Delete command, Computer Engineering

Assignment Help:

When the user is inputting commands into your shell, it should properly handle delete and backspace. When one of these characters is detected, you will need to remove one character from the screen. For this, you can simply print a "\b" character to the screen. This will act as the backspace. Remember also to remove the character from the buffer you are using to store the

input. Here are the byte values for the delete and backspace characters:

delete  --> 127

backspace  --> 8

When the user presses delete or backspace, it should remove a character from the screen. But, it should not remove any of the prompts. For example, if the console looks like the following after the user typed the character "a",

/home/ p r o j e c t s / cs200 / spring12 / s h e l l >a

then if the user presses the backspace twice, the console should still look like:

/home/ p r o j e c t s / cs200 / spring12 / s h e l l >

Notice that the prompt is still intact.


Related Discussions:- Delete command

What is interpolated resolution, Q. What is Interpolated Resolution? Ev...

Q. What is Interpolated Resolution? Every Scanner is accompanied by a software. This software can raise the apparent resolution of scan by a scheme known as Interpolation.  By

QUELING SYSTEM, Q.SHOW THAT AVERAGE NUMBER OF UNIT IN A (M/M/1) QUELING SYT...

Q.SHOW THAT AVERAGE NUMBER OF UNIT IN A (M/M/1) QUELING SYTEM IS EQUAL TO P/(1-p). NOTE:P=ROW

Enumerate in brief about the intranet security policy, Enumerate in brief a...

Enumerate in brief about the Intranet security policy An Intranet security policy is a very broad topic and it cannot be covered easily in few pages since it differs from situa

#project, how to build PVR set-top box using raspberry

how to build PVR set-top box using raspberry

Describe about the layered computer design, Describe about the Layered comp...

Describe about the Layered computer design Introduction Layered computer design focuses on computer design. It uses top-down, layered approach to design and also to improve

What is tcas, tCAS is the number of clock cycles required to access a parti...

tCAS is the number of clock cycles required to access a particular column of data in SDRAM. CAS latency is the column address strobe time, sometimes referred to as tCL.

Design and development of an information system, This assignment consists o...

This assignment consists of design and development of an information system. The first part of the assignment consists of the design, which includes construction of ER and DFD diag

Advantages of mpi, Advantages of MPI: Every process has its own loc...

Advantages of MPI: Every process has its own local variables It can be used on a broader range of problems than OpenMP It runs on either distributed or shared memor

Discuss the 5-level switching hierarchy recommended by ccitt, Discuss the 5...

Discuss the 5-level switching hierarchy recommended by CCITT. Hierarchical networks are able of handling heavy traffic where needed, and at similar time use minimal number of t

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd