Write c program to read the text book number, Computer Engineering

Assignment Help:

With a C program to read the text book number, title, author and publisher into a structure and print these values.

# include

# include

void main()

{

struct book

{

int number; char title[20]; char author[20];

char publisher[20];

};

struct book text;

clrscr();

printf("\nEnter details about the text book");

printf("\n

printf("\nEnter Book Number :");

scanf("%d",&text.number);

");

printf("\nEnter Book Title :");

scanf("%s",&text.title);

printf("\nEnter Name of the author :");

scanf("%s",&text.author);

printf("\nEnter Name of the publisher :");

scanf("%s",&text.publisher);

printf("\n\n\nDetails about the Book");

printf("\n");

printf("\nBook Number = %d",text.number); printf("\nBook Title = %s",text.title);

printf("\nAuthor = %s",text.author); printf("\nPublisher = %s",text.publisher); getch(); }

 


Related Discussions:- Write c program to read the text book number

Perceptrons of artificial neural networks, Perceptrons: However the we...

Perceptrons: However the weights in any ANN are usually just real numbers and the learning problem boils down to choosing the best value for each weight in the network. Becaus

Drawbacks to resolution theorem, Drawbacks to resolution theorem: Thus...

Drawbacks to resolution theorem: Thus the underlining here identifies some drawbacks to resolution theorem proving: It only works for true theorems that can be expresse

Describe the interpretation features of vba, VBA is licensed to Microsoft a...

VBA is licensed to Microsoft and this compatible with and only Microsoft products. Code written is compiled by an intermediate language known as P-code and this is stored in hostin

Explain the technique used in asymmetric key cryptography, Explain the tech...

Explain the technique used in the asymmetric Key Cryptography. Asymmetric or public-key cryptography be different from conventional cryptography in which key material is bound

What features are needed to implement top down parsing, The features are ne...

The features are needed to implement top down parsing are? Ans. Source string marker, Prediction making mechanism and also matching and backtracking mechanism features are need

Generic techniques developed - artificial intelligence, Generic Techniques ...

Generic Techniques Developed: In the pursuit of solutions to various problems in the above categories, various individual fundamental techniques have sprung up which have been

What is the working of sound cards, Q. What is the working of Sound cards? ...

Q. What is the working of Sound cards? Multimedia has become a very significant part of today's PC. Home user wants hear songs and watch movies. The Software developer hacking

How many bits of data will be produced if voice is converted, If voice is c...

If voice is converted to digital form using PCM, how many bits of data will be produced in half a second? While voice is converted to digital by using PCM that is Pulse Code Mo

What is functions of input - output interface, Q. What is Functions of Inpu...

Q. What is Functions of Input - Output Interface? An I/O interface is bridge between processor and I/O devices. It controls data exchange between external devices and main mem

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd