For reading and for processing data of employee records stored in a file named employee.txt,the contents of it need to be reversed from end to beginning. Write a C program to read a file in serial way, and reverse the contents of the employee record and then, again traverse and read the record in the newly reversed file.
Q: The qualities of the technology used to wirelessly and automatically transfer photographs and videos...
A: Here is the solution with an explanation:-
Q: Poor communication and poor estimates are a major contributor to project failure.
A: Software development becomes successful if all parameters are working fine.
Q: Differentiate between wifi and winax
A: The Answer is given below step.
Q: What function do storage reports play in file server implementation?
A: Introduction: It is sometimes referred to as a Domain Name System. When we get access to a website, ...
Q: The design commonly used in one residential community is of majestic doors and windows. In this comm...
A: It is defined as the rate of change of a quantity y with respect to another quantity x. A derivative...
Q: If the buffer is unlimited and empty O a. Producer is blocked but consumer is not O b. Producer is n...
A: According to the question the producers does not block only when the buffer is the full and consumes...
Q: What measures should be followed to assure the stability and availability of a local area network?
A: Introduction: In computing, a local area network (LAN) collects small computers or other workstation...
Q: Which of the following are the two most critical tools for retrieving information from a database ma...
A: Introduction There are many tools or software used and access the information from the DBMS. followi...
Q: Identify three development paradigms that show a shift away from rigid adherence to the waterfall me...
A: Introduction: The software development life cycle includes a variety of approaches and models for tr...
Q: Describe what a hashing algorithm is in your own words. What is it, how is it used in digital forens...
A: Here is the answer with an explanation:-
Q: Describe the tools and technologies that are used to aid in the administration of information techno...
A: Introduction: IT project management is a process for coordinating, arranging, and ensuring transpare...
Q: Program for swift language by using operator precedence and associativity
A: The program is
Q: ------ is a tool used to view the text, numbers, shapes, and images * picture image O label -is prop...
A: Given multiple choice questions.
Q: You are a teacher of one programming course and you give to the students one exercise. In this exerc...
A: Each node doesn't have the same amount of space for the type of data it stores. They could store int...
Q: Many new and enhanced features are included in Microsoft Word 2016. Which feature of Word 2016 do yo...
A: Unification under a single drive: This feature lets a user to access a Microsoft Office document thr...
Q: What are the commercial implications of the cloud computing movement? Do you know how to work well w...
A: Intro Cloud computing might be a general term that involves delivering hosted services over the web...
Q: Create JavaScript code to display the nodeName and nodeType for all nodes in the current HTML docume...
A: In this JavaScript program we have to perform two of the projects in which 1) JavaScript code to di...
Q: How does the server's events get classified in the event viewer log? Any two incidents should be doc...
A: Information: It is an event that describes the successful completion of a job, such as the execution...
Q: What exactly is secondary storage, and how does it function?
A: Introduction: Device for Secondary Storage. A secondary storage device, also known as external memor...
Q: What exactly was the purpose of a "fat binary" in the first place
A: Given We know about the "fat binary".
Q: Explain and demonstrate the distinctions between local and global lighting in terms of computer grap...
A: Introduction: The notion that light sources can only directly enlighten things.
Q: Which of the following is correct? O a. A general tree can have a node with 3 children, but not a bi...
A: Solution: Explanation: a) A general tree can have a node with 3 children, but not a binary tree. In ...
Q: n that encodes this sequei
A: Matrix is a combination of rows and columns which are called cells at the point of intersection. A n...
Q: Describe the container of the active directory system in your own words. Any four elements of the co...
A: Introduction: Every network component is treated as an object in Active Directory. Objects may also ...
Q: Computer science What are some of the benefits of data modelling?
A: Introduction: The act of generating a visual representation of an entire information system or secti...
Q: Who invented the internet? •Did Al Gore Come Up With the Internet Idea? -Did not invent -Did utilise...
A: Given :- Who invented the internet? •Did Al Gore Come Up With the Internet Idea? -Did not invent -Di...
Q: Write a c program that creates an integer array of size 100, and fill this array with random numbers...
A: To solve given problem, first we must declare array of integer type of size 100. int a[100]; To assi...
Q: Fill in the blanks. Provide the number immediately before and after the given number in the given ba...
A: here we have given value of before and the after of present values.
Q: Computer science Conduct some study to see how CMMI might be applied to agile process frameworks.
A: Introduction: Conduct some studies to see how CMMI might be applied to agile process frameworks.
Q: What is a virtual desktop, and how does it work?
A: Introduction: The virtual desktop is a technique for grouping accessible groups of Windows to execut...
Q: Question 1: Consider following scenario for a program running on two computers A and B. Computer A E...
A: Below is the answer to above question. I hope this will meet your requirements...
Q: Which VLAN is intended to provide administrative access to network devices?
A: The Answer and detailed explanation are provided below. Please check.
Q: Fc for F.
A: NOTE: ACCORDING TO COMPANY POLICY WE CAN SOLVE ONLY 1 QUESTION. YOU CAN RESUBMIT THE QUESTION AGAIN ...
Q: hat are some of the network-layer services that a link-layer protocol may provide? What IP services ...
A: Lets see the solution.
Q: What is the definition of multiprogramming?
A: According to the question multi programming always done only when we use so many application on the ...
Q: Write a jagged array program through following logic 1. Using in dex number 2. Intialize withou...
A: Since no programming language is mentioned, I am using c#. Algorithm: Start Declare a Jagged array ...
Q: IT projects involve using hardware, software, and networks to create a product, service, or result.
A: IT project management is the process of planning, organizing, and defining responsibility for the ac...
Q: Consider each of these four (4) factors while evaluating cloud computing
A: Dependability in cloud computing can mean various things to various individuals. For some's purposes...
Q: Computer science The following are some examples of problems that might be well explained using sim...
A: Introduction: Even if the issues are difficult to answer analytically, a simulation model is a param...
Q: Write the assembly instruction to create the constant: 1,235,456,423,213
A: Introduction: Here we are required to write the assembly instruction to create the constant: 1,235,4...
Q: What is the most significant distinction between operating systems for mainframes and notebook compu...
A: Introduction: The mainframe OS is network software that enables the computer to run programs, connec...
Q: What are the difficulties that firms face while attempting to migrate to a cloud-based infrastructur...
A: Introduction What are the difficulties that firms face while attempting to migrate to a cloud-base...
Q: A PDA machine configuration (q,w.y) can be :represented as (current state, stack content, unprocesse...
A:
Q: My problem is my code does not recognize the file path.
A: As we have used, File file = new File("dataset.csv"); it will try to open a file named dataset.csv T...
Q: Why is good enough important in application development?
A: - We need to talk about why good application development is required and important factors supportin...
Q: Examine and contrast the key connections between mobile devices and cloud computing. What are the ad...
A: Introduction: Mobile cloud computing uses cloud computing to provide applications to mobile devices....
Q: Which of the following is correct to Greedy Algorithm?
A: Lets understand greedy algorithm in detail: Greedy algorithm focuses on the best it can get that the...
Q: List and briefly describe the several layers of schemes that allow the operating system to treat a c...
A: RAID RAID, an acronym for the "redundant array of independent discs," is a method for storing data a...
Q: QUESTION 26 Kerberos Authentication: A. Which server issues the session ticket? B. Which server issu...
A: Find the answer with reason given as below :
Q: the function used to read the number from text box O val
A: Please find the answer below :
2.
For reading and for processing data of employee records stored in a file named employee.txt,the contents of it need to be reversed from end to beginning. Write a C
Step by step
Solved in 2 steps with 3 images
- Make a C program that gets a source file name from a user. If the file does not exist, it will generate a proper error and exits. If the file exists, it also gets the name of two more files from the user, say destination1 and destination2. These files don't need to exist as they are files that need to be written to. If the files cannot be opened for writing, a proper error will be generated. The program then reads the source file line by line. It will copy every line that has a digit in it to destination 2 and lines that have no digit in them to destination 1. Feel free to use ctype's isdigit() function to identify digit characters. Example: If source file is: Hi My name is Veria Hello My name is John. How can I help you? I have a problem with my giga bit internet. The speed should be around 1000 but it's just 200 Sure! I can help with that. Can I have your number in case we get disconnected? Sure! My number's 647-123-1234 First file (destination 1) should be Hi My name is…use c code to Write a C program that gets a source file name from a user. If the file does not exist, it will generate a proper error and exits.If the file exists, it also gets the name of two files from the user, say destination1 and destination2. These files don’t need to exist as they are files that need to be written to. The program then reads the source file line by line. If the line starts with an uppercase and ends with a lower case, it copies that line to dest1 (first destination file) If the line starts with a lowercase and ends with a dot (‘.’), it copies that line to dest2 (second destination file) If neither of the above hold, the program discards that line (doesn’t copy it anywhere) The program then displays a report mentioning how many lines were copied into each destination file. Don’t forget to close all the files. Example: Assume that the source file is (<NL> = new line, <EOF> end of file): Souce: “myfile.txt” This is my first…Write a C program that gets a source file name from a user. If the file does not exist, it will generate a proper error and exits.If the file exists, it also gets the name of two more files from the user, say destination1 and destination2. These files don’t need to exist as they are files that need to be written to. If the files cannot be opened for writing, a proper error will be generated. The program then reads the source file line by line. It will copy every line that has a digit in it to destination 2 and lines that have no digit in them to destination 1. Feel free to use ctype’s isdigit() function to identify digit characters. Example: If source file is:Hi My name is VeriaHello My name is John. How can I help you?I have a problem with my giga bit internet. The speed should be around 1000 but it’s just 200 Sure! I can help with that. Can I have your number in case we get disconnected? Sure! My number’s 647-123-1234 First file (destination 1) should be Hi My name is Veria Hello…
- Question 2 Write a C program which creates two child alternatively and print it on screen. processes. One of the child processes must open data1.txt and fill it with 10 random Sample Run data files and read one data from each file integers (0-9). The other child process must $/question2 open data2.txt and fill it with 10 random PARENT) Child process ID: 5379 letters (a-z). In the meanwhile, parent must CHILD1] wrote: 6 2 8 6 7 3 3 1 8 4 to print both child processes' id's and wait for CHILD2] Wrote: f y nhjw xkpm to them to finish. Then, it must open both file. [PARENT] Child process ID: 5378 file. [PARENT] 6 f 2 y 8 n 6 h 7 j 3 w 3 x 1 k 8 p 4 mIn Python: Build a function that takes a record from your FASTA file as an argument, and returns a count of each amino acid coded for by the codons of the sequence. Keep in mind that because these records are not necessarily in the proper reading frame, so the user should be prompted to select a reading frame (0, +1, +2). You should put some thought into the presentation of your results by your main function, making sure they are clear and readable. The fasta file contains the below: >MD10G1276500 pacid=40089867 polypeptide=MD10G1276500 locus=MD10G1276500 ID=MD10G1276500.v1.1.491…Write a program in C/C++ which is passed as command line argument a file name. Your program will read data from the file using read system call. The program will then pass the contents of the file to a pipe and create a child process. The child process will read the file’s content from the pipe.The child process does two things to the file data: 1) it removes all integers from the pipe. 2) It changes the case of all alphabets. The child process then writes the modified file data to the second pipe. The parent then reads this data from the second pipe andwrites the data(using write system call)to a new filewhose name is also passed as command line argument.The input file from which the data will be read has no size restriction. Sample file could have data like: M7 9am3 1k H23is e750n
- Write a program in C/C++ which is passed as command line argument a file name. Your program will read data from the file using read system call. The program will then pass the contents of the file to a pipe and create a child process. The child process will read the file's content from the pipe. The child process does two things to the file data: 1) it removes all integers from the pipe. 2) It changes the case of all alphabets. The child process then writes the modified file data to the second pipe. The parent then reads this data from the second pipe and writes the data (using write system call) to a new file whose name is also passed as command line argument. The input file from which the data will be read has no size restriction.Write a C program that, 1. writes an n x n matrix into a file named "matrix.txt" the matrix has to contain the number as it is given in the example, and n has to be given by the user 2. contains a function with the name "averageM", which o input parameters are the main diagonal (in the example: [0,1,3]) o of the matrix and the size of the main diagonal (in the example: 3) o and returns with the average of the numbers in the main diagonal (in the example: 1.33) 1. calls the "averageM" function on the matrix.txt" and displays the result on the screen Instruction for the user: "n=": Example: Input: 3 Output in the file: 001 112 223 Output on the screen: 1.331. Write a C++ program that reads a student grade from the screen/keyboard. The program should then use the input grade as a search key to look for the list of students with matching grade in a text file (file.txt). Each record of the student data in the text file consists of matric number and grade. Print the list of matric numbers for students whose grades match the search key value and the number of students with grades A, B, C, D and F on the screen. Do not use array in the program. An example of the text file (file.txt) is as follows. 66756 A 78954 B 64528 A 88756 C 59576 F 87412 A 76532 B 63849 A 79475 C 73645 B 67355 A If the input grade (i.e. the search key) is A, the input/output screen produced should be displayed as follows. Underlined and bold item is user input. Enter grade (search key): A 56700 D 93769 A The matric number of students with grade A: 66756 64528 87412 63849 93769 67355 Number of students with grade A: 6 Number of students with grade B: 3 Number of students…
- create a program in C++ that does the extraction and analysis described above except that the tasks shall be made somewhat simpler. The program shall read from a file "inputdata.txt" containing a name and exactly five values of floating point numbers per line in the file. The first line of the file shall contain the name of the person (first and last) that gathered the data i.e. Joe Jones. The second line of the file shall be the first row of data. Your program will process all the lines in the file as described below. As the program reads each row of data, it shall do two things: it shall keep a running sum of the values read for that row, and shall also write the average of that row to a file "averages.txt". The program will continue reading from the file until it reaches the end of the file. This will entail using a "while" loop and the eof() function that is talked about in Chapter 13 of the text book. The person's name is to be read in at one time using "getline" and stored under…Write a complete C or C++ program to implement a digital music archive program. The program should be able to allow the following operations through the menu structure. Use FILE to write the outputs, the song directory: Menu: 1- Add a new song to directory 2- Delete a song from the directory 3- List all songs in the directory 4- Search a song: A – Search according to ID B – Search according to category 5- Update song information 6- Sort according to ID A - In ascending order B – In descending order 7- Sort according to category in alphabetic order 8- Quit struct date { int day, month, year; }; struct car { int ID; char songname[100], singersname[30], category[10]; struct date albumdate; }song_directory[100];Problem 3. This problem is about the same file foo as in the previous problem, but before it is modified. A program opens it for reading and gets back the file descriptor number fd. The program has a character array char buf [30]. The program now does the following: if ((rv = read (fd, buf,20)) < 0) { ...handle error... } if ((rv = read(fd,buf,20)) < 0) { ...handle error...} a. What does each call return (assuming no errors)? b. What do the first 20 bytes of the character array buf contain after the second read call? c. What do the last 10 bytes of buf contain?