Change the hello program to print out your name

Assignment Help Basic Computer Science
Reference no: EM13232767

The contents of the file are given below. Name the file hello.c. #include #include int main() { printf("hello your-name-here\n"); exit(0); } Now, Change the hello program to print out your name. Type "script" to begin recording all output. Display your program by typing "cat hello.c". Now recompile your new program and run it. Type "exit" to end the recording session. The output file is called "typescript". Print out this file. (You might want to transfer it to your local machine first using WINSCP.)

Reference no: EM13232767

Questions Cloud

Define the phenylalanine and synthesize epinephrine : Dopamine is formed from an amino acid and can further beconverted to epinephrine or adrenaline. Starting withphenylalanine, synthesize epinephrine
Explain what are the structures of the products : What are the structures of the products that would be expected to be obtained on hydration of 1-octyne and 2-octyne?
When accessing the remote linux machine : When accessing the remote Linux machine
How many would you expect to have more than 2 imperfections : A sheet of silicon contains 100 microprocessors all of which are the same size and type. The production process generates 20 imperfections on each sheet. 1) What is the probability that a microprocessor will have 0 imperfections
Change the hello program to print out your name : The contents of the file are given below. Name the file hello.c. #include #include int main() { printf("hello your-name-here\n"); exit(0)
Describe the viral transduction and genetic translocation : Nitric oxide is used in several signaltransducton pathways, Deine Viral transduction, Discuss genetic translocation
Investigate fat32 versus ntfs write a short summary of them : Investigate FAT32 versus NTFS and write a short summary of them
What were jons economic costs while attending college : Jon Breeks quit his job in a bicycle shop, where he earned $15,000 per year, to become a graduate student in economics. At the university he attended, he spent $2,000 on books, $1,000 on cough medicine, and earned $12,000 as an economics instructo..
Define the molecular etiology : what are some ethical consideration for using anima lmodels during biomedical reseach, Discuss the molecular etiology of gout and how it may be resolved

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Design a finite state machine similar to a 3 bit counter

design a finite state machine similar to a 3 bit counter. in this case you will have 3 bits of state which you can think of as a 3 bit unsigned number, but this time the counter must count by 3s--the sequence it goes through should be 0, 3, 6, 1, ..

  Examples of emerging technologies

Assume you are an Information Systems educator, and you have been asked to make an article about emerging technologies and how important it is to be prepared to adapt to new technologies

  The initialization program

The initialization program will start with how much you have in the cash register and in what denominations the money is in.

  List out some ways to improve the interaction design

List out some ways to improve the interaction design of the poor web site.(must be at least 70 words long)

  Implementation for the r-type instructions add, or, and and

figuring out how to add an implementation for the R-type instructions ADD, OR, and AND. This is a MIPS architecture. // Incomplete behavioral model of MIPS pipeline

  Explain elements of enterprise information security policy

Write and explain briefly the three kinds of information security policy as described by NIST SP 800-14. Write and explain briefly four elements that must be present in Enterprise Information Security Policy.

  Write code to de-vowel an input string

Write code to "de-vowel" an input string. Assume that the user provides input containing only the characters a through z (and all lowercase). Your code should create an output string that deletes all vowels from the input string, pushing the lette..

  Describe and discuss

Describe and discuss how the redesigned network needs to operate, the possible network design solutions and why the new design is more suitable for the introduction of mobile devices.

  Action of violation of principle of least common mechanism

Discuss how this technique might prevent legitimate users from accessing the system. Why is this action a violation of the principle of least common mechanism?

  Converting value stored in register to string representation

For this part of lab exercise, determine problem of converting value stored in a register to string representation of that value in decimal form.

  Write a method, insertat, that takes four parameters

write a method, insertAt, that takes four parameters: an array of integers; the length of the array; an integer, say insertItem; and an interger, say, index.

  Storage of an unordered collection of items

Storage of an unordered collection of items that facilitates efficient, random access of items based on an item's position in the collection.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd