File Operation such as
Reading the file content
Writing the content to the file
Copying the content from one file to another file
Counting the number of character, words and lines of the file
A command macro is a text file that contains one or more commands and/or command macro statements and that has a name ending with the suffix .cm. You invoke a macro by entering its name. The operating system then sequentially executes the commands and macro statements in the file.
A command macro is useful to replace one of the following:
a long command string that you issue frequently
a group of internal commands, command macros, and/or program modules that together perform an operation you regularly require
a sequence of internal commands, command macros, and/or program modules that you execute in a certain way depending on external factors
File Operation such as
Reading the file content
Writing the content to the file
Copying the content from one file to another file
Counting the number of character, words and lines of the file
A command macro is a text file that contains one or more commands and/or command macro statements and that has a name ending with the suffix .cm. You invoke a macro by entering its name. The operating system then sequentially executes the commands and macro statements in the file.
A command macro is useful to replace one of the following:
a long command string that you issue frequently
a group of internal commands, command macros, and/or program modules that together perform an operation you regularly require
a sequence of internal commands, command macros, and/or program modules that you execute in a certain way depending on external factors
This VB tool can extract titles/footnotes from Table Shell and save as a TXT file which is friendly to editing. What you see is what you get.
The user will automatically generate a report of the TFL production/validation status.
Also it can select the package you want and convert LST file to Word format.
Structures-Declaring and Initializing, Nested structure, Array of Structure, Passing Structures to functions, Unions, typedef, enum, Bit fields.
Pointers: Declarations, Pointer arithmetic, Pointers and functions, call by value, Call by reference, Pointers and Arrays, Arrays of Pointers, Pointers and Structures. Meaning of static and dynamic memory allocation, Memory allocation functions.
Files: File modes, File functions, and File operations, Text and Binary files, Command Line arguments Preprocessor directives. Macros: Definition, types of Macros, Creating and implementing user defined header files
Structures-Declaring and Initializing, Nested structure, Array of Structure, Passing Structures to functions, Unions, typedef, enum, Bit fields.
Pointers: Declarations, Pointer arithmetic, Pointers and functions, call by value, Call by reference, Pointers and Arrays, Arrays of Pointers, Pointers and Structures. Meaning of static and dynamic memory allocation, Memory allocation functions.
Files: File modes, File functions, and File operations, Text and Binary files, Command Line arguments Preprocessor directives. Macros: Definition, types of Macros, Creating and implementing user defined header files
COURSE TITLE: SOFTWARE DEVELOPMENT VI
COURSE CODE: VIT 351
TOPICS COVERED:
FILES
FILES I/O STREAM
TYPES OF FILES
DRAWBACKS OF TRADITIONAL METHOD OF DATA STORAGE
CONCEPT OF BUFFER
MODES OF FILE OPENING
END OF FILE
PROCESSORS DIRECTIVES
MACROS
TYPES OF MACROS
DIFFERENCE BETWEEN MACROS AND FUNCTIONS
QUIZ SET 5
Functions: Function Definition, prototyping, types of functions, passing arguments to functions, Nested Functions, Recursive functions.
Strings: Declaring and Initializing strings, Operations on strings, Arrays of strings, passing strings to functions. Storage Classes: Automatic, External, Static and Register Variables.
A Programmatic View and Implementation of XMLCSCJournals
Ā
XML as a markup language defines rules to encode data in a free format comprehensive by both human and machines. Usage of XML as a support for data integration, file configuration and interface definition is widely adopted and implemented by the software industry community.
The purpose of this paper is to examine an implementation of XML as a programming language, extending the capabilities offered by frameworks and simplifying the coding tasks. The code becomes a set of functions sharing the same pattern all written as XML parts. The defined language takes advantage from the predefined common libraries and provides a mean to invoke handlers from user interface components. Programmers take benefits from the simplicity of this language to apprehend quickly the logic implemented by a function, which result in an increase in maintenance quality and rapid development stability.
