answersLogoWhite

0

because initgraph() automatically detect current available graphmode and load it on to the graphdriver.

User Avatar

Wiki User

13y ago

What else can I help you with?

Continue Learning about Engineering

How to prevent unauthorized memory access in c?

Make sure a password has been set on the computer and make sure its one that you know is easy to memorize but hard for others to find out. firewall - software firewall is a program that is stored into the computer which protects the computer from unauthorized incoming and outgoing data. virus protection program - that helps stop or detect and fix virus problems from happening.


How do you detect an empty file in a c program?

Seek to the end of the file (fseek) and check how many bytes are in the file If the byte count is zero the file is empty.


When the byte codes in a class file are invalid which one of the following must detect it?

When you have bytecode, the program is already compiled; so it would be the JVM which detects that.


What is the meaning of Gd DETECT in 'C' language?

gd detect will detect the present graphic driver in your system automatically


Explain language processing activities with suitable diagrams?

Language processing activities arise to bridge the ideas of software designer with actual execution on the computer system. Due to the differences between the manners in which a software designer describes the ideas concerning the behavior of software and the manner in which these ideas are implemented in a computer system. The designer expresses the ideas in terms related to the application domain of the software. To implement these ideas, their description has to be interpreted in terms related to theexecution domain of the computer system. We use the term semantics to represent the rules of meaning of a domain, and the term semantic gap to represent the difference between the semantics of two domains. The fundamental language processing activities can be divided into those that bridge the specification gap and those that bridge the execution gap.· Program Generation Activities· Program Execution ActivitiesA program generation activity aims at automatic generation of a program. The source language is a specification language of an application domain and the target language is typically a procedure oriented PL. A program execution activity, organizes this execution of a program written in a PL on a computer system. Its source language could be a procedure-oriented language or a problem oriented language.o Program GenerationThe program generator is a software system which accepts the specification of a program to be generated, and generates a program in the target PL. We call this the program generator domain.The specification gap is now the gap between the application domain and the program generator domain. This gap is smaller than the gap between the application domain and the target PL domain.Reduction in the specification gap increases the reliability of the generated program. Since the generator domain is close to the application domain, it is easy for the designer or programmer to write the specification of the program to be generated.Fig. 1.3: Program generator domainThe harder task of bridging the gap to the PL domain is performed by the generator. This would be performed while implementing the generator. To test an application generated by using the generator, it is necessary to only verify the correctness of the specification input to the program generator. This is a much simpler task than ver­ifying correctness of the generated program. This task can be further simplified by providing a good diagnostic (i.e. error indication) capability in the program generator, which would detect inconsistencies in the specification.It is more economical to develop a program generator than to develop a problem-oriented language. This is because a problem oriented language suffers a very large execution gap between the PL domain and the execution domain, whereas the program generator has a smaller semantic gap to the target PL domain, j which is the domain of a standard procedure oriented language. The execution gap between the target PL domain and the execution domain is bridged by the compiler or interpreter for the PL.o Program ExecutionTwo popular models for program execution are· Translation· InterpretationProgram TranslationProgram translation model bridges the execution gap by translating a program written in a PL, called the source program (SP), into an equivalent program in the machine or assembly language of the computer system, called the target program (TP).

Related Questions

How do you update your Intel graphics card?

go to intel website.it will automatically detect your computer's drivers and will update it


What is mean by gdriver in graphics?

in graphics gdriver means graphics driver. it contains DETECT as an exception.


What type of computer program is Dr Web?

Dr Web is an antivirus program. It is used to perform searches on one's computer and to detect and delete viruses. It can also help to prevent one's computer for getting viruses.


How you detect virus in your computer?

You can dated a virus with Your antivirus program Your firewall if it tried to connect out With an online virus scanner


How do you get rid of the about-blank virus?

Download an anti-malware program and fully scan the computer. It will detect and quarantine threats.


What kind of program is Registry Patrol?

The Registry Patrol program is a registry cleaning and repairing tool. The program is said to detect any problems on a Window's based computer and fix them with one click.


Who makes spybot?

Answer by TechsupportSpyBot is used to detect and remove spyware from your computer. It has been rated as a good antiSpyware program by Consumer Reports.The scripts make the program easier to use with JAWS.


What is the purpose of the Microsoft Safety Scanner software?

Microsoft Safety Scanner software is use to detect any malicious software and program on your computer and remove them without them causing damage to your computer.


How do you detect snoopware and remove it?

To detect and remove snoopware on a computer a person will need to use a malware removal program. Two good programs to use are Malwarebytes and ComboFix. Both programs are available to download for free.


What ways computer can be fooled on data intergrity?

Data Integrity is a quality control method that ensures that the information going into the computer program is useful to the computer program. Computer programs are written by humans. One reason that computer programs are written is that a human wants a large amount of data to be searched for relevant information. If the program is properly written it will detect information entered that is of little use to the program. Poorly written programs can be fooled by humans that want to enter football scores into a program processing weather information, but why would you want to fool the computer?


How do you connect ATI Radeon HD 2900 to Windows 7?

Hi, My friend i have had the same problem. OK basically plug all of the wires into the HD drive inside your computer, then turn on your computer and wait for it to detect the graphics card. Hope this helped :)


What does debugger software do?

Debugger software allows programmers to assess the efficacy of a computer program. As the program executes according to its code, the programmer can see, line by line, the functionality of the program and thus detect anomalies, making it easier for him or her to correct the code as needed.