Turbo C 2.0 tutorial (very detailed) from zero-based entry to proficiency, it is enough to read this article

Turbo C 2.0 tutorial (using Turbo C 2.0 to write C language programs)

First, we give a complete C language code:

#include <stdio.h>
int main()
{
    puts("hello,world!");
    return 0;
}

In this section we look at how to run this code through Turbo C.
Note: Turbo C itself does not support Chinese input.

1) Create a new source file

Turn on Turbo C, what you see is the initial operation interface of Turbo C, as shown in the figure below:

insert image description here

Directly press the "Enter" key and control it with the arrow keys on the keyboard to select the "New" option, as shown in the figure below:

insert image description here

Press Enter directly, and a file "NONAME.C" is displayed in the editor at this time, and the cursor can be seen blinking continuously, as shown in the figure below:
insert image description here

Tip: When using the New option to create a new file, its default temporary file name is NONAME, which can be changed when saving.

Now, we need to enter the code at the beginning of this article in a blank file, as shown in the following image:

insert image description here

After the input is completed, press the F10 key to switch from the code editing state to the menu selection state.

Select "File --> Save" in the upper menu bar, or directly press the F2 key to save the source file, as shown in the figure below:

insert image description here

At this point, the file name can be changed to "HELLO.C".
Note: The file name is composed of uppercase English letters. At the same time, when saving, Turbo C will automatically add the suffix .C to the file, so even if the suffix is ​​not written, the saved file will also have the suffix.

compile

Select "Compile --> Compile to OBJ" in the menu bar to complete the compilation of the HELLO.C source file.

insert image description here

Press Enter, if there is no error in the code, it will give a prompt that the compilation is successful, as shown in the following figure:

insert image description here

After the compilation is completed, open the directory where the source file is located, and you will see an additional file named HELLO.OBJ, which is the object file generated during the compilation process.
The directory where the source files are located. The default storage location is Turbo C2.0 --> DISK_C --> TC20. All created files will be stored in a folder named TC20.

Link

Select "Compile --> Link EXE file" in the menu bar to complete the linking of the HELLO.OBJ object file.

insert image description here

After the link is completed, open the target file, that is, the directory where the source file is located, and you will see an additional file named "HELLO.EXE", which is the final executable file.
Tip: The generated EXE executable file cannot be run directly on the Windows platform by double-clicking, but this does not prevent us from running it on Turbo C.

run

Select "Run --> Run" on the menu bar, or directly press the Ctrl + F9 key combination, and the work of running the EXE file is completed.

insert image description here

But after running, it is found that the words "hello world!" are not output, but a black window will flash past. This is because, after the program outputs "hello world!", the program finishes running, and the window closes automatically, and the time is very short, so when you see the output, you can only see a "black shadow" (or nothing at all).

Make a slight modification to the above code, let the program output "hello, world!" and then pause:

insert image description here

system(“pause”); The function of the statement is to temporarily stop the program. Note: to use this statement, the header file #include<stdlib.h> needs to be added at the beginning of the program.

Compile again --> link --> run, you will find that you can see the output, as shown in the figure below:

insert image description here

Press any key on the keyboard, and the window returns to the operation interface.
Tip: In addition to using the above method to view the output results, you can also view the output results through the menu bar "Run --> User screen", or directly press the Alt+F5 key combination.

more convenient way

In actual use, we generally use the "Run --> Run" option in the menu to complete the whole process of "compile --> link --> run" with one click, avoiding frequent use of F10 to switch states.

Digression

Many people who are new to the computer industry or graduates of computer-related majors have encountered obstacles everywhere due to lack of practical experience. Let's look at two sets of data:

  • The 2023 national college graduates are expected to reach 11.58 million, and the employment situation is severe;

  • According to the data released by the National Network Security Publicity Week, by 2027, the shortage of network security personnel in my country will reach 3.27 million.

On the one hand, the employment situation of fresh graduates is severe every year, and on the other hand, there is a gap of one million cyber security talents.

On June 9, the 2023 edition of the Employment Blue Book of MyCOS Research (including the 2023 Employment Report for Undergraduates in China and the Employment Report for Higher Vocational Students in China in 2023) was officially released.

Top 10 Majors with Higher Monthly Salary for 2022 College Graduates

The monthly income of undergraduate computer science majors and higher vocational automation majors is relatively high. The monthly income of the 2022 class of undergraduate computer science and higher vocational automation majors is 6,863 yuan and 5,339 yuan, respectively. Among them, the starting salary of undergraduate computer majors is basically the same as that of the 2021 class, and the monthly income of higher vocational automation majors has increased significantly. The 2022 class of overtaking railway transportation majors (5295 yuan) ranks first.

Specifically, depending on the major, the major with a higher monthly income for undergraduates in 2022 is information security (7579 yuan). Compared with the class of 2018, undergraduate majors related to artificial intelligence, such as electronic science and technology, automation, performed well, and their starting salaries increased by 19% compared with five years ago. Although data science and big data technology are newly added majors in recent years, they have performed well, and have ranked among the top three majors with higher monthly income half a year after graduation for the 2022 class of undergraduates. The only humanities and social science major that entered the top 10 undergraduate high-paying list five years ago-French has dropped out of the top 10.

"There is no national security without cybersecurity". At present, network security has been elevated to the height of national strategy and has become one of the most important factors affecting national security and social stability.

Characteristics of the network security industry

1. The employment salary is very high, and the salary rises quickly. In 2021, Liepin.com released the highest employment salary in the network security industry, which is 337,700 yuan per capita!

2. There is a large talent gap and many employment opportunities

On September 18, 2019, the official website of the "Central People's Government of the People's Republic of China" published: my country needs 1.4 million cyberspace security talents, but schools across the country train less than 1.5 million people each year. Liepin.com's "Cyber ​​Security Report for the First Half of 2021" predicts that the demand for cyber security talents will be 3 million in 2027, and there are only 100,000 employees currently engaged in the cyber security industry.

There is a lot of room for development in the industry, and there are many jobs

Since the establishment of the network security industry, dozens of new network security industry positions have been added: network security experts, network security analysts, security consultants, network security engineers, security architects, security operation and maintenance engineers, penetration engineers, information security management Data Security Engineer, Network Security Operations Engineer, Network Security Emergency Response Engineer, Data Appraiser, Network Security Product Manager, Network Security Service Engineer, Network Security Trainer, Network Security Auditor, Threat Intelligence Analysis Engineer, Disaster Recovery Professional , Actual combat offensive and defensive professionals...

Great career potential

The network security major has strong technical characteristics, especially mastering the core network architecture and security technology in the work, which has an irreplaceable competitive advantage in career development.

With the continuous improvement of personal ability, the professional value of the work will also increase with the enrichment of one's own experience and the maturity of project operation, and the appreciation space is bullish all the way, which is the main reason why it is popular with everyone.

To some extent, in the field of network security, just like the doctor profession, the older you are, the more popular you become. Because the technology becomes more mature, the work will naturally be valued, and promotion and salary increase are a matter of course.

Hacking & Cyber ​​Security How to Learn

Today, as long as you give my article a thumbs-up, I will share my private collection of online security learning materials with you for free, so let’s see what is there.

1. Learning Roadmap

There are also many things to learn in attack and defense. I have written all the specific things to learn in the roadmap above. If you can learn them, you will have no problem getting a job or taking private jobs.

2. Video Tutorial

Although there are many learning resources on the Internet, they are basically incomplete. This is a video tutorial on cyber security recorded by myself. I have a supporting video explanation for every knowledge point in the above roadmap.

The content covers the study of network security law, network security operation and other guarantee assessment, penetration testing basics, detailed explanation of vulnerabilities, basic computer knowledge, etc., which are all learning contents that must be known when getting started with network security.

(It’s all packed into one piece and cannot be unfolded one by one. There are more than 300 episodes in total)

Due to limited space, only part of the information is shown, you need to click the link below to get it

CSDN spree: "Hacker & Network Security Introduction & Advanced Learning Resource Pack" free sharing

3. Technical documents and e-books

The technical documents are also compiled by myself, including my experience and technical points of participating in large-scale network security operations, CTF and SRC vulnerability mining. There are also more than 200 e-books. Due to the sensitivity of the content, I will not show them one by one.

Due to limited space, only part of the information is shown, you need to click the link below to get it

CSDN spree: "Hacker & Network Security Introduction & Advanced Learning Resource Pack" free sharing

4. Toolkit, interview questions and source code

"If you want to do a good job, you must first sharpen your tools." I have summarized dozens of the most popular hacking tools for everyone. The scope of coverage mainly focuses on information collection, Android hacking tools, automation tools, phishing, etc. Interested students should not miss it.

There is also the source code of the case and the corresponding toolkit mentioned in my video, which can be taken away if needed.

Due to limited space, only part of the information is shown, you need to click the link below to get it

CSDN spree: "Hacker & Network Security Introduction & Advanced Learning Resource Pack" free sharing

Finally, there are interview questions about Internet security that I have sorted out in the past few years. If you are looking for a job in Internet security, they will definitely help you a lot.

These questions are often encountered in interviews with Sangfor, Qi Anxin, Tencent or other major companies. If you have good questions or good insights, please share them.

Reference analysis: Sangfor official website, Qi Anxin official website, Freebuf, csdn, etc.

Content features: clear organization, including graphic representation, which is easier to understand.

Summary of content: Including intranet, operating system, protocol, penetration test, security service, vulnerability, injection, XSS, CSRF, SSRF, file upload, file download, file inclusion, XXE, logic vulnerability, tool, SQLmap, NMAP, BP, MSF…

Due to limited space, only part of the information is shown, you need to click the link below to get it

CSDN spree: "Hacker & Network Security Introduction & Advanced Learning Resource Pack" free sharing

Guess you like

Origin blog.csdn.net/Python_0011/article/details/131516881