Strategic Business Planning DevelopmentDave Warnes
Ā
Initially targeted to OPVMC, but generally useful for any practice looking to grow and provide a useful dialogue with their staff members to explain what they would like them to do and why. This is part one of a series of presentations that provide specific research from the Pew Institute, AAHA, the AVMA, etc,.....
This VB tool can extract titles/footnotes from Table Shell and save as a TXT file which is friendly to editing. What you see is what you get.
The user will automatically generate a report of the TFL production/validation status.
Also it can select the package you want and convert LST file to Word format.
Structures-Declaring and Initializing, Nested structure, Array of Structure, Passing Structures to functions, Unions, typedef, enum, Bit fields.
Pointers: Declarations, Pointer arithmetic, Pointers and functions, call by value, Call by reference, Pointers and Arrays, Arrays of Pointers, Pointers and Structures. Meaning of static and dynamic memory allocation, Memory allocation functions.
Files: File modes, File functions, and File operations, Text and Binary files, Command Line arguments Preprocessor directives. Macros: Definition, types of Macros, Creating and implementing user defined header files
Structures-Declaring and Initializing, Nested structure, Array of Structure, Passing Structures to functions, Unions, typedef, enum, Bit fields.
Pointers: Declarations, Pointer arithmetic, Pointers and functions, call by value, Call by reference, Pointers and Arrays, Arrays of Pointers, Pointers and Structures. Meaning of static and dynamic memory allocation, Memory allocation functions.
Files: File modes, File functions, and File operations, Text and Binary files, Command Line arguments Preprocessor directives. Macros: Definition, types of Macros, Creating and implementing user defined header files
COURSE TITLE: SOFTWARE DEVELOPMENT VI
COURSE CODE: VIT 351
TOPICS COVERED:
FILES
FILES I/O STREAM
TYPES OF FILES
DRAWBACKS OF TRADITIONAL METHOD OF DATA STORAGE
CONCEPT OF BUFFER
MODES OF FILE OPENING
END OF FILE
PROCESSORS DIRECTIVES
MACROS
TYPES OF MACROS
DIFFERENCE BETWEEN MACROS AND FUNCTIONS
QUIZ SET 5
Functions: Function Definition, prototyping, types of functions, passing arguments to functions, Nested Functions, Recursive functions.
Strings: Declaring and Initializing strings, Operations on strings, Arrays of strings, passing strings to functions. Storage Classes: Automatic, External, Static and Register Variables.
A Programmatic View and Implementation of XMLCSCJournals
Ā
XML as a markup language defines rules to encode data in a free format comprehensive by both human and machines. Usage of XML as a support for data integration, file configuration and interface definition is widely adopted and implemented by the software industry community.
The purpose of this paper is to examine an implementation of XML as a programming language, extending the capabilities offered by frameworks and simplifying the coding tasks. The code becomes a set of functions sharing the same pattern all written as XML parts. The defined language takes advantage from the predefined common libraries and provides a mean to invoke handlers from user interface components. Programmers take benefits from the simplicity of this language to apprehend quickly the logic implemented by a function, which result in an increase in maintenance quality and rapid development stability.
Strategic Business Planning DevelopmentDave Warnes
Ā
Initially targeted to OPVMC, but generally useful for any practice looking to grow and provide a useful dialogue with their staff members to explain what they would like them to do and why. This is part one of a series of presentations that provide specific research from the Pew Institute, AAHA, the AVMA, etc,.....
Hoy dĆa, la llamada terapia online es una alternativa, dentro de muchas otras, por la que optan algunas personas que, por diferentes motivos, no tienen facilidad para acudir directamente a la consulta de un psicoterapeuta.
A novel secure combination technique of steganography and cryptographyZac Darcy
Ā
A new technique proposed with the combination of cryptography and steganography enhanced with new
secure feature for generating a new security system. Cryptography and Steganography are two popular
ways for secure data transmission in which the former distorts a message so it cannot be understood and
another hides a message so it cannot be seen. In cryptography, this system is used advanced encryption
standard (AES) algorithm to encrypt secret message and then these are separated keys; one of which is
used to hide in cover image. In steganography, a part of encrypted message as a key is used to hide in
discrete cosine transform (DCT) of an image which is highly secured. This kind of system is to be
introduced in applications such as transferring secret data that can be authentication of various fields.
Useful Linux and Unix commands handbookWave Digitech
Ā
This article provides practical examples for most frequently used commands in Linux / UNIX. Helpful for Engineers and trainee engineers, Software developers. A handy notes for all Linux & Unix commands.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
Ā
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
International Journal of Engineering Research and Development (IJERD)IJERD Editor
Ā
call for paper 2012, hard copy of journal, research paper publishing, where to publish research paper,
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
Analisis Butir Soal PG Matematika Wajib Kelas XII IPA-IPS NFBS SerangHirwanto Iwan
Ā
File document ini berisi analisis butir soal berbentuk Pilihan Ganda Matematika Wajib Kelas XII IPA-IPS Tabun Ajaran 2020-2021. Sistem Penilaian via Google Form dengan jumlah sebanyak 20 soal Pilihan Ganda terdiri dari :
1. Uji Validitas
2. Uji Reliabilitas
3. Uji Tingkat Kesukaran
4. Uji Daya Pembeda
Analisis menggunakan Perangkat Lunak SPSS v23
Analisis Butir Soal Pilihan Ganda Matematika Wajib Kelas XII IPAHirwanto Iwan
Ā
Analisis butir soal pilihan ganda matematika wajib kelas XII IPA Penilaian Tengah Semester T.A. 2019-2020 dibuat dengan menggunakan perangkat lunak IBM SPSS Statistics 23 berdasarkan pada uji validitas, uji reliabilitas, uji tingkat kesukaran, dan ujian daya pembeda.
Slide ini berisi materi limit dan turunan. Limit diperkenalkan sifat-sifatnya dan metode penyelesaian sedangkan pada bagian turunan diperkenalkan pada sifat-sifat dan metode penyelesaian turunan. Kedua materi ini dibatasi hanya limit dan turunan aljabar.
Pembahasan Soal Matematika Wajib PTS Kelas XI IPSHirwanto Iwan
Ā
File ini dibuat dengan menggunakan LaTeX berisi pembahasan soal matematika wajib PTS Kelas XI IPS yang membahas materi barisan dan deret serta limit dan derivative
Pembahasan Soal Matematika Wajib PTS Kelas XI IPAHirwanto Iwan
Ā
File ini dibuat dengan menggunakan LaTeX berisi pembahasan soal matematika wajib PTS Kelas XI IPA yang membahas materi barisan dan deret serta limit dan derivative
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Ā
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
Ā
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
Ā
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Ā
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overviewā
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
Ā
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
Ā
As AI technology is pushing into IT I was wondering myself, as an āinfrastructure container kubernetes guyā, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefitās both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Ā
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
Ā
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties ā USA
Expansion of bot farms ā how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks ā Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Ā
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Ā
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But thereās more:
In a second workflow supporting the same use case, youāll see:
Your campaign sent to target colleagues for approval
If the āApproveā button is clicked, a Jira/Zendesk ticket is created for the marketing design team
Butāif the āRejectā button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Ā
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
Ā
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. Whatās changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Ā
Chap02 scr
1. Indian TEX Users Group
URL:
http://www.river-valley.com/tug
TEX Directory . . .
Fonts
2
Characters
Epilog
Title Page
A
On-line Tutorial on LTEX
The Tutorial Team
Indian TEX Users Group, sjp Buildings, Cotton Hills
Trivandrum 695014, india
2000
Prof. (Dr.) K. S. S. Nambooripad, Director, Center for Mathematical Sciences, Trivandrum, (Editor);
Dr. E. Krishnan, Reader in Mathematics, University College, Trivandrum; T. Rishi, Focal Image (India)
Pvt. Ltd., Trivandrum; L. A. Ajith, Focal Image (India) Pvt. Ltd., Trivandrum; A. M. Shan, Focal Image
(India) Pvt. Ltd., Trivandrum; C. V. Radhakrishnan, River Valley Technologies, Software Technology
Park, Trivandrum constitute the TUGIndia Tutorial team
A
A
This document is generated from LTEX sources compiled with pdfLTEX v. 14e
in an INTEL Pentium III 700 MHz system running Linux kernel version
2.2.14-12. The packages used are hyperref.sty and pdfscreen.sty
c 2000, Indian TEX Users Group. This document may be distributed under the terms
A
A
of the L TEX Project Public License, as described in lppl.txt in the base L TEX
distribution, either version 1.0 or, at your option, any later version
Page 1 of 10
Go Back
Full Screen
Close
Quit
2. 2 Some Conventions
TEX Directory . . .
Fonts
Characters
As a well developed programming language, TEX has certain conventions that might
be worth understanding. It might appear cryptic to learn such nitty-gritty things
just to typeset a document, but it will eventually become known to you that it is
worth understanding. As in other mainstream programming languages, TEX has
data types, booleans, input/output operations, etc. Apart from this TEX has a
highly structured directory tree popularly called TEX Directory Structure (tds), a
font setup that is speciļ¬c to TEX alone, a mechanism of reading and digesting characters that come across on its way and not found in other languages, etc. We shall
examine one by one.
2.1.
TEX Directory Structure
Epilog
Title Page
Page 2 of 10
Go Back
All implementation-dependent TEX system ļ¬les (.pool, .fmt, .base, .mem) are stored
by default directly in texmf/web2c. The conļ¬guration ļ¬le texmf.cnf and various
subsidiary MakeTeX... scripts used as subroutines are also stored there.
Full Screen
Non-TEX speciļ¬c ļ¬les are stored following the GNU coding standards. Given a root
directory preļ¬x (/usr/local by default), we have default locations as follows:
Close
Quit
3. preļ¬x /
installation root (/usr/local by default)
bin/
executables
man/
man pages
info/
info ļ¬les
lib/
libraries (libkpathsea.*)
share/
architecture-independent ļ¬les
texmf/
TDS root
web2c/
implementation-dependent ļ¬les
(.pool, .fmt, texmf.cnf, etc.)
See ftp://ftp.gnu.org/pub/gnu/standards.text for the rationale behind and
descriptions of this arrangement. A site may of course override these defaults; for
example, it may put everything under a single directory such as /usr/local/texmf.
2.1.1.
A skeleton of a
TEX Directory . . .
Fonts
Characters
Epilog
Title Page
TDS
This is not to imply these are the only entries allowed. For example, local may
occur at any level. Given below is the standard setup followed in web2c TEX implementations distributed along with gnu operating systems.
Page 3 of 10
Go Back
texmf
Top level TEX directory
BibTEX input ļ¬les
bibtex/
bib/
Full Screen
BibTEX databases
base/
base distribution (e.g., xampl.bib)
misc/
single-ļ¬le databases
package /
bst/
Close
name of a package
BibTEX style ļ¬les
Quit
4. base/
base distribution (e.g., plain.bst, acm.bst)
misc/
single-ļ¬le styles
package /
name of a package
doc/
Documentation
etex/
as with TEX, below
fonts/
font-related ļ¬les
type /
ļ¬le type (e.g., pk)
mode /
type of output device (for pk and gf only)
supplier /
typeface /
dpi nnn /
implementation /
TEX Directory . . .
Fonts
Characters
Epilog
name of a font supplier (e.g., public)
name of a typeface (e.g., cm)
font resolution (for pk and gf only)
Title Page
TEX implementations, by name (e.g., emTEX)
local/
ļ¬les created or modiļ¬ed at the local site
metafont/
METAFONT (non-font) input ļ¬les
base/
base distribution (e.g., plain.mf)
misc/
single-ļ¬le packages (e.g., modes.mf)
package /
metapost/
name of a package (e.g., mfpic)
MetaPost input and support ļ¬les
base/
misc/
single-ļ¬le packages
Page 4 of 10
base distribution (e.g., plain.mp)
package /
support/
mft/
program /
Go Back
name of a package
support ļ¬les for MetaPost-related utilities
MFT inputs (e.g., plain.mft)
Full Screen
TEX-related programs, by name (e.g., dvips)
source/
A
program source code by name (e.g., L TEX, web2c)
tex/
TEX input ļ¬les
Close
Quit
5. format /
name of a format (e.g., latex)
base/
base distribution for format (e.g., latex.ltx)
misc/
single-ļ¬le packages (e.g., webmac.tex)
local/
local additions to or local conļ¬guration ļ¬les for format
package /
generic/
name of a package (e.g., graphics, mfnfss)
format-independent packages
hyphen/
hyphenation patterns (e.g., hyphen.tex)
images/
image input ļ¬les (e.g., Encapsulated PostScript)
misc/
TEX Directory . . .
Fonts
single-ļ¬le format-independent packages (e.g., null.tex).
Characters
Epilog
Title Page
Understanding this directory tree will help you to install third party fonts and
other packages later on. The top level preļ¬x can be speciļ¬ed as is the case with
TEXLive cdrom. However, the TEX tree does not change. The latest tds Working
Groupās draft release is available at: http://tug.org/tds/.
2.2.
Fonts
Unlike other typesetting systems, TEX needs a font ļ¬le format called, *.tfm (TEX
Font Metric). This ļ¬le keeps all the metrics of characters like height, depth, width,
kern values, etc. (TEX keeps around 64 parameters for a character) of a particular
font family. During compilation process, TEX reads this metrics information and
based on these values, it horizontally packs boxes having values of bounding box
of characters consecutively till the end of the line is encountered. During this
compilation process, TEX is not at all bothered, whether a physical font ļ¬le (like
*.pfb or *.ttf etc.) is available in your system. It is during previewing or printing,
the corresponding software needs these font ļ¬les.
Page 5 of 10
Go Back
Full Screen
Close
Quit
6. It arises a problem, when one tries to access third party fonts supplied by various foundries, for instance, Adobe. Foundries do not supply TEX font metric ļ¬le.
However, this can easily be generated with afm2tfm program supplied with your
TEX distribution and is a trivial process. We will learn about these in subsequent
chapters.
TEX Directory . . .
Fonts
2.3.
Characters
Characters
Epilog
Not all the characters of your document is seen by TEX in the same way as we see
them. The following characters have special meaning, , #, $, %, Ė, &, _, {, }.
escape character, TEX functions or control sequences start with this character,
e.g., alpha, section, bf, etc.
#
Title Page
parameter character used in TEX macros (we will learn this later on)
math shift character, i.e., $ character starts math mode and the next $ character stops it
$
%
comment character, TEX will ignore the characters after % till the end of that
line
Ė
superscript character in math, e.g., $aĖ2$
_
ā a2
subscript character in math, e.g., $a_2$ ā a2
{
group open character used to open a local group
}
group close character used to close a local group
Ė
Page 6 of 10
unbreakable space
Go Back
Full Screen
The obvious question arises, what will we do if we want the above characters got
printed. The table below will show you how to accomplish it:
Close
Quit
7. Character
Math mode
Text mode
backslash
textslash
#
#
#
$
$
$
%
%
%
TEX Directory . . .
Ė
Ė
Ė
Fonts
_
_
_
Characters
{
{
{
Epilog
}
2.3.1.
}
}
Ė
tilde
texttilde
Title Page
Alphabets and numerals
Ordinary alphabets, numerals, punctuations, parentheses, square brackets, and
characters other than what listed above are entered as in any other program or
word processor and the result will exactly match what you have entered.
Page 7 of 10
2.3.2.
Mathematical symbols and notations
Go Back
Greek letters, various math operators including negated operators, arrows, stretchy
delimiters, etc., which are normally not available in a keyboard are entered to the
computer with a set of special control sequences speciļ¬cally designed for this purpose. There are around 2500 control sequences available, at least half of them are
not in regular use. The numbers need not make you awe-struck, since you know
most of them. Knuth designed all the control sequences in such a way that it is
nothing but what you ordinarily pronounce in your classroom. For instance, if
you want a Greek alpha character entered into your document, you need to give
Full Screen
Close
Quit
8. as alpha, this during compilation will give you āĪ±ā. Given below is an equation
composed of such control sequences:
(Ī± + Ī²)2 = Ī±2 + Ī²2 + 2Ī±Ī²
(2.1)
The following code generates the above equation which is not at all diļ¬cult for
any academic to undertake.
begin{equation}
(alpha + beta)Ė2 = alphaĖ2 + betaĖ2 + 2alphabeta
end{equation}
Characters
Epilog
Similarly, a wide variety of symbols are accessed with names similar to what we ordinarily denote them. For instance, , Ļ, ā, , ā, ā are generated with swarrow,
psi, longrightarrow, sum, subseteq, notsubseteq. The point is that symbols
in TEX is extremely logical to follow and not much extra eļ¬ort is needed to understand and remember them. We will learn more about math symbols, formulae and
their spatial arrangement and constructs during the second phase of our tutorial.
2.3.3.
TEX Directory . . .
Fonts
Title Page
Accented characters
Page 8 of 10
A
LT
Languages other than English have a variety of accents and special symbols.
EX
provides commands to generate accents and symbols to put small pieces of nonEnglish text in an English document. See this sentence:
Go Back
El seĖor estĀ“ bien, garcon, Ā“l estĀ“ aqĀØĀ“
n
a
Āø
E
a uı
Full Screen
generated by the following code:
El seĖnor estāa bien, garc{c}on, āEl estāa aq"uā{i}
Close
Quit
9. List of commands for accents and special symbols
ā{o}
ā{o}
Ė{o}
"{o}
v{o}
H{o}
t{oo}
oe
OE
ae
o
l
ss
dag
S
copyright
ā
ā
ā
ā
ā
ā
ā
ā
ā
ā
ā
ā
ā
ā
ā
ā
`
o
Ā“
o
Ė
o
ĀØ
o
Ė
o
Ė
o
oo
Å
Å
Ʀ
Ćø
Å
Ć
ā
Ā§
c
Ė{o}
={o}
.{o}
u{o}
c{o}
d{o}
b{o}
aa
AA
AE
O
L
ā
ā
ā
ā
ā
ā
ā
ā
ā
ā
ā
ā
Ė
o
ĀÆ
o
Ė
o
Ė
o
Āø
o
o
.
o
ĀÆ
Ė
a
Ė
A
Ć
Ć
Å
ddag
P
pounds
ā
ā
ā
ā”
Ā¶
Ā£
TEX Directory . . .
Fonts
Characters
Epilog
Title Page
Page 9 of 10
2.4.
Epilog
Go Back
With this chapter, we conclude the preliminaries and introductory part of the tutorial. Next chapter onwards, we get into the real meat of the learning process.
The chapters have been written not from a programmerās point of view, but rather
a qualitative treatment of the language from a functional point of view is undertaken. In case, any one needs any theoretical explanation of any of the functions
described or its underlying mechanism in a TEX run to accomplish it, you are gladly
welcomed to querry that at appropriate time. The tutorial team is only happy to
Full Screen
Close
Quit
10. A
explain that in great detail. So we start the L TEX document classes in the next
chapter.
TEX Directory . . .
Fonts
Characters
Epilog
Title Page
Page 10 of 10
Go Back
Full Screen
Close
Quit