Sunday, January 26, 2020
Procedure Oriented Programming
Procedure Oriented Programming à Submitted by: Gagandeep Singh Brarà Procedure oriented programming is a set of functions. In this program Clanguage is used. To perform any particular task, set of function are compulsory. For example , a program may involve collecting data from user, performing some kind of calculation on that data and printing the data on screen when is requested. Calculating, reading or printing can be written in a program with the help of different functions on different tasks. POP method also emphases the functions or the subroutines. Structure of POP method Here is some problems in POP method like its difficult to handling data because it gives no importance to data.Ãâà Dat means the information that are collected from user and after calculation new result come. If any one is familiar with C programming than he may recollect storage classes in C.Ãâà In C, data member is declared GLOBAL in order to make 2 or more functions in the program. What happen when 2 or functions on the same data member. For example,Ãâà when if there are 7 functions in a program and this become a global data member. Unfortunately,Ãâà if the value of any global data member or that may key element than it will affect the whole program. It is a big problem to identify that which function is causing the problem. Handling of data functions in POP One of the most important feature of C language is structure. Programmer use integer data, decimal point data(float), array data pack togetherÃâà into single entity by using structure. The reason of the popularity of structure was introduced first by c language. Object Oriented Programming An OOP method differs from POP in its basic approach itself. All the best features of structured of OOP is developed by retaining the programming method, in which they have added number of concepts which makes efficient programming. Object oriented programming methods have number of features and it makes possible an entirely new way of approaching a program. We have to mind first that OOP retains all best features of POP method like functions/sub routines, structure etc. 1) The first feature that any programmer would talk about OOP is data hiding facility. Programmer can hide the important core data from external world by using OOP method. The basic concept of OOP revolves around a feature similar to structure in POP, named as class in OOP.. Data members can be declared as private or public inside a class.Ãâà Programmer have to note that a class is really similar to structure in C. Due to same structure, a class packs together different things into a single entity. 2) Another important feature of OOP is code reusability. The simple means of code reusability is just that the code is written earlier in program or read or used it later.Ãâà This is made possible by a feature of classes named inheritance. By using inheritance, one class can acquire the properties of another class. Let i will try to explain this using an example. Take the example of a School Management System and management decided to make software based on the data ofÃâà students only. The programmer made the software and deciding to collecting personal details like Name, Age, Sex, Address etc. After one year school management decides to incorporate data of teachers to the software. The programmer can add this extension within a small time as he can reuse many of the codes he had written earlier by making use of inheritance. The class personal details is of general nature (Age, Sex etc are same for every person irrespective of student/teacher). ( CircuitsToday, 2015) C codes #include #includeÃâà //1 FILE *fpgagan;Ãâà //the actual students file FILE *fp1gagan; //temporary file Ãâà Ãâà Ãâà struct st_record Ãâà Ãâà Ãâà { Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà int id; Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà char fname[20]; Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà char lname[20]; Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà char class_name[20]; Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà char address[40]; Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà char phone[12]; Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà char email[20]; Ãâà Ãâà Ãâà }; Ãâà Ãâà Ãâà struct st_record s1; void main() { Ãâà Ãâà Ãâà menu(); } menu() { Ãâà Ãâà Ãâà int choice; Ãâà Ãâà Ãâà printf(nPress 1 to create a new record); Ãâà Ãâà Ãâà printf(nPress 2 to edit an existing record); Ãâà Ãâà Ãâà printf(nPress 3 to search records); Ãâà Ãâà Ãâà printf(nPress 4 to delete a record); Ãâà Ãâà Ãâà printf(nPress 5 to exit this p program n); Ãâà Ãâà Ãâà scanf(%d, choice); Ãâà Ãâà Ãâà if(choice == 1) Ãâà Ãâà Ãâà { Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà create_fn(); Ãâà Ãâà Ãâà } Ãâà Ãâà Ãâà else if(choice == 2) Ãâà Ãâà Ãâà { Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà edit_fn(); Ãâà Ãâà Ãâà } Ãâà Ãâà Ãâà else if(choice == 3) Ãâà Ãâà Ãâà { Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà search_fn(); Ãâà Ãâà Ãâà } Ãâà Ãâà Ãâà else if(choice == 4) Ãâà Ãâà Ãâà { Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà delete_fn(); Ãâà Ãâà Ãâà } Ãâà Ãâà Ãâà else if(choice == 5) Ãâà Ãâà Ãâà { Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà exit_fn(); Ãâà Ãâà Ãâà } Ãâà Ãâà Ãâà else Ãâà Ãâà Ãâà { Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà printf(nPlease enter the correct choice); Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà menu(); Ãâà Ãâà Ãâà } } create_fn() { Ãâà Ãâà Ãâà printf(nStudent ID :); Ãâà Ãâà Ãâà scanf(%d, s1.id); Ãâà Ãâà Ãâà printf(nFirst name :); Ãâà Ãâà Ãâà scanf(%s, s1.fname); Ãâà Ãâà Ãâà printf(nLast name :); Ãâà Ãâà Ãâà scanf(%s, s1.lname); Ãâà