当前位置:网站首页>C language file operation
C language file operation
2022-07-06 14:05:00 【bytenums】
- What is a document
- file name
- file type
- File buffer
- The file pointer
- Opening and closing of files
- Sequential reading and writing of files
- Random reading and writing of documents
- Determination of end of document
Text begins
What is a document
The files on disk are files .
But in programming , There are two kinds of documents we usually talk about : Program files 、 Data files
Program files
- Include source files ( The suffix is .c), Target file (windows Environment suffix is .obj), Executable program (windows Environment suffix is .exe).
Data files
- The content of the file is not necessarily a program , It's the data that the program reads and writes when it runs , For example, the file from which the program needs to read data , Or output content file .
This chapter discusses data files .
In the previous chapters, the input and output of the processed data are targeted at the terminal , That is, input data from the keyboard of the terminal , The operation results are displayed on the display .
In fact, sometimes we output information to disk , When necessary, read the data from the disk to the memory for use , What we are dealing with here is the files on the disk .
file name
A file should have a unique file ID , So that users can identify and reference .
The filename contains 3 part : File path + File name trunk + file extension
for example : c:\code\test.txt
For convenience , Document identification is often referred to as file name .
file type
According to the organization of data , Data files are called text file perhaps Binary .
Data is stored in memory in binary form , If the output without conversion is to external memory , Namely Binary .
If it's required to use ASCII In the form of code , You need to convert before storing . With ASCII The file stored in the form of characters is text file .
How is a data stored in memory ?
All characters are written in ASCII stored , Numerical data can be used either ASCII stored , It can also be stored in binary form .
If there are integers 10000, If the ASCII Code output to disk , The disk is occupied by 5 Bytes ( One byte per character ), And binary form input Out , On the disk 4 Bytes (VS2013 test ).
边栏推荐
- Nuxtjs快速上手(Nuxt2)
- 力扣152题乘数最大子数组
- Network layer - simple ARP disconnection
- Strengthen basic learning records
- 1143_ SiCp learning notes_ Tree recursion
- Wei Shen of Peking University revealed the current situation: his class is not very good, and there are only 5 or 6 middle-term students left after leaving class
- Have you encountered ABA problems? Let's talk about the following in detail, how to avoid ABA problems
- Hackmyvm target series (7) -tron
- Analysis of penetration test learning and actual combat stage
- 小程序web抓包-fiddler
猜你喜欢

Build domain environment (win)

【黑马早报】上海市监局回应钟薛高烧不化;麦趣尔承认两批次纯牛奶不合格;微信内测一个手机可注册俩号;度小满回应存款变理财产品...

Xray and Burp linked Mining

记一次api接口SQL注入实战

实验六 继承和多态

Canvas foundation 2 - arc - draw arc

HackMyvm靶机系列(2)-warrior

Hackmyvm target series (6) -videoclub

Record a penetration of the cat shed from outside to inside. Library operation extraction flag

Hackmyvm target series (7) -tron
随机推荐
7-3 construction hash table (PTA program design)
Poker game program - man machine confrontation
内网渗透之内网信息收集(一)
内网渗透之内网信息收集(五)
Principles, advantages and disadvantages of two persistence mechanisms RDB and AOF of redis
记一次猫舍由外到内的渗透撞库操作提取-flag
Strengthen basic learning records
Which is more advantageous in short-term or long-term spot gold investment?
MATLAB打开.m文件乱码解决办法
xray與burp聯動 挖掘
实验五 类和对象
Yugu p1012 spelling +p1019 word Solitaire (string)
SRC mining ideas and methods
Experiment 4 array
Xray and burp linkage mining
简单理解ES6的Promise
Hackmyvm target series (5) -warez
Have you encountered ABA problems? Let's talk about the following in detail, how to avoid ABA problems
Hackmyvm target series (1) -webmaster
[MySQL table structure and integrity constraint modification (Alter)]