arrays and strings, Basic Computer Science

Assignment Help:
This is a C file.
1. The program starts by printing your name with an end sign ">". For example, "NAME >";
2. Then, you can type in a string. If the string is not "vi xxx", you print "I don''t know this command." You keep getting a string until you get a string starting with "vi". For example, "vi myp.c". You program will then open "myp.c" for reading. If the file does not exist, then there is nothing to read.
3. Read the file into a fixed array of "mytext[1000][ 81]". Presumably, the "myp.c" text file is not too large with each line 80 characters or fewer. If there are more characters than 80 in a line, you can just ignore the characters beyond 80.
4. Close your file.
5. Change all your texts to upper case, and display the first 20 lines on your screen.
6. Then, your program will wait for a command from the keyboard.
7. If you type ":w", your program will open the same file for writing, and write your array of text into that file.
8. If you type ":q!", your program will quite.
9. If your type ":w myp1.c", your program will open "myp1.c" and write into that file. You should always close your file after finish. Remember to use function calls instead of a program of one function.
Each function should be shorter than two pages.

Related Discussions:- arrays and strings

Computer files, criteria for classifying computer files

criteria for classifying computer files

Communication networks and local area networks, Communication Networks: ...

Communication Networks: Communication networks are made up of transmission lines, concentrators, switching mechanisms and non-data processing components. Due to increased comp

Data structure, #question.a tree has 0 off springs at each node. if it had ...

#question.a tree has 0 off springs at each node. if it had a label L, what will be the maximum number of nodes that the tree can have. only an expression involving the number of no

Nano programing, Nano programming using microcontrol and circuits

Nano programming using microcontrol and circuits

What is vpn? explain the vpn protocols, Question 1 What is IT auditing? Di...

Question 1 What is IT auditing? Discuss the three phases involved in the IT auditing Question 2 List and explain the two types of load balancing methods Question 3

Binary, Ask quwhat is binary estion #Minimum 100 words accepted#

Ask quwhat is binary estion #Minimum 100 words accepted#

How should an ideal hospital software be? , How Should an Ideal Software be...

How Should an Ideal Software be?  It should be easy to operate, with minimal training of nursing personnel.   Should be reliable, and thoroughly tested in various nur

Distinguish between the cryptoprovider and the managed class, QUESTION ...

QUESTION (a) Using the Luhn 10 check formula verify whether the following account number is compliant: 49927398716. Show details of your workings (b) Why is it advisable to

Flowchart looping, create a flowchart showing average score for the 3 quizz...

create a flowchart showing average score for the 3 quizzes assume that there are 3 sections each having 5 students the only valid number to be entered is 1-100 for the quizzes shou

Bidirectional search-artificial intelligence, Bidirectional Search-Artifici...

Bidirectional Search-Artificial intelligence: We've concentrated so far on searches where the point of the search is to search a solution, not the path to the solution. In anot

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd