Page 241 - DCAP408_WEB_PROGRAMMING
P. 241
Unit 9: ASP Objects
grandparent files. Thus, searching begins relative to the directory containing the source currently Notes
being processed. If the file is not found, the search moves to directories specified by the /I compiler
option. Finally, the directories specified by the INCLUDE environment variable are searched.
From within the development environment, the INCLUDE environment variable is ignored. To
set the directories searched for include files (this information also applies to the LIB environment
variable.), see VC++ Directories, Projects, Options Dialog Box.
The following example shows file inclusion using angle brackets:
#include <stdio.h>
This example adds the contents of the file named STDIO.H to the source program. The angle
brackets cause the preprocessor to search the directories specified by the INCLUDE environment
variable for STDIO.H, after searching directories specified by the /I compiler option.
Example: The following example shows file inclusion using the quoted form:
#include “defs.h”
This example adds the contents of the file specified by DEFS.H to the source program. The
double quotation marks mean that the preprocessor searches the directory containing the parent
source file first.
Nesting of include files can continue up to 10 levels. Once the nested #include is processed, the
preprocessor continues to insert the enclosing include file into the original source file.
Self Assessment
Fill in the blanks:
14. The Global.asa file must be stored in the root directory of the …………………… application.
15. Include files can be “…………………… “; that is, an #include directive can appear in a file
named by another #include directive.
Caselet Web Hacking Contest puts Firms on Guard
NTERNET managers of establishments worldwide are likely to work overtime on
Sunday, the date of a world hackers’ contest which starts at 9 a.m. and ends at 3 p.m.
I(the time zone to be followed from a site zone-h.org, say the contest instructions).
Establishments have been advised to deactivate unneeded public facing Web servers and
turn off servers that are not urgently required.
The challenge could even be a hoax or just a hyped up minor event, said security experts. But
no one is taking any chances - the US department of homeland security has issued warnings,
so has the Ministry for Information and Communication in Korea which feels Korean Web
servers could be specially vulnerable to the threat. So have European Internet security experts.
Security companies came to know of the contest through noticing that there was increased
monitoring of Websites and also from tracking Internet relay chats.
Contd...
LOVELY PROFESSIONAL UNIVERSITY 235