arrays and strings, Basic Computer Science

Assignment Help:
This is a C file.
1. The program starts by printing your name with an end sign ">". For example, "NAME >";
2. Then, you can type in a string. If the string is not "vi xxx", you print "I don''t know this command." You keep getting a string until you get a string starting with "vi". For example, "vi myp.c". You program will then open "myp.c" for reading. If the file does not exist, then there is nothing to read.
3. Read the file into a fixed array of "mytext[1000][ 81]". Presumably, the "myp.c" text file is not too large with each line 80 characters or fewer. If there are more characters than 80 in a line, you can just ignore the characters beyond 80.
4. Close your file.
5. Change all your texts to upper case, and display the first 20 lines on your screen.
6. Then, your program will wait for a command from the keyboard.
7. If you type ":w", your program will open the same file for writing, and write your array of text into that file.
8. If you type ":q!", your program will quite.
9. If your type ":w myp1.c", your program will open "myp1.c" and write into that file. You should always close your file after finish. Remember to use function calls instead of a program of one function.
Each function should be shorter than two pages.

Related Discussions:- arrays and strings

Wide area networks and metropolitan area networks, Metropolitan Area Networ...

Metropolitan Area Networks : These type of networks generally cover specific metropolitan area and provide to them all the services.  Wide Area Networks (WANs): Wide Are

Constant bit rate atm theory, For the connections that request a static amo...

For the connections that request a static amount of bandwidth that is continuously available during the connection lifetime. Is intended to support real time applications requiring

Create a flowchart that displays the student''s avera, Ask questiCreate a f...

Ask questiCreate a flowchart that displays the student''s average score for three quizzes. + Assume that there are 3 sections each having 5 students + The only valid number to be

Telecommunication protocols, TELECOMMUNICATION PROTOCOLS: The two majo...

TELECOMMUNICATION PROTOCOLS: The two major components relating to a WAN are the Protocol and the Media. The media are the actual path ways that the protocol travels on. The ne

Internal storage, Internal Storage: Internal storage is also known as ...

Internal Storage: Internal storage is also known as main, primary, or (for historical reasons) core storage, or, memory. It is used to hold those instructions and data require

Describe gamma and its importance, Question 1 Describe HSV and CMYK color ...

Question 1 Describe HSV and CMYK color models Question 2 Describe gamma and its importance Question 3 What are the steps involved in image manipulation? Que

Data communications and networks, A magazine publisher based in Nairobi has...

A magazine publisher based in Nairobi has branch in Kisumu, and one in Mombasa. The company has kept in touch by telephone and courier service. Each office is networked. The networ

Probability, Suppose that of 100 computers checked for viruses 30 where inf...

Suppose that of 100 computers checked for viruses 30 where infected and 70 where not. If we select 10 computers at random what is the probability that at most 4 of them are infecte

Consistency or data in dbms, Consistency or data in DBMS Consistency - da...

Consistency or data in DBMS Consistency - data in DBMS(Database) is accurate in modeling real world, follows integrity constraints User may ensure transaction consistent by itsel

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd