is of course abou

How do I update an existing copy of the source to the current version? Ans) As the common code changes, you might need to update your copy to have the lastest version. To do tha