/* Lexical Analyzer for 'C' Language Author: Yasar Shaikh Lexical Analyzer: http://en.wikipedia.org/wiki/Lexical_analysis */ #include<stdio.h> #include<string.h> #include<ctype.h> #define MAX 1000 int main() { //FILE pointer for getting input file i for general index, //flag for var identification FILE *fp; int keyIndex,preIndex,varIndex,oprIndex,i,flag; char keyStore[MAX][10],preStore[MAX][10],varStore[MAX][10]; char oprStore[MAX],fname[80],ch,temp[80]; char keyword[32][20]={ "auto","break","case","continue", "char","const","default","do", "double","else","enum","extern", "float","for","goto","if", "int","long","register","return", "short","signed","sizeof","static", "struct","switch","typedef","union", "unsigned","void","volatile","while" }; char preprocessor[2][20]={"include","define"}; printf("\nEnter file name:"); scanf("%s",fname); //opening a file in Read mode n checking for its availabilty fp=fopen(fname,"r"); if(NULL == fp) { printf("\nFile not found."); return 0; } keyIndex=varIndex=preIndex=oprIndex=0; //Do operation until EOF is reached. while(!feof(fp)) { ch=fgetc(fp); if(!isalnum(ch)) oprStore[oprIndex++]=ch; else { //getting string i=flag=0; temp[i]=ch; i++; temp[i]=fgetc(fp); while( isalnum(temp[i]) ) temp[++i]=fgetc(fp); temp[i]='\0'; fseek(fp, SEEK_CUR-2 , SEEK_CUR); //checking is it a keyword/var/preprocessor for(i=0;i<32;i++) { //keyword checking n storing if(strcmp(temp,keyword[i]) ==0) { strcpy(keyStore[keyIndex++],temp); flag=1; break; } //preprocessor checking n storing else if(strcmp(temp,preprocessor[i])==0) { strcpy(preStore[preIndex++],temp); flag=1; break; } } //checking for variables if(!flag) { strcpy(varStore[varIndex++],temp); strcpy(temp,""); } } } printf("\n******* OUTPUT *******"); printf("\n\nPreprocessor's List"); for(i=0;i<preIndex;i++) printf("\n%s",preStore[i]); printf("\n\nKeyword List"); for(i=0;i<keyIndex;i++) printf("\n%s",keyStore[i]); printf("\n\nVariable List"); for(i=0;i<varIndex;i++) printf("\n%s",varStore[i]); printf("\n\nOperators List"); for(i=0;i<oprIndex;i++) printf("\n%c",oprStore[i]); return 0; } /* PS; You can even seperate standard header files, predefined identifiers. The above program mainly focus on important tokens. */
WHAT'S NEW?
Loading...
/*
Title : Program for demonstrating Layouts in Java
Author: Yasar Shaikh
*/
import java.awt.*;
import java.awt.event.*;
import java.applet.*;
public class LayoutDemo extends Frame implements ActionListener
{
Button b1,b2,b3,b4,b5,b6;
Button l1,l2,l3;
CheckboxGroup cbg;
Checkbox c1,c3,c2;
Panel p1,p2,main;
LayoutDemo l;
public LayoutDemo()
{
p1=new Panel();
p2=new Panel();
main=new Panel();
l=this;
p1.setLayout(new FlowLayout());
p2.setLayout(new GridLayout());
cbg=new CheckboxGroup();
c1=new Checkbox("Left",cbg,false);
c2=new Checkbox("Center",cbg,false);
c3=new Checkbox("Right",cbg,false);
l1=new Button("Flow");
l2=new Button("Grid");
l3=new Button("Border");
b1=new Button("Button 1");
b2=new Button("Button 2");
b3=new Button("Button 3");
b4=new Button("Button 4");
b5=new Button("Button 5");
b6=new Button("Button 6");
p1.add(b1); p1.add(b2);
p1.add(b3); p1.add(b4);
p1.add(b5); p1.add(b6);
p1.add(c1);p1.add(c2);p1.add(c3);
p2.add(l1);p2.add(l2);p2.add(l3);
l1.addActionListener(this);
l2.addActionListener(this);
l3.addActionListener(this);
main.setLayout(new BorderLayout());
main.add(p1,BorderLayout.NORTH);
main.add(p2,BorderLayout.SOUTH);
add(main);
}
public void actionPerformed(ActionEvent ae)
{
if(ae.getSource()==l2)
{
l.setSize(700,700);
repaint();
p1.setLayout(new GridLayout(3,3));
}
else if(ae.getSource()==l3)
{
l.setSize(800,800);
repaint();
main.add(p1,BorderLayout.WEST);
}
else
{
l.setSize(600,600);
repaint();
p1.setLayout(new FlowLayout());
}
}
public static void main(String ar[])
{
LayoutDemo l=new LayoutDemo();
l.setSize(600,600);
l.setVisible(true);
}
}
/*
PS: Save the above program with the name LayoutDemo.java (case-sensitive)
and then compile it with "javac LayoutDemo.java" command and execute
it with "java LayoutDemo" command in command prompt/terminal.
*/
Change the administrator password without knowing the original password 1. Go to start->Run 2. Type "CMD" and press enter 3. Then Type "net usernet user XYZ abc123 You had changed the password to abc123. P.S.: This is for only educational purpose. Supports in Win Xp. If administrator had changed the policies of system,then you won't be able to do above steps.
AAL ->ATM Adaptation Layer AM ->Amplitude Modulation AMI ->Alternate Mark Inversion ANS ->American National Standard ANSI ->American National Standard Institute ARQ ->Automatic Repeat Request ASCII ->American Standard Code for Information Interchange ASK ->Amplitude-Shift Keying ATM ->Asynchronous Transfer Mode B-ISDN ->Broadband ISDN BOC ->Bell Operating Company CBR ->Constant Bit Rate CCITT ->International Consultative Committee on Telegraphy and Telephony CIR ->Committed Information Rate CRC ->Cyclic Redundancy Check CSMAICD ->Carrier Sense Multiple Access with Collision Detection DCE ->Data Circuit-Terminating Equipment DES ->Data Encryption Standard DTE ->Data Terminal Equipment FCC ->Federal Communications Commission FCS ->Frame Check Sequence FDDI ->Fiber Distributed Data Interface FDM ->Frequency-Division Multiplexing FSK ->Frequency-Shift Keying FTP ->File Transfer Protocol FM ->Frequency Modulation HDLC ->High-Level Data Link Control HTTP ->Hypertext Transfer Protocol ICMP ->Internet Control Message Protocol IDN ->Integrated Digital Network IEEE ->Institute of Electrical and Electronics Engineers IETF ->Internet Engineering Task Force IP ->Internet Protocol IPng ->Internet Protocol - Next Generation ISDN ->Integrated Services Digital Network IS0 ->International Organization for Standardization ITU ->International Telecommunication Union ITU-T ->ITU Telecommunication Standardization Sector LAN ->Local Area Network LAPB ->Link Access Procedure-Balanced LAPD ->Link Access Procedure on the D Channel LAPF ->Link Access Procedure for Frame Mode Bearer Services LLC ->Logical Link Control MAC ->Medium Access Control MAN ->Metropolitan Area Network MIME ->Multi-Purpose Internet Mail Extension NRZI ->Nonreturn to Zero, Inverted NRZL ->Nonreturn to Zero, Level NT ->Network Termination OSI ->Open Systems Interconnection PBX ->Private Branch Exchange PCM ->Pulse-Code Modulation PDU ->Protocol Data Unit PSK ->Phase-Shift Keying PTT ->Postal, Telegraph, and Telephone PM ->Phase Modulation QOS ->Quality of Service QPSK ->Quadrature Phase Shift Keying RBOC ->Regional Bell Operating Company RF ->Radio Frequency RSA ->Rivest, Shamir, Adleman Algorithm SAP ->Service Access Point SDH ->Synchronous Digital Hierarchy SDU ->Service Data Unit SMTP ->Simple Mail Transfer Protocol SOAP ->Simple Object Access Protocol SONET ->Synchronous Optical Network TCP ->Transmission Control Protocol TDM ->Time-Division Multiplexing TE ->Terminal Equipment UNI ->User-Network Interface URI ->Universal Resource Identifier URL ->Uniform Resource Locator VAN ->Value-Added Network VBR ->Variable Bit Rate VCC ->Virtual Channel Connection VPC ->Virtual Path Connection WWW ->World Wide Web
Hey guyz, Whoever have not got Aadhar card,and still wanna need it or use it. So follow following step to get a valid soft copy of Aadhar Card. Goto: http://eaadhaar.uidai.gov.in/ And all you need is Enrollment no and the date and time of registering on Aadhar. This is mentioned on you Aadhar card's receipt. 1. Enter Your Enrollment Number: 2. After that enter your Date and Time of Registration: 3. In Resident Name: Enter your Name and Surname as noted on Aadhar Card. 4. After that enter your PIN 5. At last enter CAPTCHA code given in that image. This all complete verification. Now its time of validation.Now you will display last 04 digit of your mobile number which you have given at the time of registration of Aadhar. Or if you have changed your mobile or it may lost.Click on "No" button.And Enter your new mobile number. Now One Time Password(OTP) will be sent on your mobile number. Enter this for validation. Now you will get a link to download your E-Aadhar. Download your E-Aadhar. Your area's PIN is the password of that pdf. If it asks for validation,click here for more details of validation: http://eaadhaar.uidai.gov.in/ValidateDocumnet/ValidateDigitalSignatures.htm P.S. : Don't give your information to other. They can get easily your Aadhar card with that information and use it as proof on behalf on them.