C programming examples. Prof. Gustavo Alonso Computer Science Department ETH Zürich

Size: px
Start display at page:

Download "C programming examples. Prof. Gustavo Alonso Computer Science Department ETH Zürich"

Transcription

1 C prgramming examples Prf. Gustav Alns Cmputer Science Department ETH Zürich

2 Prgramming examples in C Dynamic queue Use f timing functins Generating randm numbers Arguments and main Use f static Cunting bits Prgramming examples taken frm the n-line bk: Prgramming in C UNIX System Calls and Subrutines using C Gustav Alns, ETH Zürich. C prgramming examples 2

3 /* */ /* queue.c */ /* Dem f dynamic data structures in C */ #include <stdi.h> #define FALSE 0 #define NULL 0 typedef struct { int dataitem; struct listelement *link; listelement; Gustav Alns, ETH Zürich. C prgramming examples 3 d { vid Menu (int *chice); listelement * AddItem (listelement * listpinter, int data); listelement * RemveItem (listelement * listpinter); vid PrintQueue (listelement * listpinter); vid ClearQueue (listelement * listpinter); main () { listelement listmember, *listpinter; int data, chice; listpinter = NULL; Menu (&chice); switch (chice) { case 1: printf ("Enter data item value t ad scanf ("%d", &data); listpinter = AddItem (listpinter, d break; case 2: if (listpinter == NULL) printf ("Queue empty!\n"); else listpinter = RemveItem (listp break; case 3: PrintQueue (listpinter); break; case 4: break; default: printf ("Invalid menu chice - try ag break; while (chice!= 4); ClearQueue (listpinter); exit (0); /* main */

4 vid Menu (int *chice) { char lcal; printf ("\nenter\t1 t add item,\n\t2 t remve item\n\ \t3 t print queue\n\t4 t quit\n"); d { lcal = getchar (); if ((isdigit (lcal) == FALSE) && (lcal!= '\n')) { printf ("\nyu must enter an integer.\n"); printf ("Enter 1 t add, 2 t remve, 3 t print, 4 t quit\n"); while (isdigit ((unsigned char) lcal) == FALSE); *chice = (int) lcal - '0'; Gustav Alns, ETH Zürich. C prgramming examples 4

5 listelement * AddItem (listelement * listpinter, int data) { listelement * lp = listpinter; if (listpinter!= NULL) { while (listpinter -> link!= NULL) listpinter = listpinter -> link; listpinter -> link = (struct listelement *) mallc (sizef (listelement)); listpinter = listpinter -> link; listpinter -> link = NULL; listpinter -> dataitem = data; return lp; else { listpinter = (struct listelement *) mallc (sizef (listelement)); listpinter -> link = NULL; listpinter -> dataitem = data; return listpinter; Gustav Alns, ETH Zürich. C prgramming examples 5

6 listelement * RemveItem (listelement * listpinter) { listelement * tempp; printf ("Element remved is %d\n", listpinter -> dataitem); tempp = listpinter -> link; free (listpinter); return tempp; vid PrintQueue (listelement * listpinter) { if (listpinter == NULL) printf ("queue is empty!\n"); else while (listpinter!= NULL) { printf ("%d\t", listpinter -> dataitem); listpinter = listpinter -> link; printf ("\n"); vid ClearQueue (listelement * listpinter while (listpinter!= NULL) { listpinter = RemveItem (listpinter Gustav Alns, ETH Zürich. C prgramming examples 6

7 Use f timing functins /* timer.c */ /* Cmputes the time in secnds t d a cmputatin */ #include <stdi.h> #include <sys/types.h> #include <time.h> main() { int i; time_t t1,t2; (vid) time(&t1); fr (i=1;i<=300;++i) printf(``%d %d %dn'',i, i*i, i*i*i); (vid) time(&t2); printf(``n Time t d 300 squares and cubes= %d secndsn'', (int) t2-t1); Gustav Alns, ETH Zürich. C prgramming examples 7

8 Generating randm numbers /* randm.c */ #include <stdi.h> #include <sys/types.h> #include <time.h> main() { int i; time_t t1; (vid) time(&t1); srand48((lng) t1); /* use time in secnds t set seed */ printf( 5 randm numbers (Seed = %d):n,(int) t1); fr (i=0;i<5;++i) printf( %d, lrand48()); printf( \n\n ); /* flush print buffer */ Gustav Alns, ETH Zürich. C prgramming examples 8

9 On randm number generatin in C lrand48() returns nn-negative lng integers unifrmly distributed ver the interval (0, 2**31). A similar functin drand48() returns duble precisin numbers in the range [0.0,1.0). srand48() sets the seed fr these randm number generatrs. It is imprtant t have different seeds when we call the functins therwise the same set f pseud-randm numbers will generated. time() always prvides a unique seed. Gustav Alns, ETH Zürich. C prgramming examples 9

10 Arguments and main #include <stdi.h> main(int argc, char **argv) { /* prgram t print arguments frm cmmand line */ int i; printf("argc = %d\n\n",argc); fr (i=0;i<argc;++i) printf("argv[%d]: %s\n",i, argv[i]); Gustav Alns, ETH Zürich. C prgramming examples 10

11 Use f static #include <stdi.h> vid stat(); main() { int cunter; /* lp cunter */ fr (cunter = 0; cunter < 5; cunter++) { stat(); vid stat() { int temprary = 1; static int permanent = 1; (vid)printf("temprary %d Permanent %d\n", temprary, permanent); temprary++; permanent++; Gustav Alns, ETH Zürich. C prgramming examples 11

12 Cunting bits int bitcunt(unsigned char x) { int cunt; fr (cunt=0; x!= 0; x>>=1) if ( x & 01) cunt++; return cunt; Gustav Alns, ETH Zürich. C prgramming examples 12

Networks and Protocols Course: 320301 International University Bremen Date: 2004-11-24 Dr. Jürgen Schönwälder Deadline: 2004-12-03.

Networks and Protocols Course: 320301 International University Bremen Date: 2004-11-24 Dr. Jürgen Schönwälder Deadline: 2004-12-03. Networks and Protocols Course: 320301 International University Bremen Date: 2004-11-24 Dr. Jürgen Schönwälder Deadline: 2004-12-03 Problem Sheet #10 Problem 10.1: finger rpc server and client implementation

More information

Sources: On the Web: Slides will be available on:

Sources: On the Web: Slides will be available on: C programming Introduction The basics of algorithms Structure of a C code, compilation step Constant, variable type, variable scope Expression and operators: assignment, arithmetic operators, comparison,

More information

ASCII Encoding. The char Type. Manipulating Characters. Manipulating Characters

ASCII Encoding. The char Type. Manipulating Characters. Manipulating Characters The char Type ASCII Encoding The C char type stores small integers. It is usually 8 bits. char variables guaranteed to be able to hold integers 0.. +127. char variables mostly used to store characters

More information

System Calls Related to File Manipulation

System Calls Related to File Manipulation KING FAHD UNIVERSITY OF PETROLEUM AND MINERALS Information and Computer Science Department ICS 431 Operating Systems Lab # 12 System Calls Related to File Manipulation Objective: In this lab we will be

More information

System Calls and Standard I/O

System Calls and Standard I/O System Calls and Standard I/O Professor Jennifer Rexford http://www.cs.princeton.edu/~jrex 1 Goals of Today s Class System calls o How a user process contacts the Operating System o For advanced services

More information

Shared Memory Segments and POSIX Semaphores 1

Shared Memory Segments and POSIX Semaphores 1 Shared Memory Segments and POSIX Semaphores 1 Alex Delis delis -at+ pitt.edu October 2012 1 Acknowledgements to Prof. T. Stamatopoulos, M. Avidor, Prof. A. Deligiannakis, S. Evangelatos, Dr. V. Kanitkar

More information

Common applications (append <space>& in BASH shell for long running applications)

Common applications (append <space>& in BASH shell for long running applications) CS 111 Summary User Envirnment Terminal windw: Prmpts user fr cmmands. BASH shell tips: fr cmmand line cmpletin. / t step backward/frward thrugh cmmand histry.! will re-execute

More information

FOCUS Service Management Software Version 8.5 for CounterPoint Installation Instructions

FOCUS Service Management Software Version 8.5 for CounterPoint Installation Instructions FOCUS Service Management Sftware Versin 8.5 fr CunterPint Installatin Instructins Thank yu fr purchasing Fcus Service Management Sftware frm RTM Cmputer Slutins. This bklet f installatin instructins will

More information

Phys4051: C Lecture 2 & 3. Comment Statements. C Data Types. Functions (Review) Comment Statements Variables & Operators Branching Instructions

Phys4051: C Lecture 2 & 3. Comment Statements. C Data Types. Functions (Review) Comment Statements Variables & Operators Branching Instructions Phys4051: C Lecture 2 & 3 Functions (Review) Comment Statements Variables & Operators Branching Instructions Comment Statements! Method 1: /* */! Method 2: // /* Single Line */ //Single Line /* This comment

More information

Keywords are identifiers having predefined meanings in C programming language. The list of keywords used in standard C are : unsigned void

Keywords are identifiers having predefined meanings in C programming language. The list of keywords used in standard C are : unsigned void 1. Explain C tokens Tokens are basic building blocks of a C program. A token is the smallest element of a C program that is meaningful to the compiler. The C compiler recognizes the following kinds of

More information

Senem Kumova Metin & Ilker Korkmaz 1

Senem Kumova Metin & Ilker Korkmaz 1 Senem Kumova Metin & Ilker Korkmaz 1 A loop is a block of code that can be performed repeatedly. A loop is controlled by a condition that is checked each time through the loop. C supports two categories

More information

BSc (Hons) Business Information Systems, BSc (Hons) Computer Science with Network Security. & BSc. (Hons.) Software Engineering

BSc (Hons) Business Information Systems, BSc (Hons) Computer Science with Network Security. & BSc. (Hons.) Software Engineering BSc (Hons) Business Information Systems, BSc (Hons) Computer Science with Network Security & BSc. (Hons.) Software Engineering Cohort: BIS/05/FT BCNS/05/FT BSE/05/FT Examinations for 2005-2006 / Semester

More information

1. Can you access the login screen for Blackbaud s online learning environment Centra?

1. Can you access the login screen for Blackbaud s online learning environment Centra? General Trubleshting Guide Imprtant Ntes 1 We recmmend yu prepare fr yur nline instructr-led class at least TWO DAYS BEFORE the class date. 2 If yu encunter any prblems, this guide allws yu t trublesht

More information

Chapter 6: Continuous Probability Distributions GBS221, Class 20640 March 25, 2013 Notes Compiled by Nicolas C. Rouse, Instructor, Phoenix College

Chapter 6: Continuous Probability Distributions GBS221, Class 20640 March 25, 2013 Notes Compiled by Nicolas C. Rouse, Instructor, Phoenix College Chapter Objectives 1. Understand the difference between hw prbabilities are cmputed fr discrete and cntinuus randm variables. 2. Knw hw t cmpute prbability values fr a cntinuus unifrm prbability distributin

More information

Treasury Gateway Getting Started Guide

Treasury Gateway Getting Started Guide Treasury Gateway Getting Started Guide Treasury Gateway is a premier single sign-n and security prtal which allws yu access t multiple services simultaneusly thrugh the same sessin, prvides cnvenient access

More information

Otomasyon, Danışmanlık Ltd. Şti. INDILOAD DATACARD M AN UAL. Antetli03.doc / Page 9 of 1. Kibele Hedef mükemmele ulasmaksa.

Otomasyon, Danışmanlık Ltd. Şti. INDILOAD DATACARD M AN UAL. Antetli03.doc / Page 9 of 1. Kibele Hedef mükemmele ulasmaksa. Otmasyn, Danışmanlık Ltd. Şti. INDILOAD DATACARD M AN UAL Antetli03.dc / Page 9 f 1 Otmasyn, Danışmanlık Ltd. Şti. Chapter 1 : General Chapter 2 : Cnnectins Chapter 3 : Operatin Chapter 4 : Technical sheet

More information

How To Install Fcus Service Management Software On A Pc Or Macbook

How To Install Fcus Service Management Software On A Pc Or Macbook FOCUS Service Management Sftware Versin 8.4 fr Passprt Business Slutins Installatin Instructins Thank yu fr purchasing Fcus Service Management Sftware frm RTM Cmputer Slutins. This bklet f installatin

More information

Application Note: 202

Application Note: 202 Applicatin Nte: 202 MDK-ARM Cmpiler Optimizatins Getting the Best Optimized Cde fr yur Embedded Applicatin Abstract This dcument examines the ARM Cmpilatin Tls, as used inside the Keil MDK-ARM (Micrcntrller

More information

Practical Probability:

Practical Probability: Practical Probability: Casino Odds and Sucker Bets Tom Davis tomrdavis@earthlink.net April 2, 2011 Abstract Gambling casinos are there to make money, so in almost every instance, the games you can bet

More information

CenterPoint Accounting for Agriculture Network (Domain) Installation Instructions

CenterPoint Accounting for Agriculture Network (Domain) Installation Instructions CenterPint Accunting fr Agriculture Netwrk (Dmain) Installatin Instructins Dcument # Prduct Mdule Categry 2257 CenterPint CenterPint Installatin This dcument describes the dmain netwrk installatin prcess

More information

Tutorial on C Language Programming

Tutorial on C Language Programming Tutorial on C Language Programming Teodor Rus rus@cs.uiowa.edu The University of Iowa, Department of Computer Science Introduction to System Software p.1/64 Tutorial on C programming C program structure:

More information

/* File: blkcopy.c. size_t n

/* File: blkcopy.c. size_t n 13.1. BLOCK INPUT/OUTPUT 505 /* File: blkcopy.c The program uses block I/O to copy a file. */ #include main() { signed char buf[100] const void *ptr = (void *) buf FILE *input, *output size_t

More information

Operating Systems. Privileged Instructions

Operating Systems. Privileged Instructions Operating Systems Operating systems manage processes and resources Processes are executing instances of programs may be the same or different programs process 1 code data process 2 code data process 3

More information

FOCUS Service Management Software Version 8.5 for Passport Business Solutions Installation Instructions

FOCUS Service Management Software Version 8.5 for Passport Business Solutions Installation Instructions FOCUS Service Management Sftware fr Passprt Business Slutins Installatin Instructins Thank yu fr purchasing Fcus Service Management Sftware frm RTM Cmputer Slutins. This bklet f installatin instructins

More information

7th Marathon of Parallel Programming WSCAD-SSC/SBAC-PAD-2012

7th Marathon of Parallel Programming WSCAD-SSC/SBAC-PAD-2012 7th Marathon of Parallel Programming WSCAD-SSC/SBAC-PAD-2012 October 17 th, 2012. Rules For all problems, read carefully the input and output session. For all problems, a sequential implementation is given,

More information

Exchanging Files Securely with Gerstco Using gpg4win Public Key Encryption

Exchanging Files Securely with Gerstco Using gpg4win Public Key Encryption Exchanging Files Securely with Gerstc Using gpg4win Public Key Encryptin Overview Visit the fllwing page n Gerstc s website t watch a vide verview f Public Key Encryptin: www.gerstc.cm/???? Initial Setup

More information

SBClient and Microsoft Windows Terminal Server (Including Citrix Server)

SBClient and Microsoft Windows Terminal Server (Including Citrix Server) SBClient and Micrsft Windws Terminal Server (Including Citrix Server) Cntents 1. Intrductin 2. SBClient Cmpatibility Infrmatin 3. SBClient Terminal Server Installatin Instructins 4. Reslving Perfrmance

More information

STIOffice Integration Installation, FAQ and Troubleshooting

STIOffice Integration Installation, FAQ and Troubleshooting STIOffice Integratin Installatin, FAQ and Trubleshting Installatin Steps G t the wrkstatin/server n which yu have the STIDistrict Net applicatin installed. On the STI Supprt page at http://supprt.sti-k12.cm/,

More information

TivaWare Utilities Library

TivaWare Utilities Library TivaWare Utilities Library USER S GUIDE SW-TM4C-UTILS-UG-1.1 Copyright 2013 Texas Instruments Incorporated Copyright Copyright 2013 Texas Instruments Incorporated. All rights reserved. Tiva and TivaWare

More information

MiaRec. Performance Monitoring. Revision 1.1 (2014-09-18)

MiaRec. Performance Monitoring. Revision 1.1 (2014-09-18) Revisin 1.1 (2014-09-18) Table f Cntents 1 Purpse... 3 2 Hw it wrks... 3 3 A list f MiaRec perfrmance cunters... 4 3.1 Grup MiaRec Statistics... 4 3.2 Grup MiaRec Call Statistics Per-State... 5 3.3 Grup

More information

Traffic monitoring on ProCurve switches with sflow and InMon Traffic Sentinel

Traffic monitoring on ProCurve switches with sflow and InMon Traffic Sentinel An HP PrCurve Netwrking Applicatin Nte Traffic mnitring n PrCurve switches with sflw and InMn Traffic Sentinel Cntents 1. Intrductin... 3 2. Prerequisites... 3 3. Netwrk diagram... 3 4. sflw cnfiguratin

More information

C PROGRAMMING FOR MATHEMATICAL COMPUTING

C PROGRAMMING FOR MATHEMATICAL COMPUTING UNIVERSITY OF CALICUT SCHOOL OF DISTANCE EDUCATION BSc MATHEMATICS (2011 Admission Onwards) VI Semester Elective Course C PROGRAMMING FOR MATHEMATICAL COMPUTING QUESTION BANK Multiple Choice Questions

More information

About the Staples PTA Discount Program

About the Staples PTA Discount Program Abut the Staples PTA Discunt Prgram At-A-Glance: What PTA Members get frm Staples Discunts fr individual PTA members and PTA units 10% instant discunt ff supplies (see exclusins belw in the Terms & Cnditins)

More information

Debugging and Bug Tracking. Slides provided by Prof. Andreas Zeller, Universität des Saarlands http://whyprogramsfail.com

Debugging and Bug Tracking. Slides provided by Prof. Andreas Zeller, Universität des Saarlands http://whyprogramsfail.com Debugging and Bug Tracking Slides provided by Prof. Andreas Zeller, Universität des Saarlands http://whyprogramsfail.com Learning goals 1. part: Debugging Terminology o Defect o Infection o Failure Debugging

More information

Lex et Yacc, exemples introductifs

Lex et Yacc, exemples introductifs Lex et Yacc, exemples introductifs D. Michelucci 1 LEX 1.1 Fichier makefile exemple1 : exemple1. l e x f l e x oexemple1. c exemple1. l e x gcc o exemple1 exemple1. c l f l l c exemple1 < exemple1. input

More information

VMD - continued: Making Movies

VMD - continued: Making Movies Bichem 660 2008 145 VMD - cntinued: Making Mvies (This sectin can be used immediately after Desktp Mlecular Graphics) VMD (http://www.ks.uiuc.edu/research/vmd/) is a free prgram develped at the Theretical

More information

Steps to fix the product is not properly fixed issue for international clients.

Steps to fix the product is not properly fixed issue for international clients. Axxya Systems supprt cntact details 1-800-709-2977 ext 9 within US 1-425-999-4350 ext 9 utside f US Email supprt@axxya.cm Technical FAQ -- www.nutritinistpr.cm/help-center/ Steps t fix the prduct is nt

More information

Basic Java Constructs and Data Types Nuts and Bolts. Looking into Specific Differences and Enhancements in Java compared to C

Basic Java Constructs and Data Types Nuts and Bolts. Looking into Specific Differences and Enhancements in Java compared to C Basic Java Constructs and Data Types Nuts and Bolts Looking into Specific Differences and Enhancements in Java compared to C 1 Contents Hello World Program Statements Explained Java Program Structure in

More information

Health Care Solution

Health Care Solution Management Summary & Technical Overview Versin 1 5405 Altn Parkway, 5-A #359 Irvine, CA 92604 (949) 733-8526 Cpyright The prgrams and cncepts mentined herein are prprietary t, and are nt t be reprduced,

More information

Citizen Service Management

Citizen Service Management Citizen Service Management Custmer API Dcumentatin PAGE 1 Learn mre visit: gvdelivery.cm gvdelivery.c.uk email: inf@gvdelivery.cm call: U.S. (866) 276-5583 U.K. 0800 032 5769 Table f Cntents Overview...

More information

VCB ib@nking USER GUIDE FOR INDIVIUAL. VCB ib@nking USER GUIDE FOR INDIVIUAL (FOR INDIVIUAL)

VCB ib@nking USER GUIDE FOR INDIVIUAL. VCB ib@nking USER GUIDE FOR INDIVIUAL (FOR INDIVIUAL) VCB ib@nking USER GUIDE FOR INDIVIUAL (FOR INDIVIUAL) 1 Cntent Hw t access VCB-iB@nking: www.vietcmbank.cm.vn... 3 Lgin VCB-iB@nking... 4 Hme/ Navigatin:... 5 Inquiry accunt... 6 Payment... 12 Card management...

More information

Informatica e Sistemi in Tempo Reale

Informatica e Sistemi in Tempo Reale Informatica e Sistemi in Tempo Reale Introduction to C programming Giuseppe Lipari http://retis.sssup.it/~lipari Scuola Superiore Sant Anna Pisa October 25, 2010 G. Lipari (Scuola Superiore Sant Anna)

More information

Computer Systems II. Unix system calls. fork( ) wait( ) exit( ) How To Create New Processes? Creating and Executing Processes

Computer Systems II. Unix system calls. fork( ) wait( ) exit( ) How To Create New Processes? Creating and Executing Processes Computer Systems II Creating and Executing Processes 1 Unix system calls fork( ) wait( ) exit( ) 2 How To Create New Processes? Underlying mechanism - A process runs fork to create a child process - Parent

More information

Remote Desktop Tutorial. By: Virginia Ginny Morris

Remote Desktop Tutorial. By: Virginia Ginny Morris Remte Desktp Tutrial By: Virginia Ginny Mrris 2008 Remte Desktp Tutrial Virginia Ginny Mrris Page 2 Scpe: The fllwing manual shuld accmpany my Remte Desktp Tutrial vide psted n my website http://www.ginnymrris.cm

More information

Channel Access Client Programming. Andrew Johnson Computer Scientist, AES-SSG

Channel Access Client Programming. Andrew Johnson Computer Scientist, AES-SSG Channel Access Client Programming Andrew Johnson Computer Scientist, AES-SSG Channel Access The main programming interface for writing Channel Access clients is the library that comes with EPICS base Written

More information

Your Outlook Mailbox can be accessed from any PC that is connected to the Internet.

Your Outlook Mailbox can be accessed from any PC that is connected to the Internet. Outlk Web Access Faculty and Staff Millsaps Cllege Infrmatin Technlgy Services Yur Outlk Mailbx can be accessed frm any PC that is cnnected t the Internet. Open the Web brwser. Type in this URL: https://mail.millsaps.edu

More information

NWIRP Phone System Quick Start Guide Version 1.01 07/07/2009

NWIRP Phone System Quick Start Guide Version 1.01 07/07/2009 NWIRP Phne System Quick Start Guide Versin 1.01 07/07/2009 Switchvx Website Basics (Fr everyne) **Nte: This will nt cver 100% f the ptins available in the new system, just the basics.** Managing yur extensin:

More information

Member Functions of the istream Class

Member Functions of the istream Class Member Functions of the istream Class The extraction operator is of limited use because it always uses whitespace to delimit its reads of the input stream. It cannot be used to read those whitespace characters,

More information

IPC. Semaphores were chosen for synchronisation (out of several options).

IPC. Semaphores were chosen for synchronisation (out of several options). IPC Two processes will use shared memory to communicate and some mechanism for synchronise their actions. This is necessary because shared memory does not come with any synchronisation tools: if you can

More information

Phone support is available if you have any questions or problems with the NASP PRO software during your tournament.

Phone support is available if you have any questions or problems with the NASP PRO software during your tournament. NASP Pr Turnament Instructins Updated 11/4/13 - NASP Pr Turnament Step by Step It is HIGHLY recmmended that yu read and fllw these instructins. Als, print these instructins and have them available at yur

More information

Chapter 3: Cluster Analysis

Chapter 3: Cluster Analysis Chapter 3: Cluster Analysis 3.1 Basic Cncepts f Clustering 3.1.1 Cluster Analysis 3.1. Clustering Categries 3. Partitining Methds 3..1 The principle 3.. K-Means Methd 3..3 K-Medids Methd 3..4 CLARA 3..5

More information

Meet Moodle Students introduction to Moodle and Email

Meet Moodle Students introduction to Moodle and Email Meet Mdle Students intrductin t Mdle and Email 1. What is Mdle? Mdle is the sftware used fr the Student Intranet and nline curses als knwn as a Virtual Learning Envirnment r VLE fr shrt. It is a web based

More information

ZoomText Network License Installation Guide

ZoomText Network License Installation Guide ZmText Netwrk License Installatin Guide Requirements: Server: Yu will need access t a physical r virtual server (Windws XP r newer) that is nt currently running ZmText, but is n the same netwrk as the

More information

FAQs for Webroot SecureAnywhere Identity Shield

FAQs for Webroot SecureAnywhere Identity Shield FAQs fr Webrt SecureAnywhere Identity Shield Table f Cntents General Questins...2 Why is the bank ffering Webrt SecureAnywhere Identity Shield?... 2 What des it prtect?... 2 Wh is Webrt?... 2 Is the Webrt

More information

Click Studios. Passwordstate. RSA SecurID Configuration

Click Studios. Passwordstate. RSA SecurID Configuration Passwrdstate RSA SecurID Cnfiguratin This dcument and the infrmatin cntrlled therein is the prperty f Click Studis. It must nt be reprduced in whle/part, r therwise disclsed, withut prir cnsent in writing

More information

Readme File. Purpose. Introduction to Data Integration Management. Oracle s Hyperion Data Integration Management Release 9.2.

Readme File. Purpose. Introduction to Data Integration Management. Oracle s Hyperion Data Integration Management Release 9.2. Oracle s Hyperin Data Integratin Management Release 9.2.1 Readme Readme File This file cntains the fllwing sectins: Purpse... 1 Intrductin t Data Integratin Management... 1 Data Integratin Management Adapters...

More information

URI and UUID. Identifying things on the Web.

URI and UUID. Identifying things on the Web. URI and UUID Identifying things on the Web. Overview > Uniform Resource Identifiers (URIs) > URIStreamOpener > Universally Unique Identifiers (UUIDs) Uniform Resource Identifiers > Uniform Resource Identifiers

More information

How To Configure A GSM Modem Using HyperTerminal

How To Configure A GSM Modem Using HyperTerminal Handling a cmplex wrld. Hw T Cnfigure A GSM Mdem Using HyperTerminal Intrductin This dcument prvides a brief descriptin f hw t cnfigure a GSM mdem using the Windws HyperTerminal utility. Please cnsult

More information

IT Quick Reference Guides Using Outlook 2011 for Mac for Faculty and Staff

IT Quick Reference Guides Using Outlook 2011 for Mac for Faculty and Staff IT Quick Reference Guides Using Outlk 2011 fr Mac fr Faculty and Staff Outlk Guides This guide cvers using Outlk 2011 fr Mac fr SU faculty and staff n campus cmputers. This des nt cver using Outlk 2011

More information

Stacks. Linear data structures

Stacks. Linear data structures Stacks Linear data structures Collection of components that can be arranged as a straight line Data structure grows or shrinks as we add or remove objects ADTs provide an abstract layer for various operations

More information

Access EEC s Web Applications... 2 View Messages from EEC... 3 Sign In as a Returning User... 3

Access EEC s Web Applications... 2 View Messages from EEC... 3 Sign In as a Returning User... 3 EEC Single Sign In (SSI) Applicatin The EEC Single Sign In (SSI) Single Sign In (SSI) is the secure, nline applicatin that cntrls access t all f the Department f Early Educatin and Care (EEC) web applicatins.

More information

Illustration 1: Diagram of program function and data flow

Illustration 1: Diagram of program function and data flow The contract called for creation of a random access database of plumbing shops within the near perimeter of FIU Engineering school. The database features a rating number from 1-10 to offer a guideline

More information

Debugging with TotalView

Debugging with TotalView Tim Cramer 17.03.2015 IT Center der RWTH Aachen University Why to use a Debugger? If your program goes haywire, you may... ( wand (... buy a magic... read the source code again and again and...... enrich

More information

SoftLayer Development Lab

SoftLayer Development Lab SftLayer Develpment Lab Phil Jacksn, Chief Evangelist, SftLayer pjacksn@sftlayer.cm @underscrephil Brad DesAulniers, Sftware Engineer, Advanced Clud Slutins IBM GTS bradd@us.ibm.cm @cb_brad Angel Tmala-Reyes,

More information

Lecture 25 Systems Programming Process Control

Lecture 25 Systems Programming Process Control Lecture 25 Systems Programming Process Control A process is defined as an instance of a program that is currently running. A uni processor system or single core system can still execute multiple processes

More information

Process definition Concurrency Process status Process attributes PROCESES 1.3

Process definition Concurrency Process status Process attributes PROCESES 1.3 Process Management Outline Main concepts Basic services for process management (Linux based) Inter process communications: Linux Signals and synchronization Internal process management Basic data structures:

More information

C++ Outline. cout << "Enter two integers: "; int x, y; cin >> x >> y; cout << "The sum is: " << x + y << \n ;

C++ Outline. cout << Enter two integers: ; int x, y; cin >> x >> y; cout << The sum is:  << x + y << \n ; C++ Outline Notes taken from: - Drake, Caleb. EECS 370 Course Notes, University of Illinois Chicago, Spring 97. Chapters 9, 10, 11, 13.1 & 13.2 - Horstman, Cay S. Mastering Object-Oriented Design in C++.

More information

SMTP-32 Library. Simple Mail Transfer Protocol Dynamic Link Library for Microsoft Windows. Version 5.2

SMTP-32 Library. Simple Mail Transfer Protocol Dynamic Link Library for Microsoft Windows. Version 5.2 SMTP-32 Library Simple Mail Transfer Protocol Dynamic Link Library for Microsoft Windows Version 5.2 Copyright 1994-2003 by Distinct Corporation All rights reserved Table of Contents 1 Overview... 5 1.1

More information

GISolve-FluMapper for Interactive Spatial Analysis of Streaming Social Media Data

GISolve-FluMapper for Interactive Spatial Analysis of Streaming Social Media Data GISlve-FluMapper fr Interactive Spatial Analysis f Streaming Scial Media Data Anand Padmanabhan 1,4, Shawen Wang 1,2,3,4, Gufeng Ca 6, MyungHwa Hwang 1, Yanli Zha 1, Zhenhua Zhang 1,5, Yizha Ga 1, Kiumars

More information

Deployment Overview (Installation):

Deployment Overview (Installation): Cntents Deplyment Overview (Installatin):... 2 Installing Minr Updates:... 2 Dwnlading the installatin and latest update files:... 2 Installing the sftware:... 3 Uninstalling the sftware:... 3 Lgging int

More information

File Handling. What is a file?

File Handling. What is a file? File Handling 1 What is a file? A named collection of data, stored in secondary storage (typically). Typical operations on files: Open Read Write Close How is a file stored? Stored as sequence of bytes,

More information

ISAM TO SQL MIGRATION IN SYSPRO

ISAM TO SQL MIGRATION IN SYSPRO 118 ISAM TO SQL MIGRATION IN SYSPRO This dcument is aimed at assisting yu in the migratin frm an ISAM data structure t an SQL database. This is nt a detailed technical dcument and assumes the reader has

More information

VMware View Windows XP Optimization

VMware View Windows XP Optimization VMware View Windws XP Optimizatin VDI Windws XP Optimizatins Let s g thrugh creating a VM fr VDI use. Remember this VM will be used ver and ver again. It is imprtant t get the image small and ptimized.

More information

Logging. Working with the POCO logging framework.

Logging. Working with the POCO logging framework. Logging Working with the POCO logging framework. Overview > Messages, Loggers and Channels > Formatting > Performance Considerations Logging Architecture Message Logger Channel Log File Logging Architecture

More information

PIC Online Application Help Document

PIC Online Application Help Document PIC Online Applicatin Help Dcument Welcme t the PADI PIC Online Applicatin! The PIC Online applicatin is designed t guide yu thrugh the prcess f prcessing Diving, DSD, and Emergency First Respnse certificatins.

More information

Tail call elimination. Michel Schinz

Tail call elimination. Michel Schinz Tail call elimination Michel Schinz Tail calls and their elimination Loops in functional languages Several functional programming languages do not have an explicit looping statement. Instead, programmers

More information

Contents. Extra copies of this booklet are available on the Study Skills section of the school website (www.banbridgehigh.co.

Contents. Extra copies of this booklet are available on the Study Skills section of the school website (www.banbridgehigh.co. Banbridge High Schl Revisin & Examinatins Cntents Hw t Plan Yur Revisin... 2 A sample timetable:... 3 Sample Revisin Timetable... 4 Hw t Create the Right Envirnment: Setting Up My Space... 5 Think Abut

More information

Microsoft SQL Server Administration

Microsoft SQL Server Administration Micrsft SQL Server Administratin Disk & memry David Hksza http://siret.cz/hksza Lecture Outline Query lifecycle Data strage SQL Server Memry SELECT Query Lifecycle 1. SNI client-server cnnectin using TCP/IP

More information

Lecture 18-19 Data Types and Types of a Language

Lecture 18-19 Data Types and Types of a Language Lecture 18-19 Data Types and Types of a Language April 29, 2014 Data Types and Types of a Language Data, Data Types and Types Type: Generalities Type Systems and Type Safety Type Equivalence, Coercion

More information

Batch Prcess in C# Excel

Batch Prcess in C# Excel isupprt Case Management Prject BSTL Batch Status Lg Design Specificatin Dcument BSTL Batch Status Lg January 4, 2016 BSTL Batch Status Lg Table f Cntents 1. INTRODUCTION... 2 2. SCREEN DETAILS... 3 Last

More information

The C Programming Language course syllabus associate level

The C Programming Language course syllabus associate level TECHNOLOGIES The C Programming Language course syllabus associate level Course description The course fully covers the basics of programming in the C programming language and demonstrates fundamental programming

More information

COUNSELING DEFINITIONS

COUNSELING DEFINITIONS Client TERM COUNSELING DEFINITIONS DEFINITION The client is the business, if it exists. In the case f a prspective business, the client is the individual. In-Business: Cmpleted required registratin(s),

More information

System Business Continuity Classification

System Business Continuity Classification System Business Cntinuity Classificatin Business Cntinuity Prcedures Infrmatin System Cntingency Plan (ISCP) Business Impact Analysis (BIA) System Recvery Prcedures (SRP) Cre Infrastructure Criticality

More information

About The Tutorial. Audience. Prerequisites. Copyright & Disclaimer

About The Tutorial. Audience. Prerequisites. Copyright & Disclaimer About The Tutorial C is a general-purpose, procedural, imperative computer programming language developed in 1972 by Dennis M. Ritchie at the Bell Telephone Laboratories to develop the UNIX operating system.

More information

Remote Setup and Configuration of the Outlook Email Program Information Technology Group

Remote Setup and Configuration of the Outlook Email Program Information Technology Group Remte Setup and Cnfiguratin f the Outlk Email Prgram Infrmatin Technlgy Grup The fllwing instructins will help guide yu in the prper set up f yur Outlk Email Accunt. Please nte that these instructins are

More information

Enabled Commerce Volume ($B)

Enabled Commerce Volume ($B) ebay Inc. enables glbal cmmerce n behalf f users, merchants, retailers and brands f all sizes. We enable cmmerce thrugh three reprtable segments: Marketplaces, Payments and ebay Enterprise. Driven by the

More information

Computer Science Undergraduate Scholarship

Computer Science Undergraduate Scholarship Cmputer Science Undergraduate Schlarship R E G U L A T I O N S The Cmputer Science Department at the University f Waikat runs an annual Schlarship examinatin which ffers up t 10 undergraduate Schlarships

More information

CORBA Programming with TAOX11. The C++11 CORBA Implementation

CORBA Programming with TAOX11. The C++11 CORBA Implementation CORBA Programming with TAOX11 The C++11 CORBA Implementation TAOX11: the CORBA Implementation by Remedy IT TAOX11 simplifies development of CORBA based applications IDL to C++11 language mapping is easy

More information

Outlook Plug-In. Send Conference Invites from Outlook. Downloading Outlook Plug-In CONFERENCING & COLLABORATION RESERVATIONLESS-PLUS

Outlook Plug-In. Send Conference Invites from Outlook. Downloading Outlook Plug-In CONFERENCING & COLLABORATION RESERVATIONLESS-PLUS USER GUIDE Outlk Plug-In Send Cnference Invites frm Outlk Scheduling cnference calls and always typing in the same dial-in number and cnference cde can be a bit tedius, especially when yu re in a hurry.

More information

CS4500/5500 Opera-ng Systems Distributed and Parallel File Systems

CS4500/5500 Opera-ng Systems Distributed and Parallel File Systems Opera-ng Systems Distributed and Parallel File Systems Jia Ra Department f Cmputer Science hcp://www.cs.uccs.edu/~jra Recap f Previus Classes File systems prvide an abstrac0n f permanently stred data Namespace:

More information

Device Management API for Windows* and Linux* Operating Systems

Device Management API for Windows* and Linux* Operating Systems Device Management API for Windows* and Linux* Operating Systems Library Reference September 2004 05-2222-002 INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO LICENSE, EXPRESS

More information

ViPNet VPN in Cisco Environment. Supplement to ViPNet Documentation

ViPNet VPN in Cisco Environment. Supplement to ViPNet Documentation ViPNet VPN in Cisc Envirnment Supplement t ViPNet Dcumentatin 1991 2015 Inftecs Americas. All rights reserved. Versin: 00121-04 90 02 ENU This dcument is included in the sftware distributin kit and is

More information

Level 3 Small Business Local SEO Package

Level 3 Small Business Local SEO Package Level 3 Small Business Lcal SEO Package NetLcal SEO Methdlgy Keywrd Research and Plan First we start by identifying a list f the best keywrds ( mney keywrds ) fr yur campaign. Using this list we develp

More information

Elementary Name and Address. Conversions

Elementary Name and Address. Conversions Elementary Name and Address Domain name system Conversions gethostbyname Function RES_USE_INET6 resolver option gethostbyname2 Function and IPv6 support gethostbyaddr Function uname and gethostname Functions

More information

Siemens traffic detectors. With technologies ranging from magnetic field to Bluetooth, we offer the right detector system for any application

Siemens traffic detectors. With technologies ranging from magnetic field to Bluetooth, we offer the right detector system for any application siemens.cm/mbility Siemens traffic detectrs With technlgies ranging frm magnetic field t Bluetth, we ffer the right detectr system fr any applicatin Clse t twenty prducts, six technlgies, all with the

More information

Customers FAQs for Webroot SecureAnywhere Identity Shield

Customers FAQs for Webroot SecureAnywhere Identity Shield Custmers FAQs fr Webrt SecureAnywhere Identity Shield Table f Cntents General Questins...2 Why is the bank ffering Webrt SecureAnywhere sftware?... 2 What des it prtect?... 2 Wh is Webrt?... 2 Is Webrt

More information

HADOOP. Session 1: Introduction to Hadoop & Big Data. Session 2: Hadoop Distributed File Systems. Session 3: Administering Hadoop Cluster

HADOOP. Session 1: Introduction to Hadoop & Big Data. Session 2: Hadoop Distributed File Systems. Session 3: Administering Hadoop Cluster HADOOP Sessin 1: Intrductin t Hadp & Big Data What is Hadp? Big data and Big Data Analytical services Histry f Hadp Hadp Ec-Systems Hadp Framewrk Hadp Distributin Hadp Cre Cmpnents Hadp Vs RDBMS Sessin

More information

1) The postfix expression for the infix expression A+B*(C+D)/F+D*E is ABCD+*F/DE*++

1) The postfix expression for the infix expression A+B*(C+D)/F+D*E is ABCD+*F/DE*++ Answer the following 1) The postfix expression for the infix expression A+B*(C+D)/F+D*E is ABCD+*F/DE*++ 2) Which data structure is needed to convert infix notations to postfix notations? Stack 3) The

More information

HWg-Ares 12/14 MANUAL

HWg-Ares 12/14 MANUAL 12/14 MANUAL Package contents A complete shipment contains the following items: HWg-Ares unit Printed manual + datasheet Safety information The device complies with regulations and industrial standards

More information

Setup O365 mailbox access on MACs

Setup O365 mailbox access on MACs Setup O365 mailbx access n MACs Yu can use a web brwser r an email prgram n yur cmputer t cnnect t yur email accunt. Web brwser access Yu cnnect yur Apple cmputer t yur email accunt by using a web brwser

More information