Question about Operating Systems

1 Answer

C++ PROGRAMMING A PROGRAM THAT INSERTS A LIST OF WORKERS WITH THEIR,NAME, JOB,AGE AND SURNAMES USING C++ DATA STRUCTURES

Posted by on

1 Answer

  • Level 1:

    An expert who has achieved level 1.

    Hot-Shot:

    An expert who has answered 20 questions.

    Corporal:

    An expert that hasĀ over 10 points.

    Problem Solver:

    An expert who has answered 5 questions.

  • Contributor
  • 21 Answers

Dear Mr. Thephu,
here is the solution:
first, declare a structure
struct workers
{
char name[20],job[10],surname[20];
int age;
workers *next; // this is the pointer to the next node of
//type worker.
};
in the main program, declare a pointer to first worker node called head as :
workers *head;
head = new workers;
or (head =( workers *) malloc (sizeof(workers));
Then in the main program, whenever the user wishes to create a worker and join it to the list, u can include the following code:
head ->next = new workers;
cin >> head -> name >>job>>surname >> age;
if the user finishes the input include,
head -> next = NULL.

Posted on Feb 05, 2008

Add Your Answer

Uploading: 0%

my-video-file.mp4

Complete. Click "Add" to insert your video. Add

×

Loading...
Loading...

Related Questions:

1 Answer

Meaning of the name Hailey and Halim ?


Origin of the name Hayley:

Transferred use of a Northern English surname derived from Hale or Hales (residing in a nook, recess, or remote valley). It has also been suggested that Hayley derives from the place-name Hailey, which is composed of the Old English elements h?g (hay) and l?ah (wood, clearing, meadow.
No results listed for Halim
No resaults listed for "Halim"

Nov 10, 2016 | Operating Systems

1 Answer

7. Program to manipulate N student details and sort the structures as per total marks obtained by them, by creating a structure to store the following details. Roll number, name, marks1, marks2, marks3


You can use Windows Excel
or
Adobe Open Office (free)

Select 'Spreadsheet' and away you go
The column width can be adjusted to suit the text
Text size is adjustable
Exam marks 1.2,3,4 etc can be auto calculated
Suggested format below (Open Office)
Name Fred Mary Jane



Roll 1 2 3



Exam 1 75 55 73



Exam2 80 81 82



Exam 3 66 71 90







Total 222 209 248

Mar 04, 2015 | Operating Systems

1 Answer

Recover passwords


Every time you choose to save a password in an application or on a Web site, the password data is stored in a secure location on your computer.
If you are an administrator, you can access the password data and retrieve a list of passwords that have been used on your computer.
Password data is stored in different ways on PC and MacIntosh computers, but the information is accessible on both types of systems.

Log on to your PC computer with an administrator account.
Open the "Start" menu and click on the "Run" button.
Type "keymgr.dll" into the text box and hit "Enter." The Key Manager utility program will launch and display a list of passwords used on the computer.
Highlight the password item you want more information about.
Click on the "Properties" button on the right side of the window to view more information about the selected password item.
The pop-up window will display the username, password and server address for the selected item.
Find Passwords Without Programs

Almost everything on a computer or on the Internet requires passwords.
If you are like most people, between home, school, work and your social networking, you have a host of passwords.
So what happens when you cannot remember your most basic passwords, such as your Windows password?
There are programs that can find passwords for you, but there is a way to find them without a program or software.

Open your computer's Start option.
Click on Accessories panel. Under this, you will see the program "Run," and click on it.
You will have a black window with a typing bar that is displayed DOS Mode.
Write down your passwords for future reference.
Type in "cmd" in the blank, then press the Enter button.
You should then be given a screen that looks like the old Disc Operating Screens, just a blank screen with information.
You will see the words "Account information."
Type "netuser/user" and press "Enter."
Computer passwords are a key to our computer and online privacy.
Look at the list of all your computer's programs that appear on your screen.
Pick the program that you wish to change the password for, and after that program name type in "netusername", hit space and and click "star" key.
So if you're Bob, it would read "netuserbob *".
Be sure and put in the name you use for the specific computer you are changing passwords on.
You can then create a new password that will allow you to get back into the program.
If you have forgotten more than one password, you can repeat the process for other programs.
Do not exit the black screen but simply go back to the other program's names and repeat the same process with "netusername *",
Enter, and new password.

Nov 11, 2013 | Operating Systems

1 Answer

HOW DO I ACCESS WEB CAM WITHOUT THE CONSENT. WHAT BEST FREE SOFTWARE ARE AVAILABLE FOR COMMON MAN


Web camera chatting is made possible with compatible computers, network structures, also mentionable are camera device peripherals. The computer compatibilities allows to camera install programs that makes chatting on networks achievable. For example, acquire computer that are web camera comparable also of recent innovations have built-in features least requiring user manipulations to attain experiences. Once acquired a new computer of recent age, a built in camera performs as capture device for programs and network requirements. Recent wireless networks override the request to install cable structure that makes telecommunications possible. Installing a wireless connection to share signal makes convenient the media sharing capacities especially on computers with built-in cameras. At which point the computer networking and resources requirements have been accomplished. Similar structures elsewhere on the network makes possible web camera conferencing achievements. Usually the computer requirements have been satisfied. The remaining processes are achieved as customization requests. For example, the networked computer teleconferences with common programs on each computer devices. Usually informing the chat entities to acquire similar programs overrides the compatibility miscommunications. For example, requesting for chat conferencing to be achieved on yahoo messenger or msn massager, daybook chat or YouTube chat messaging where each entity acquires the details in computer structures overrides the compatibility malfunctions. In which instance, chat communication should least expect malfunctions. Chat conferencing becomes cost incurred when each member entity places charges on the process to arrive at message telecommunications. Also, in the situation where an entity lacks computer resource structures that has cost incurred compromises the free nature of telecommunication.

Feb 11, 2011 | Operating Systems

1 Answer

Err shows data execution prevention after restarting the machine


if it list a name of some program you did not ask it to run then your virus protection is working. usually you run your virus program that can be a long process. It will list virus found and quarantine. usually solves that problem. I also use a start up list of programs that start and let me kill ones I don't want running at start up. CCleaner has programs that cleans all the junk your computer load's up from being online adding and taking out program's or game's and it also has a list of what your computer does at start up and lets you edit the list. You can get that program at cnet.com

Apr 13, 2010 | Microsoft Windows XP Home Edition

1 Answer

Hi! can anyone help me?


hot to access ipcamera for linux fedora 8 is it possible or not

Mar 21, 2009 | Operating Systems

1 Answer

I want circularlinklist program in c++


This C++ program is to perform the following operations
on a circular linked list
1)insertion
2)forward traversal
3)reverse traversal
4)search
->node structure :
a node contains
1) integer data
2) pointer to next node
-> This program works in microsoft VC++ environment
in windows xp
-> This program uses the following header files
1)iostream.h
********************************************************/
#include<iostream.h>
class cll
{
private:
int data;
cll *next;
public:
cll* insert_one(int,cll*);
cll* delete_one(int,cll*);
void ftraverse(cll*);
void rtraverse(cll*);
void search(int,cll*);
void function();
};
cll*hd;
void cll::function()
{
cout<<”******************************************\n”;
cout<<”program to implement a circular linked list \n”;
cout<<”******************************************\n”;
cll * head;
head=NULL;
cout<<”\n\nMENU :\n”;
cout<<”1)insertion\n”
<<”2forward traversal\n”
<<”3)reverse traversal\n”
<<”4)search\n”
<<”5)exit\n\n”;
cout<<”Enter your option :”;
int opt;
cin>>opt;
int d;
while(opt!=5)
{
switch(opt)
{
case 1:
cout<<”Enter data to the node :”;
cin>>d;
head=insert_one(d,head);
cout<<”inserted\n”;
break;
case 2:
cout<<”The forward traversal is :\n”;
ftraverse(head);
break;
case 3:
cout<<”The reverse traversal is :\n”;
hd=head;
rtraverse(head);
cout<<”NULL\n”;
break;
case 4:
cout<<”Enter the element to be searched :”;
int d;
cin>>d;
search(d,head);
break;
case 5:
break;
default:
cout<<”invalid option”;
break;
}
cout<<”\n\nMENU :\n”;
cout<<”1)insertion\n”
<<”2)forward traversal\n”
<<”3)reverse traversal\n”
<<”4)search\n”
<<”5)exit\n\n”;
cout<<”Enter your option :”;
cin>>opt;
}
}
cll* cll::insert_one(int d,cll* c)
{
cll*NEW;
NEW=new cll;
NEW->data=d;
NEW->next=NULL;
if(c==NULL)
{
c=NEW;
c->next=c;
}
else
{
cll*c1=c;
while(c1->next!=c)
c1=c1->next;
c1->next=NEW;
NEW->next=c;
}
return c;
}
void cll::ftraverse(cll* c)
{
if(c==NULL)
{
cout<<”\nlist empty\n”;
return;
}
else
{
cll *c1=c;
cout<<c1->data<<”->”;
c1=c1->next;
while(c1!=c)
{
cout<<c1->data<<”->”;
c1=c1->next;
}
cout<<”NULL\n”;
}
}
void cll::rtraverse(cll* c)
{
if(c->next==hd)
{
cout<<c->data<<”->”;
return;
}
else
rtraverse(c->next);
cout<<c->data<<”->”;
}
void cll::search(int d,cll* c)
{
cll*c1=c;
if(c==NULL)
{
cout<<”\nlist empty\n”;
return;
}
else
{
if(c->data == d)
{
cout<<”found\n”;
return ;
}
while(c->next !=c1)
{
if(c->data==d)
{
cout<<”found\n”;
return ;
}
c=c->next;
}
if(c->data ==d)
{
cout<<”found\n”;
return ;
}
cout<<” search unsuccess ful \n”;
}
}
void main()
{
cll list;
list.function();
}

Mar 05, 2009 | Operating Systems

1 Answer

Schema classes and attributes


Every directory object you create is an instance of an object class contained in the schema. Each object class contains a list of associated attributes that determine the information the object can contain. Classes and attributes are defined independently, so that a single attribute can be associated with multiple classes. All schema classes and attributes are defined by the classSchema and attributeSchema objects, respectively.

Classes

ClassSchema objects are used to define classes in the schema. A classSchema object provides the template for building directory objects of that class. Examples of classSchema include User and Server. A classSchema object contains, among other things, the following information:
Class type (structural, abstract, or auxiliary)

Common name and Lightweight Directory Access Protocol (LDAP) display name

Lists of the "must contain" and "may contain" attributes for instances of the object

Relative distinguished name attribute

A list of possible parent classes

Class types

Three different types of classes exist in the schema:Class type Purpose

Structural
Used to instantiate objects (users, servers and so on) in the directory.

Abstract
Provides templates for deriving structural classes

Auxiliary
Contains predefined lists of attributes that can be included in structural and abstract classes

Attributes

AttributeSchema objects are used to define attributes in the schema. An attributeSchema object determines the allowable contents and syntax for instances of that attribute in the directory. Examples of attributeSchema include User-Principal-Name and Telex-Number. An attributeSchema object contains, among other things, the following information:•
Common name and LDAP display name

Syntax rules

Data constraints (single versus multivalued, minimum, and maximum values)

Whether and how the attribute is indexed

Jul 17, 2008 | Microsoft Windows Server Standard 2003 for...

1 Answer

Programming


This sounds remarkably like a homework assignment type of question. Any C++ reference book will contain examples of this. Also, look for books about data structures which will contain not only examples of the above, but complete explanations of the concepts and uses of each.
Dan

Mar 24, 2008 | Operating Systems

Not finding what you are looking for?
Operating Systems Logo

Related Topics:

175 people viewed this question

Ask a Question

Usually answered in minutes!

Top Operating Systems Experts

Les Dickinson
Les Dickinson

Level 3 Expert

18298 Answers

Brian Sullivan
Brian Sullivan

Level 3 Expert

27725 Answers

Prashant  Sharma
Prashant Sharma

Level 3 Expert

1127 Answers

Are you an Operating System Expert? Answer questions, earn points and help others

Answer questions

Manuals & User Guides

Loading...