Ãâà Ãâà printf(nClass name :); Ãâà Ãâà Ãâà scanf(%s, s1.class_name); Ãâà Ãâà Ãâà printf(nAddress :); Ãâà Ãâà Ãâà scanf(%s, s1.address); Ãâà Ãâà Ãâà printf(nPhone :); Ãâà Ãâà Ãâà scanf(%s, s1.phone); Ãâà Ãâà Ãâà printf(nEmail :); Ãâà Ãâà Ãâà scanf(%s, s1.email); Ãâà Ãâà Ãâà fpgagan=fopen(students.txt,a+);Ãâà //3 Ãâà Ãâà Ãâà fprintf(fpgagan,n%dt%st%st%st%st%st%s,s1.id,s1.fname,s1.lname,s1.class_name,s1.address,s1.phone,s1.email); //4 Ãâà Ãâà Ãâà fclose(fpgagan); Ãâà Ãâà Ãâà menu(); } edit_fn() { Ãâà Ãâà Ãâà printf(nThis is the edit function); Ãâà Ãâà Ãâà int id1,found; Ãâà Ãâà Ãâà found = 0; Ãâà Ãâà Ãâà printf(nPlease enter the Student ID :); Ãâà Ãâà Ãâà scanf(%d, id1); Ãâà Ãâà Ãâà if((fpgagan=fopen(students.txt,r))==NULL) Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà { Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà printf(Empty); Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà } Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà else Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà { Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà fp1gagan=fopen(students1.txt,a+); Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà while(!feof(fpgagan) found==0) Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà { Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà fscanf(fpgagan,n%dt%st%st%st%st%st%s,s1.id,s1.fname,s1.lname,s1.class_name,s1.address,s1.phone,s1.email); Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà if(s1.id==id1) { Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà found=1; Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà printf(nStudent record found.); Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà printf(n%dt%st%st%st%st%st%s,s1.id,s1.fname,s1.lname,s1.class_name,s1.address,s1.phone,s1.email); Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà printf(nEnter the new details now); Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà printf(nStudent ID :); Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà scanf(%d, s1.id); Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà printf(nFirst name :); Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà scanf(%s, s1.fname); Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà printf(nLast name :); Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà scanf(%s, s1.lname); Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà printf(nClass name :); Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà scanf(%s, s1.class_name); Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà printf(nAddress :); Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà scanf(%s, s1.address); Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà printf(nPhone :); Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà scanf(%s, s1.phone); Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà printf(nEmail :); Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà scanf(%s, s1.email); Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà fprintf(fp1gagan,n%dt%st%st%st%st%st%s,s1.id,s1.fname,s1.lname,s1.class_name,s1.address,s1.phone,s1.email); Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà continue; Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà } Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà else { Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà fprintf(fp1gagan,n%dt%st%st%st%st%st%s,s1.id,s1.fname,s1.lname,s1.class_name,s1.address,s1.phone,s1.email); Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà } Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà } Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà fclose(fpgagan); Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà fclose(fp1gagan); Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà remove(students.txt); Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà rename(students1.txt,students.txt); Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà } Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà if(found!=1) Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà { Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà printf(Not found); Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà getch(); Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà } Ãâà Ãâà Ãâà menu(); } search_fn() { Ãâà Ãâà Ãâà int id1,found; Ãâà Ãâà Ãâà found = 0; Ãâà Ãâà Ãâà printf(nPlease enter the Student ID :); Ãâà Ãâà Ãâà scanf(%d, id1); Ãâà Ãâà Ãâà if((fpgagan=fopen(students.txt,r))==NULL) Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà { Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà printf(Empty); Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà } Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà else Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà { Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà while(!feof(fpgagan) found==0) Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà { Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà fscanf(fpgagan,n%dt%st%st%st%st%st%s,s1.id,s1.fname,s1.lname,s1.class_name,s1.address,s1.phone,s1.email); Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà if(s1.id==id1) Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà found=1; Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà } Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà } Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà if(found==1) Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà { Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà printf(nStudent record found.); Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà printf(n%dt%st%st%st%st%st%s,s1.id,s1.fname,s1.lname,s1.class_name,s1.address,s1.phone,s1.email); Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà } Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà else Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà { Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà printf(Not found); Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà getch(); Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà } Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà menu(); } delete_fn() { Ãâà Ãâà Ãâà printf(nThis is the delete function); Ãâà Ãâà Ãâà int id1,found; Ãâà Ãâà Ãâà found = 0; Ãâà Ãâà Ãâà printf(nPlease enter the Student ID :); Ãâà Ãâà Ãâà scanf(%d, id1); Ãâà Ãâà Ãâà if((fpgagan=fopen(students.txt,r))==NULL) Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà { Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà printf(Empty); Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà } Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà else Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà { Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà fp1gagan=fopen(students1.txt,a+); Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà while(!feof(fpgagan) found==0) Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà { Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà fscanf(fpgagan,n%dt%st%st%st%st%st%s,s1.id,s1.fname,s1.lname,s1.class_name,s1.address,s1.phone,s1.email); Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà if(s1.id==id1) { Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà found=1; Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà printf(nStudent record found.); Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà printf(n%dt%st%st%st%st%st%s,s1.id,s1.fname,s1.lname,s1.class_name,s1.address,s1.phone,s1.email); Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà printf(nRecord deleted); Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà continue; Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà } Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà else { Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà fprintf(fp1gagan,n%dt%st%st%st%st%st%s,s1.id,s1.fname,s1.lname,s1.class_name,s1.address,s1.phone,s1.email); Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà } Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà } Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà fclose(fpgagan); Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà fclose(fp1gagan); Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà remove(students.txt); Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà rename(students1.txt,students.txt); Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà } Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà if(found!=1) Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà { Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà printf(Not found); Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà getch(); Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà } Ãâà Ãâà Ãâà menu(); } exit_fn() { Ãâà Ãâà Ãâà Ãâà printf(nThis is the exit function); } Here we are recording three studentsÃâà record In this screen short we are able to see the record of the students In this screen shot we try to editing the record Here we can see the change in the record. Here we try to delete the record And in this screen shot only one record is left CircuitsToday. (2015). Retrieved from Difference between Procedure Oriented(POP) and Object Oriented Programming(OOP): http://www.circuitstoday.com/difference-between-procedure-oriented-and-object-oriented-programming
Saturday, January 18, 2020
Market Segmentation: Product Concepts
ZULQARNAIN BIN ABU HASSAN SCM 022431 REVIEW OF SEPTEMBER ISSUE When talking about mix and match and color blocking it is normally related to the fashion world. It is also involves modeling, in terms of clothes, accessories, gadgets, men and women, and trending. There are various ways for customer to get reference in fashion. Some will refer to the while other may use word of mouth. However most will use fashion magazine as their main reference. So just what fashion do you prefer? Mix and match? Color Blocking? Trending? There are many answers and you can make a long list if you want.Here we will focus on a September Issue documentary film about the construction of a prominent magazine in New York City, ââ¬Å"Vogueâ⬠. Vogue magazine led by its editor Anna Wintour a strong influential and is supported by fashion designers all over Europe. A bit of background of the Editor. She was an ex model and is a hardcore follower of Vogue magazine since her teens. Her father Charles Wintour , former editor of a newspaper, persuade join the Vogue magazine. In this documentary film it will highlight how a fashion magazine is being published.Publishing a magazine will involved planning the content of the magazine for each month, what message to be conveyed to the reader and followers of Vogue, and try to anticipate future fashion or trending today. The production of the magazine should always be able to communicate to the readers. It also should express its views despite the bitter outlook. This is done through pre-production. The publication of a magazine will have to looked in terms of quality and not just profit alone. In the pre-production, editor has to play a big role in ensuring that choices and decisions are made clearly.She has to understand the desires of the readers and followers of the Vogue. For September 2007 Issue, the goals is to make history by producing over 100 pages. Other factors such as fashion related activities, advertising and cover page by endors ed celebrity also plays an important role in a magazine. All the hard work is done during the pre-production. Post mortem is then conducted before they proceed to real production. As editor of Vogue magazine said in 2007 ââ¬Ëfashion is not about looking back but is about looking forward ââ¬Å".
Friday, January 10, 2020
Internal combustion engine Essay
Electric cars should be used instead of cars that run with gasoline because electric cars do not harm the environment, are quieter, quicker, does not require gasoline and include a significant reduction to air pollution. Firstly, electric cars have a lot of benefits. One of them is that they are quiet, quick and smooth, making most regular cars look clunky and outdated. What surprises people the most is the torque (axle-twisting power) offered by the electric cars. Step on the accelerator and power is delivered immediately to the wheels, providing a thrilling driving experience. Secondly, after a while with an electric car you will forget that gas stations existed. Imagine never going to a gas station and spending all that money for fuel. All you have to do is pull your vehicle in your drive way or garage and plug it in to the charging inlet. It is very convenient to just wake up the next morning and have a fully charged vehicle that can go up to 100 miles. In addition they are cheaper to operate. Almost everywhere in the world, electricity is very cheap. So when you compare an electric vehicle to a regular car, the cost per mile to fuel an electric vehicle is approximately one-third to one-quarter the cost of gasoline (on a cost per mile basis). Nevertheless, owning a car is associated with the responsibility of maintaining it. Regular cars require frequent maintenance but this is not the case in electric cars. These cars do not suffer same level of stress as traditional engines acquire and do not require frequent oil changes and other regular maintenance. On the other hand, electric cars have a lot of disadvantages too. First of all the limited range of the electric cars is probably the biggest disadvantage. Most affordable electric cars only have about 80 to 100 miles of range. Which is not enough if you are for instance going on a long road trip. People who have electric cars need to properly plan, assuring that they will not go over the limited range. Not to mention, they also have a long refueling time. It is not like going to a gas station and adding a couple of hundred miles of range in five or ten minutes. To recharge a completely empty electric car would take about 10 hours depending on the voltage. With 120 volts (which is the current voltage in every house) it will take ten hours. With 240 volts it takes about four to five hours to fully charge the electric vehicle. Also, you would have to have the right place to charge your electric vehicle. You cannot go more than the carââ¬â¢s limit but you the right place to charge it. For instance people who are living in apartments cannot own electric cars because they do not have a garage to charge their vehicle. Big electric car companies have charging stations where you can get your vehicle fully charged in 1-2 hours but there are not a lot like gas stations. Furthermore the higher cost is probably what keeps people away from electric vehicles. The current electric cars are priced between 30. 000 and 40. 000 dollars. While you can buy, for instance the Honda Fit, Ford Focus etc. for less than 20,000 dollars. Last but not least, electric cars are costly to maintain and repair if there is a big problem with the car. Since electric cars are in a class of their own, owners may wind up paying more on repairs and maintenance because not every mechanic is trained to repair and maintain electric cars. In conclusion, when considering the pros and cons of electric cars, it is clear that there are some major advantages and disadvantages of owning an electric car. At the end, if these cars help people save a tremendous amount of money and help the environment, the pros of owning an electric car will outweigh all of the cons.
Thursday, January 2, 2020
Cyber Security And The Modern Age - 862 Words
Cyber Security in the Modern Age We are bombarded by threats all the time, most of the time we have no idea it is happening. We have to be cautious of the web sites we visit, the emails we read and the applications we install. Many of us do not want understand the danger we face every time we go online. Just look at the way we use social media, posting information for the whole world to see with little regard for the repercussion of these actions. Cyber security is not just the job of professionals, but everyone connected to the Internet. As we allow the Internet to become more and more embedded into our lives the topic of cyber security also need to become more embedded in our lives as well. Duncan Campbell, president and CEO of the Pennsylvania Bankers Association, points out, ââ¬Å"Now more than ever, the world is vulnerable to hacking, phishing, data breaches, malware attacks and denial of service attempts from bad actors and nation states who want to compromise individual ident ification data and wreak havoc on our economy,â⬠(Campbell). Each year we here about these attacks, Target, T. J. Maxx, Home Depot just to name a few. More concerning then, the frequency of these attacks is the magnitude of the data lost in these attacks. But where does it end, some experts believe that your next attack could come from something as a simple copier. Brice Wallace quotes Kristen Dauphinais, ââ¬Å"breaches can happen in many ways, including lost or stolen devices or intentional thefts byShow MoreRelatedThe World and The Age of Technology Essay731 Words à |à 3 Pages through massive industrialization and undeniable advancements, the world stepped into the Age of Technology. In a much developed society today, the different companies compete for patents over technical skills, arousing so-called cyber war. In modern age, cyber-attack has been a continuous problem as it gets more advanced and harder to stop. As seen in the Chart on the side, the number of reported cyber-attack incidents grew continuously since 2006. It is no more an ignorable issue as it bringsRead MoreEssay On Automatic Detection Of Cyber-Recruitment By Violent Extremists1363 Words à |à 6 Pagesdetection of cyber-recruitment by violent extremists Introduction The main objective of this research is to present data and analytic methods for automatically identifying the recruitment activities of violent groups within extremist social media websites like face book, twitter, what sup and so on. There is no doubt that in todayââ¬â¢s modern era the use of information and computer technology (internet) is rapidly increasing. Due to the unregulated nature of Internet Communication cyber communities becomeRead MoreCyber Threat, Its Scope And Its Impact On National Security991 Words à |à 4 Pageslives. It has become an ideal source for cyber criminals to remain active while preying on victims. Higher the number of cyberspace usersââ¬â¢, higher is the opportunities for exploitation. So it is the need of the hour to protect our computers, networks, digital applications and our data from unintended or unauthorized source, change or destruction. This paper proposes a policy directed examination on cyber threat, its scope and its impact on national security. It includes a profile of cooperation amongRead MoreThe Threat Of Cyber Terrorism1093 Words à |à 5 PagesSolution Q. No. 2 The possible threat posed by cyber terrorism has motivated considerable alarm. Many security experts have exposed the danger of cyber terrorists hacking into government and remote computer systems and service areas of progressive economies. The possible threat is, indeed, very disturbing. So far, despite all the gloomy pre-dictions, no single example of real cyber terrorism has been recorded. This increases the question: about the threat? Psychological, political, and economicRead MoreThe Internet And Its Effects On The Environment1538 Words à |à 7 Pagesgovernment has published ââ¬Å"Canada s cyber security strategy: For a stronger and more prosperous Canadaâ⬠, a strategic platform to secure the Canadian cyberspace. However, although embracing cyber technology and obtain considerable advantages from it, the Canadian cyber security strategy does not reflect as a comprehensive strategic framework. This essay argues that the strategy lacks of substantial elements to deal with a wide range of cyber threats in todayââ¬â¢s modern world. For this reason, this essayRead MoreComputer Security And The Technology1273 Words à |à 6 PagesIntroduction: As time has gone on, society has advanced and the age of the computer came about, bringing its own advantages and concerns. One such concern was the question of computer security and personal information staying safe. It seems there has always been some form of computer security, however this form is dynamic, always changing and advancing. This is due to the fact that the technology that is made to bypass security is changing and advancing just as rapidly. Such as the progressionRead MoreThe State Of Cyber Security1389 Words à |à 6 PagesThe state of Cyber Security in 2016 is a grim one, every day on the news we hear about another bank or online service getting hacked and consumer information being sold on the darknet, an ââ¬Å"invisibleâ⬠part of the internet where hackers and criminals sell personal information among other items, or a presidential candidates emails being released. Being a part of the IT community, I am more aware of all these occurrences than the ave rage person who just uses the internet for checking email and seeingRead MoreDoxagram Effect Essay1740 Words à |à 7 Pagesindividuals you trust or deem appropriate to share with? Finally, have you ever discussed this information via text, email, or social-media? If you answered yes to these questions, you are vulnerable to the Doxagram effect. Computer technology and security are at increased risk for being ââ¬Å"hacked*.â⬠(*Almost all of todayââ¬â¢s computer or electronic related crimes are referred to as hacking which is not necessarily accurate.) Hypothetically envision yourself discussing sensitive information with anotherRead MoreCyber War : A New And Growing Realm Of Influence946 Words à |à 4 Pagesways little imagined. Cyber, a broad term, means various things to many individuals throughout international communities. Cyber war, unlike the wars of the past, does not fit into current perceptions of war. Yet, a fifth warfighting domain known as cyberspace is a new and growing realm of influence. Various states have or are creating cyberspace units, warriors, strategies and conducting operations (both defensive and offensive). Only hints of what is and will become cyber war crosses the publicRead MoreCyberCrime: What is Hacking?985 Words à |à 4 Pages Silent. Undetected. Life-changing. On (insert date), (insert name(s)) bypassed (insert company)ââ¬â¢s security measures and gained access to the personal information, such as social security and credit card numbers, of millions of oblivious U.S. citizens, causing millions of dollars of damage and enormous amount of time to be spent making repairs and helping the citizens get their lives back. The rising popularity and availability of the personal computer also includes the rise of ââ¬Å"potential opportunities
Subscribe to:
Posts (Atom)