arrays and strings, Basic Computer Science

Assignment Help:
This is a C file.
1. The program starts by printing your name with an end sign ">". For example, "NAME >";
2. Then, you can type in a string. If the string is not "vi xxx", you print "I don''t know this command." You keep getting a string until you get a string starting with "vi". For example, "vi myp.c". You program will then open "myp.c" for reading. If the file does not exist, then there is nothing to read.
3. Read the file into a fixed array of "mytext[1000][ 81]". Presumably, the "myp.c" text file is not too large with each line 80 characters or fewer. If there are more characters than 80 in a line, you can just ignore the characters beyond 80.
4. Close your file.
5. Change all your texts to upper case, and display the first 20 lines on your screen.
6. Then, your program will wait for a command from the keyboard.
7. If you type ":w", your program will open the same file for writing, and write your array of text into that file.
8. If you type ":q!", your program will quite.
9. If your type ":w myp1.c", your program will open "myp1.c" and write into that file. You should always close your file after finish. Remember to use function calls instead of a program of one function.
Each function should be shorter than two pages.

Related Discussions:- arrays and strings

Bidirectional search-artificial intelligence, Bidirectional Search-Artifici...

Bidirectional Search-Artificial intelligence: We've concentrated so far on searches where the point of the search is to search a solution, not the path to the solution. In anot

Pseudocode, Design a program that will read a file of sales records and pro...

Design a program that will read a file of sales records and produce a sales report. Each record in the file contains a customer’s ID, name, a sales amount, and a validated GST code

Distinguish between s-http and ssl, QUESTION (a) Distinguish between S...

QUESTION (a) Distinguish between S-HTTP and SSL (b) What are the three basic security provided by SSL? (c) Discuss the limitations of SSL (d) State the port number us

What is Kernel-Level Thread in operating system?, In this technique, the ...

In this technique, the kernel knows about and handles the threads. No runtime system is required in this case. In place of thread table in each process, the kernel has a thread tab

Unix/linux, I need someone to help me with my Unix/Linux homework.

I need someone to help me with my Unix/Linux homework.

The skill of Assembly Language, The skill of Assembly Language Programming ...

The skill of Assembly Language Programming (AoA), Randy Hyde''s acclaimed text on assembly language programming, is the most-frequently recommended book on 80x86 assembly language

Entropy calculation, -(9/14)log2(9/14)-(5/9)log2(5/9) calculate with soluti...

-(9/14)log2(9/14)-(5/9)log2(5/9) calculate with solution.

Message quality and quantity, Message Quality and Quantity: Quality of...

Message Quality and Quantity: Quality of transmission is a very important .consideration in telecommunication. Voice communication can use a narrow bandwidth, which means the

Memory, Memory The memory unit is used for the storage of binary coded ...

Memory The memory unit is used for the storage of binary coded information. Information consists of instructions and data where: • Instructions are the coded pieces of infor

What is a signaling protocol, QUESTION (a) How VoIP Works and how VoIP ...

QUESTION (a) How VoIP Works and how VoIP helps today's business? (b) What is a signaling protocol? Explain about SIP components and their key benefits (c) What is IPTV? L

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd