Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Within C we access external devices by means of a pointer i.e. address. The address could point to any memory mapped device i.e. Ram, Rom, Duart, Disk drives etc. Therefore there is no difference between accessing area in Ram or a file on a disk. However accessing devices usually require an initialization program, within C this is achieved by the fopen/fclose commands. The syntax of the fopen command is void main() { FILE *name; name = fopen(device or file name , access); if (name == NULL ) { printf("cannot open the file \n\r"); exit(1); } } The device or file name is usually machine dependent i.e. VMS "dsk$usr:[en_staff.entjmc]file.ext" Unix "dsk$usr:en_staff\entjmc\file.ext" Mac "dskname:folder:folder:file"; PC "drive name:\directory\file.ext"; By default the current disk and directory are taken if not specified. The access describes the write/read privilege and type of data stored i.e. text or binary. Text is used to describe sequential data while binary is standard random access data "r" Text file read only "w" Create a new Text file write only "a" Append to end of the text file "rb" Binary file read only "wb" Binary file write only "ab" Append to end of the binary file "r+" Text file read and write "w+" Create a new text file for read and write "a+" Append to end of the text file for read and write "rb+" Binary file read and write "wb+" Create a binary file for read and write "ab+" Append to end of the binary file for read and write
For example to create a write access file called out.txt we use name = fopen("out.txt","w"); i.e file name = out.txt access = create /write text file It is important to close all channels when finished; this is achieved by fclose i.e. fclose(name);
The break statement The break statement, which was already covered in the switch.. case, can also be used in the loops. When a loop statement is encountered in the loops the co
Byteland county is very famous for luminous jewels. Luminous jewels are used in making beautiful necklaces. A necklace consists of various luminous jewels of particular colour. Nec
Write a C++ program that can be used to evaluate the credit worthiness of a client. The program reads the credit limit and the price and quantity of the item to be purchased by the
Access privileges 1. If the designer of the base class needs no one, not even a derived class to access a member, then that member should be made private. 2. If the designer
C program to demonstrate Pointer to variable: void p2a(int *); void main() { int x=10, *a,**b; int arr[5]; //poin
What is pointer?
Compound Assignment Operators Apart from the binary and the unary arithmetic operators, we also have compound assignment operators. These are +=, -=, *=, /=, %=. Using these op
Description - The TR-069 CPE WAN Management Protocol (CWMP) is a protocol that was created by the Broadband Forum (formally the DSL Forum) which sets out a common method for CPE de
how to find minimum number if shelves required
#solution for decode the code for smuglers
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd