Write c program to read the text book number, Computer Engineering

Assignment Help:

With a C program to read the text book number, title, author and publisher into a structure and print these values.

# include

# include

void main()

{

struct book

{

int number; char title[20]; char author[20];

char publisher[20];

};

struct book text;

clrscr();

printf("\nEnter details about the text book");

printf("\n

printf("\nEnter Book Number :");

scanf("%d",&text.number);

");

printf("\nEnter Book Title :");

scanf("%s",&text.title);

printf("\nEnter Name of the author :");

scanf("%s",&text.author);

printf("\nEnter Name of the publisher :");

scanf("%s",&text.publisher);

printf("\n\n\nDetails about the Book");

printf("\n");

printf("\nBook Number = %d",text.number); printf("\nBook Title = %s",text.title);

printf("\nAuthor = %s",text.author); printf("\nPublisher = %s",text.publisher); getch(); }

 


Related Discussions:- Write c program to read the text book number

Why is green screen more popular for compositing, Question: (a) Explain...

Question: (a) Explain clearly, from pre-production to post production how you would carry out the scene with multi-camera. (b) What are the there main aspects that should be

C program, #how to write c program for all types of beam reactions

#how to write c program for all types of beam reactions

Explain about of unicode, Q. Explain about of Unicode? This is a newer ...

Q. Explain about of Unicode? This is a newer International standard for character representation. Unicode offers a unique code for each character irrespective of Program, platf

Dynamic address translation - computer architecture, Dynamic address transl...

Dynamic address translation :  If, when executing an instruction, a CPU fetches an instruction located at a specific virtual address, or fetches data from a particular virtual

Network properties, Network Properties There are many properties are as...

Network Properties There are many properties are associated with interconnection networks:- 1) Topology: It signify how the nodes a network are organised. A variety of top

Explain what are the different hazards, There are situations, called hazard...

There are situations, called hazards that stop the next instruction in the instruction stream from implementing during its designated clock cycle. Hazards decrease the performance

Flow charts, n=(x*2)/(1=0) the value x=0 and is used to stop the algerithin...

n=(x*2)/(1=0) the value x=0 and is used to stop the algerithin.The calculation is repeated using values of x=0 is input. There is only a need to check for error positions. The va

Probabilistic hough transformation, The probabilistic Hough transform uses ...

The probabilistic Hough transform uses random sampling instead of an accumulator array. In this approach the number of random samples r, is not specified in the OpenCV call, but

What is digital signature, Digital Signature is Software to recognize si...

Digital Signature is Software to recognize signature

Give some examples of malicious data, Give some examples of malicious data....

Give some examples of malicious data. In May 2002 year, the Norton Anti-Virus software for Windows operating systems detected around 61000 malicious programs. Several of them a

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd