Delete command, Computer Engineering

When the user is inputting commands into your shell, it should properly handle delete and backspace. When one of these characters is detected, you will need to remove one character from the screen. For this, you can simply print a "\b" character to the screen. This will act as the backspace. Remember also to remove the character from the buffer you are using to store the

input. Here are the byte values for the delete and backspace characters:

delete  --> 127

backspace  --> 8

When the user presses delete or backspace, it should remove a character from the screen. But, it should not remove any of the prompts. For example, if the console looks like the following after the user typed the character "a",

/home/ p r o j e c t s / cs200 / spring12 / s h e l l >a

then if the user presses the backspace twice, the console should still look like:

/home/ p r o j e c t s / cs200 / spring12 / s h e l l >

Notice that the prompt is still intact.

Posted Date: 4/3/2013 2:58:13 AM | Location : United States







Related Discussions:- Delete command, Assignment Help, Ask Question on Delete command, Get Answer, Expert's Help, Delete command Discussions

Write discussion on Delete command
Your posts are moderated
Related Questions
A persistent cookie is a cookie which is keeps in a cookie file permanently on the browser's computer. By default, cookies are formed as temporary cookies which keep only in the br

An HTML tag is a syntactical construct in the HTML language that abbreviates particular instructions to be implemented when the HTML script is loaded into a Web browser. It is like

Q. How to copy files from a drive and directory? You can copy files from a drive and directory other that the currently selected one. However in that case, you need to speci

Design a MOD-6 synchronous counter using J-K Flip-Flops. Ans: Design of Mod-6 Counter:   To design the Mod-6 synchronous counter, contain six counter states (that is, from

Illustrate the following list of consideration of laptop computers The following is a list for consideration: -  The processor must consume as little power as possible thus

Describe the scheme of capability lists to implement protection? Capability lists (C- lists): These lists are utilized to make sure that uses only access files that are e

What is SIMD? Single Instruction stream, Multiple Data stream (SIMD) shows an organization that contains many processing units under the supervision of a common control unit. A

What is a pointer? The register or memory location that having the address of an operand is known as a pointer.

WHAT IS COMPUTER? Computer is termed in the Oxford dictionary as "An automatic electronic apparatus for making controlling operations or calculations    which are expressible i

Explain the importance of computer architecture Studying the architecture implies working on machine language programs. However, this isn't practical when we design a computer