Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Within C we access external devices by means of a pointer i.e. address. The address could point to any memory mapped device i.e. Ram, Rom, Duart, Disk drives etc. Therefore there is no difference between accessing area in Ram or a file on a disk. However accessing devices usually require an initialization program, within C this is achieved by the fopen/fclose commands. The syntax of the fopen command is void main() { FILE *name; name = fopen(device or file name , access); if (name == NULL ) { printf("cannot open the file \n\r"); exit(1); } } The device or file name is usually machine dependent i.e. VMS "dsk$usr:[en_staff.entjmc]file.ext" Unix "dsk$usr:en_staff\entjmc\file.ext" Mac "dskname:folder:folder:file"; PC "drive name:\directory\file.ext"; By default the current disk and directory are taken if not specified. The access describes the write/read privilege and type of data stored i.e. text or binary. Text is used to describe sequential data while binary is standard random access data "r" Text file read only "w" Create a new Text file write only "a" Append to end of the text file "rb" Binary file read only "wb" Binary file write only "ab" Append to end of the binary file "r+" Text file read and write "w+" Create a new text file for read and write "a+" Append to end of the text file for read and write "rb+" Binary file read and write "wb+" Create a binary file for read and write "ab+" Append to end of the binary file for read and write
For example to create a write access file called out.txt we use name = fopen("out.txt","w"); i.e file name = out.txt access = create /write text file It is important to close all channels when finished; this is achieved by fclose i.e. fclose(name);
At a shop of marbles, packs of marbles are prepared. Packets are named A, B, C, D, E …….. All packets are kept in a VERTICAL SHELF in random order. Any numbers of packets with thes
I need help programing this... In this exercise, you will create a program for the sales manager at Computer Haven, a small business that offers motivational seminars to local comp
Normal 0 false false false EN-US X-NONE X-NONE
MAT LAB programming Project Description: Just for who are PROFESSIONAL IN MATLAB i have simulation and i would like to simulate the equation in ,and test the all simulatio
direction[] = {L,R,R,L,L,R,R,R,R,L,Z} length[]= {2,2,1,1,1,2,5,2,2,3,1}
How do i write a code in C++ to bubblesort in linked list
what is the first thing I need to know about Programming?
What is the difference between early binding and late binding? What are advantages of early binding? a.) Late binding refers to function calls which aren't resolved until run t
Default argument: When the argument is missing then the function will read the default value of the missing argument. To make use of default argument functionality the argu
Friend classes are used when two or more classes are designed to work together and require access to each other's execution in ways that the rest of the world shouldn't be permitte
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd