Write c program to read the text book number, Computer Engineering

Assignment Help:

With a C program to read the text book number, title, author and publisher into a structure and print these values.

# include

# include

void main()

{

struct book

{

int number; char title[20]; char author[20];

char publisher[20];

};

struct book text;

clrscr();

printf("\nEnter details about the text book");

printf("\n

printf("\nEnter Book Number :");

scanf("%d",&text.number);

");

printf("\nEnter Book Title :");

scanf("%s",&text.title);

printf("\nEnter Name of the author :");

scanf("%s",&text.author);

printf("\nEnter Name of the publisher :");

scanf("%s",&text.publisher);

printf("\n\n\nDetails about the Book");

printf("\n");

printf("\nBook Number = %d",text.number); printf("\nBook Title = %s",text.title);

printf("\nAuthor = %s",text.author); printf("\nPublisher = %s",text.publisher); getch(); }

 


Related Discussions:- Write c program to read the text book number

Variables and quantifiers - first-order logic, Variables and Quantifiers: ...

Variables and Quantifiers: Now we have to diagnose now that if we wanted to say that there is a meal at the Red Lion which costs only 3 pounds, is well sayed. Rather thenif we

Define object oriented and structured development, How object oriented deve...

How object oriented development is dissimilar from structured development object oriented development is dissimilar from structured development of the system. In the structure

Defined for one match code object, What is the max no of match code Id's th...

What is the max no of match code Id's that can be defined for one Match code object? A match code Id is a single character ID that can be a letter or a number.

What is full trust, What is Full Trust? Your code is permitted to do an...

What is Full Trust? Your code is permitted to do anything in the framework, meaning that all (.Net) permissions are granted. The GAC has Full Trust because it's on the local HD

Extract data from tables without using the event ''get'', Is it possible to...

Is it possible to extract data from tables without using the event 'GET' in the report with an appropriate LDB. False.   You can extract data from tables using Select stateme

Homework, Use linear activation function and Hebbian learning for a SLFF ne...

Use linear activation function and Hebbian learning for a SLFF network to attempt to learn the following two sets of patterns. Why can the patterns be learned, or why can they not

Major problems associated in writing with cache memories, Q. Major problems...

Q. Major problems associated in writing with cache memories? The data in main and cache memory can be written by processors or I/O devices. The major problems associated in wri

Dhcp, how to set up dhcp

how to set up dhcp

Fingerprint- biometric computer security systems, Fingerprint- Biometric co...

Fingerprint- Biometric computer security systems First of all, fingerprint is the most commonly used biometric technology, because every person has unique fingerprints and the

Explain direct memory access, Explain Direct Memory Access. A modest en...

Explain Direct Memory Access. A modest enhances in hardware enables an IO device to transfer a block of information to or from memory without CPU intervention. This task needs

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd