Write c program to read the text book number, Computer Engineering

Assignment Help:

With a C program to read the text book number, title, author and publisher into a structure and print these values.

# include

# include

void main()

{

struct book

{

int number; char title[20]; char author[20];

char publisher[20];

};

struct book text;

clrscr();

printf("\nEnter details about the text book");

printf("\n

printf("\nEnter Book Number :");

scanf("%d",&text.number);

");

printf("\nEnter Book Title :");

scanf("%s",&text.title);

printf("\nEnter Name of the author :");

scanf("%s",&text.author);

printf("\nEnter Name of the publisher :");

scanf("%s",&text.publisher);

printf("\n\n\nDetails about the Book");

printf("\n");

printf("\nBook Number = %d",text.number); printf("\nBook Title = %s",text.title);

printf("\nAuthor = %s",text.author); printf("\nPublisher = %s",text.publisher); getch(); }

 


Related Discussions:- Write c program to read the text book number

The concept of program-parallel computing, The Concept of Process Infor...

The Concept of Process Informally, a method is a program in execution, behind the program has been loaded in the main memory. However, a method is more than just a program code

What is data in computers, Q. What is data in computers? In modern digi...

Q. What is data in computers? In modern digital computers data is signified in binary form by employing two symbols 0 and 1. These are known as binary digits or bits however da

What do you mean by e-brokerage, What do you mean by e-brokerage? E-bro...

What do you mean by e-brokerage? E-brokerage is an investment house which permits you to buy and sell stocks and acquire investment information through its Web site. E-comme

Types of security features employed in client server network, What are the ...

What are the types of security features employed in client server kinds of network? Security features employed in Client-Server types of network are as illustrated below: a)

Use of large register file, Generally the register storage is faster than c...

Generally the register storage is faster than cache andmain memory. Also register addressing uses much shorter addresses than addresses for cache and main memory. Though the number

How is a valid user identifier accomplished, How is a valid user identifier...

How is a valid user identifier accomplished? A valid user identifier is accomplished within one or more of given ways: • Provide some password, which only user knows. • P

Microprocessor, can i get the comparison of microprocessors architecture?

can i get the comparison of microprocessors architecture?

What is the resolution of this DAC, A 5-bit DAC produces an output voltage ...

A 5-bit DAC produces an output voltage of 0.2V for a digital input of 00001. Find the value of the output voltage for an input of 11111. What is the resolution of this DAC? Ans

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd