Read Only vs Binary Files

In: Computers and Technology

Submitted By messingerjc
Words 368
Pages 2
Read Only & Binary Files
In order to write data to a binary file within a program, you would use the command ‘writeallbytes’. For example:
Dim CustomerData As Byte() = (From c In customerQuery).ToArray()
My.Computer.FileSystem.WriteAllBytes("C:\MyDocuments\CustomerData", CustomerData, True)
The commands displayed above will save the data from an array into the file CustomerData. With using the switch True at the end, tells VB to append the file. If the switch were set to False, then VB would create the file if it did not exist, if it did then it would overwrite everything currently in the file with the data from the array.
Const ReadOnly = 1

Set objFSO = CreateObject("Scripting.FileSystemObject")
Set objFolder = objFSO.GetFolder("C:\Scripts")
Set colFiles = objFolder.Files

For Each objFile in colFiles If objFile.Attributes AND ReadOnly Then objFile.Attributes = objFile.Attributes XOR ReadOnly End If

In order to write data to a “read-only” file, you will start off by declaring the variable that you will use inside of the program for the file. After that you will open the file and run a test on the file using the command line: If obj.File.Attributes AND ReadOnly Then. If the both of the statements return with a true then the file is “read-only,” and will need to be switched before any changes can be made to the file. If the Attributes and the ReadOnly comes back False then the file is not “read-only,” and changes can be made freely to the file. If the file is “read-only” you will have to run the command: objFile.Attributes = objFile.Attributes XOR ReadOnly
The XOR command will switch the settings of an attribute on a file, whether it be read-only, hidden, system, or archive. So if the file is read-only, you’ll run the XOR command, make whatever changes you need to the file, if you ran the XOR command earlier in the…...

Similar Documents

Read Only Participants

..."Read-Only Participants: A Case for Student Communication in Online Classes" In the article titled "Read-only participants; a case for student communication in online classes" impairs the importance of community and communication in online courses. It also discusses the reason students succeed or fail in online classes. To discover the concerns listed above, a study of eight weeks was conducted on students. The study monitored classroom activity as well as communication among students coming from diverse backgrounds. Such examples are geographical location, race, gender and age. The study resulted in both success and failure. Both were discovered and documented. With the results of success the following findings were noted: firstly online courses that had discussions where students and teachers would interact had a positive effect on introverted individuals. In a traditional classroom these students would have participated less but now found a voice in the virtual classroom. Secondly, the skills necessary in an online classroom can improve higher order thinking as well as critical thinking. This was done by the discussion forums and posts that required students to apply and create learned knowledge. Thirdly, a professor that had great involvement with his class became a positive feature by providing encouragement and support through posts. As a result of the instructors involvement students were eager to become more involved in the discussions. In addition to......

Words: 334 - Pages: 2

Binary Information

...What is the difference between data and information: -Data is the lowest level of knowledge and information is the second level -Data by itself alone is not significant. Information is significant by itself. -Observations and recordings are done to obtain data while analysis is done to obtain information. 2. Discuss how computer represents data and basic units of measuring information (up to GB): Computer represents data using binary numeral system: - bit= binary unit (to 256) - bute- 8 bits - kb= 1024 byrtes - mb= 1024 Kb - gb= 1024 mb 3. Compare ASCII, EBCDIC and Unicode: ASCII- American Standard Code for Information Interchange ASCII is a 7 digit (7- bit) code EBCDIC-Extended Binary- Coded Decimal Interchange Code (INM mainframes) EBCDIC- represents each character as a unique combination of 8 bits 8 bites=256 unique combinations Unicode- Universal International coding standard design to represent text based data. Unicode identifies each character using, 0s and 1s. It’s a larger code, consisting of 1 to 4 bytes 4. Discuss the difference between computers: Mainframe-used by large organizations (hospital, university, bank, government offices) -manages a large amount of fertilized data. - located in climate-controlled data centers and connect to the rest of the company computers .via computer network Supercomputer: -$2 mil -\220 million - 50 – 50000 times faster than PC. - A large number of processors......

Words: 2445 - Pages: 10

English Only vs. Bilingual Education

...I am going to be discussing multicultural education in general, but focusing more on the aspect of English only vs. bilingual education in today’s classrooms. This topic has become more and more evident in today’s education system. The topic is pretty self-explanatory, English only vs. bilingual education. Should students in America be taught only in English, regardless of the student’s first language or nationality, or should there be some influence of bilingual education? In the 1990’s, the U.S. English Only started campaigns to promote multiculturalism under one language, English (Arce, 1998) These campaigns also propose the notion that every single aspect of public education in America should be strictly in English. Under this theory, education would be given in English regardless of age, ethnicity, sex, and English competency. Those who support this theory also feel very strongly that English should be the nationally endorsed language of the United States of America (Crawford, 1998). This movement stretches even outside the classroom. The English Only movement proposes to take all other language almost completely out of society. These same supporters, as you can imagine, also strongly associate with anti-immigration theories fearing the costs that may come with an increase in people on unemployment and welfare programs (p. 8). The movement has grabbed momentum, as evidenced in California’s passing of Proposition 227 which is an initiative to eliminate......

Words: 780 - Pages: 4

File Management Pos-355

...File Management POS/355 05/13/2013 John Buono File Management The file managers function is to regulate all of the files on a system that is stored on the storage mediums. There are several tasks that the file manager must perform in order to manage these files. The file manager must be able to identify the unique naming conventions of the files in order to complete its tasks. The file manager must also be able to determine the location of the files, the sectors that make up the file on the storage medium, and the order of those sector that make up the file. It is important that the file manager work with the device manager and use effective algorithms for the read and write of files. The file manager also gives or denies access to files by users or programs. The file manager also is in cooperation with the process manager to allocate or de-allocate files to the processor. The last task is that the file manager provides easy commands that assist users and/or programs in file handling (Gallert, 2000) . Unix/Linux File Management UNIX/Linux uses the distinction of inodes to refer to files or segments of files on the system and uses pointers to indicate where the files are on the storage media. There are some slight differences between each version of Unix/Linux but we will not go into those differences in this paper and will only cover the basics of file management. No matter what version of Unix/Linux is being used the file structure and permissions do seem to be...

Words: 2096 - Pages: 9


...understand the conversion from binary to decimal numbers and decimal to binary numbers, quickly and easily….  Decimal to Binary Decimal numbers use Base 10 Binary numbers use Base 2 8 bits = 1 Byte Study the following chart and the comments by each line or section…    |   | 8  bits | 7  bits | 6 bits | 5 bits | 4 bits | 3 bits | 2 bits | 1bit | Base 2 |   | 27 | 26 | 25 | 24 | 23 | 22 | 21 | 20 | DecimalWeight value of each bit |   | 128 | 64 | 32 | 16 | 8 | 4 | 2 | 1 | Decimal to binary… | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 |   | 2 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 |   | 3 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 1 |   | 4 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 |   | 5 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 1 |   | 6 | 0 | 0 | 0 | 0 | 0 | 1 | 1 | 0 | Do you see the pattern?  1 = 00000001 0+0+0+0+0+0+1 (the 1 bit is in the 20 position, the 20 position value="1). 2 = 00000010 0+0+0+0+0+0+1+0 = (the 1 is in the 21 position, the 21 position value="2) 3 = 00000011 0+0+0=0+0+0+1+1 = (the 1 is in the 21 and 20 positions, the 20 value="1" and the  21 value="2" therefore, 2 +1 = 3).  4 = 00000100 0+0+0+0+0+1+0+0 = (the 1 is in the 22 position. The 22 value="4) Always start from left to right on the chart (highest to lowest number). Try the following exercises… Change the following decimal numbers into binary and vice-versa. I have done the first one for you, you do the rest... Make sure you know where your digits are coming from…  Decimal | Binary | “Reasoning” | Ex.......

Words: 395 - Pages: 2

File Management

...File-management It used to be when someone said anything about file management; the first thing that would come to mind is a metal container with four or five drawers in it. Now when someone mentions file management, they're most likely talking about any kind of electronic system that is used to put the files in order. Most people have used some form a file management system but don't even realize it. If you have save any kind of document on your computer whether you use a Microsoft Windows system or a UNIX/Linux Mac system, they both have file management systems available. Microsoft's file management system turned out to be a lot better for the end user than the older DOS command line interface. The Microsoft's file manager allows for end users to print, move, delete, copy or rename files and folders on the computer. The end users can also add permissions to any file or folder that they create. That means that they can allow certain users to read, write or modify on the file or folders. File and folder management tasks are provided with every Windows folder. Hyperlinked tasks list will be displayed by the folders contents if you open it up. Once you pick a folder, you can click the task to allow you to do a number of things like delete it, copy, move or rename it. Files can also be sent out in an email or published on the web. The file protection system for a UNIX is simple and to the point. User of the UNIX system has a unique ID and will be in at least one...

Words: 751 - Pages: 4

Rticle Summary Read-Only Participants: a Case for Student Communication in Online Classes

...Article Summary Read-Only Participants: A Case For Student Communication In Online Classes Enrolment for online courses is booming, however there is a significantly lower rate of success to these classes than in the traditional classroom enviroment The article “Read-only participants: a case for student communication in online classes” discusses the role of communication in online courses as well as explaining why some students succeed and others fail. An 8 week study was done on a web based Master’s program. Online communication, class participation and group assignments were monitored Students fell into three categories: Distinction(75% or higher), Pass (50% - 74%) and Fail (less than 50%). Students that were successful read a significant amount of course material, participated actively in discussions (via posts) where they used high critical thinking skills. The online communities were high functioning and healthy. The facilitator (professor) greatly influenced the outcome of the class. The more interaction he had with the class through feedback and possitive comments, the better the class involvement. The unsuccessful students shared various factors. Coursework was not completed and they read only about half of the online course material. They scored low on colaboration and posted significantly fewer discussions than those that passed or excelled. The amount of peer interaction influences the quality of learning The read only student logged in......

Words: 279 - Pages: 2


...Unit 1 Lab 1.2: Binary Math and Logic Exercise 1.2.1: Using Figure 1-9 as an example, determine the result of adding 1102 and 10012. | | | | | | 1 | 1 | 0 | | 1 | 0 | 0 | 1 | | 1 | 1 | 1 | 1 | = 15 | Exercise 1.2.2: Using Figure 1-9 as an example, determine the result of adding 1102 and 1012. 1 | | | | | | 1 | 1 | 0 | | | 1 | 0 | 1 | | 1 | 0 | 1 | 1 | = 11 | Exercise 1.2.3: Using Figure 1-9 as an example, determine the result of adding 1112 and 1112. 1 | 1 | 1 | | | | 1 | 1 | 1 | | | 1 | 1 | 1 | | 1 | 1 | 1 | 0 | = 14 | Exercise 1.2.4: Determine the result of 1002 OR 0112. 1 | 0 | 0 | 0 | 1 | 1 | 1 | 1 | 1 | Exercise 1.2.5: Determine the result of 1112 AND 1002. 1 | 1 | 1 | 1 | 0 | 0 | 1 | 0 | 0 | Exercise 1.2.6: Determine the result of NOT 10012. 1 | 0 | 0 | 1 | 0 | 1 | 1 | 0 | Exercise 1.2.7: Using binary addition, what is the result of 10102 + 102? Using binary addition, how would you repeatedly increment a number by 2? Continue adding 102. | 1 | | | | 1 | 0 | 1 | 0 | | | | 1 | 0 | | 1 | 1 | 0 | 0 | = 12 | | 1 | 1 | 0 | 0 | = 12 | | | | 1 | 0 | | | 1 | 1 | 1 | 0 | = 14 | | | | | | | | 1 | 1 | | | | | 1 | 1 | 1 | 0 | = 14 | | | | 1 | 0 | | 1 | 0 | 0 | 0 | 0 | = 16 | Exercise 1.2.8: 1 | 1 | 0 | 0 | 1 | 1 | 1 | 1 | 1 | 1 | 0 | 0 | Using the AND operator, what is the result of 11002 AND 11112? What can you conclude about using AND on any value with a string of......

Words: 392 - Pages: 2


...the three sections below and submit via the instructions at the bottom of the page. HINT: Use the scientific calculator on your computer (Calc.exe) to check your work; click on View – Scientific in XP, or View – Programmer in Windows 7. Part A: Counting in Binary, Decimal, and Hexadecimal. Fill in the symbols and digits below. Binary Decimal Hexadecimal Binary Decimal Hexadecimal 0000 0 0 1000 8 8 0001 1 1 1001 9 9 0010 2 2 1010 10 A 0011 3 3 1011 11 B 0100 4 4 1100 12 C 0101 5 5 1101 13 D 0110 6 6 1110 14 E 0111 7 7 1111 15 F Part B: Binary to Decimal and Hexadecimal. Complete the chart. Add h to each hex number. Fill in the power of 2’s as well. *2^ means “2 to the power of”; for example, 2^5 = 2 * 2 * 2 * 2 * 2 = 64 No. Binary (1 Byte format) 128 64 32 16 8 4 2 1 Decimal Hexa-decimal *2^ 2^ 25 2^ 2^ 22 2^ 2^ 1 11001100 1 1 0 0 1 1 0 0 128+64+8+4=204 CCh 2 10101010 3 11100011 4 10110011 5 00110101 6 00011101 7 01000110 8 10110001 9 11000001 10 11110000 Part C: Decimal to Binary: Complete the following table to practice converting a number from decimal notation to binary format. Mark each hexadecimal number with h. No. Decimal 128 64 32 16 8 4 2 1 Add them up to check Hexadecimal 11 49 0 0 1 1 0 0 0 1 32+16+1=49;......

Words: 295 - Pages: 2

Read-Only Participants: a Case for Student Communication in Online Classes

...well-functioning online learning community. We also uncovered the discontent students in the learning community felt for invisible students who were absent without reason from group assignments or who made shallow and insufficient contributions. Student online visibility and participation can take many forms, like read-only participants who skim over or deliberately harvest others' discussions. Other students can be highly visible without contributing. Students who anticipate limited access due to poor connectivity, high costs or other reasons can manage their log-in time effectively and gain maximum benefit. Absent and seldom contributing students risk forsaking the benefits of the virtual learning community. High quality contributions rather than quantity builds trust among mature students. We suggest how to avoid read-only-participation: communicate the required number of online classroom postings; encourage submission of high quality, thoughtful postings; grade discussions and give formative feedback; award individual grades for group projects and rotate members of groups; augment facilitator communication with Internet-independent media to convey important information. Read-only-participants disrupt the formation of a virtual community of learners and compromise learning. (Contains 2 tables and 1 figure.)...

Words: 321 - Pages: 2

Read-Only Participants: a Case for Student Communication in Online Classes

..."Read-Only Participants: A Case for Student Communication in Online Classes" In the article written by Lynette Nagle, Seugnet , and Johannes Cronje "Read-Only Participants: A Case for Student Communication in Online Classes" they talk about a wide array or reasons why students have done well or run into some learning barriers while taking online courses. As a professor with a Ph.D. in Computer-Integrated Education, Nagel understands participation in an online course and staying current with all assignments was what they needed to become more self-driven, empowering there initiative and interacting more freely between the other students along with them. Such as, in this course we learn and write about topics posed to us for all to see and read. We also form a dialogue/debate amongst each other with our responses. Once completed, the study which involved an eight week long elective course that encompassed a wide range of age groups along with different socio-economic and geographical areas, Nagel’s theory proved to be correct. That when it came to the course or assignments given, not all participants had to be involved with the other students or professors, but it was key to have open forums for discussions and debate with all the members of the class. Virtual classrooms were shown, having online areas where students could have discussions, not only yielded positive results from the students that are doing well in the class to forming a sense of unity and bond with......

Words: 754 - Pages: 4

Read-Only Participants

...Summary Read-Only Participants: A case for student communication in online classes. Online learning is conducive to that of the traditional onsite learning facilities. There are some students who fully participate in the experience as well as those who take their learning environments for granted. A summary of the required reading “Read-only participants: a case for student communication in online classes” will support the noted claim. The study was completed to measure the various behaviors of the online learner. The research gathered the behaviors of students participating the in a Master’s degree web-based curriculum through the University of Pretoria. Beaudoin is noted as one of the greatest contributors to this case study. The study was broken into various parts. To support the introduction and conclusion of the study, the body included: Background, Literature, Context of this study, Methodology, and the Discussion. A breakdown of each subtopic of this study will be discussed in this summary. I have taken several online classes prior to reading this study and I found it to be very supportive to my conclusive evaluation of the practice. Although this study was completed in 2009, I can relate that my prior experiences in online classes were parallel to the researcher’s findings. The introduction made the reader aware that there are challenges to online learning and that “the establishment of an online community is widely held as the most important......

Words: 871 - Pages: 4

Read Only Participant

...ALLAN KAMIRI KAHURO P.O. Box 67-00900, Kiambu. Tel: +254710492672 Email: I am a talented, enthusiastic, self-motivated and passionate Telecommunication and Information Engineering student knowledgeable in; operation of electrical devices and machines, making domestic wiring connections, computer programming using programming languages like C, Java and MATLAB, troubleshooting software and hardware computer complications as well as computer program installations. Personal Details * Date of Birth: August 22nd, 1991. * Marital Status: Single Education & Professional Qualifications: * Bachelor of Science Telecommunication and Information Engineering, May 2011 to Date * Kenya Certificate of Secondary Education, Kagumo High School , 2006-2009  * Kenya Certificate of Primary Education, Githunguri Township Primary School, 1997-2005 Key Skills & Competencies: * Outstanding knowledge of governmental Information Technology and Electricity generating schemes. * Good relationship management with other members of staff and colleagues. * Ability to achieve strong grasp of operations of various departments within the organization in a short time * Strong and excellent written and verbal communication skills. * Ability to maintain composure and sense of humor in the face of heavy workload and a tight schedule. PROFESSIONAL EXPERIENCE Intern- I.T and Electrical Engineering: Farmer’s Choice Limited (Feb. to May)......

Words: 418 - Pages: 2

Article Summary: Read-Only Participants: a Case for Student Communication in Online Classes

...Article Summary: Read-Only Participants: A Case for Student Communication in Online Classes As technology advances more and more, computers and internet have become more accessible, affordable, and ever so popular in recent times. With easy accessibility to internet, the online learning environment is a growing trend. Schools all over the nation offer online programs and fast earning degrees. Students from different demographics and age groups fill online classrooms making it even more popular. However, with such diversity in the classroom how does the instructor control communication in the classroom? Does the lack of participation from fellow students influence the learning environment? What are some of the different types of students often found in the online classes environment? This article will summarize the main points found in a research based on a case study prepared by Nagel, Blignaut, and Cronjé. With extensive research, investigation, and observations Nagel et. al.(2007) put together an article highlighting the importance of communication in the online classes. Noticing a significant drop-out rate in online classes, they were determined to research what affected this rate and which aspects of the online classes were setting students behind. The authors used different methods to gather data to support their findings, and used different articles to incorporate their research and back up their conclusions. In order to analyze student participation they......

Words: 967 - Pages: 4

Summary- Read Only Participants

...Canyon University: UNV 501 6/25/2012 A Case for Participation in Online Courses Online computer courses/degrees are becoming more frequent as technology improves and the availability of technology is greater. This article “Read-only participants: a case for student communication in online classes” (Nagel, Blignaut, Cronje 2007) analyzes data from several studies and suggests that active participation, as opposed to non-active participation, is directly correlated to student achievement. Read-Only Participants The term Read-only participants refers to online students who log into a specific classroom website, read the material provided or student post’s but do not get actively involved in the discussion. Buedouin (2002) suggested that read-only participants can learn and succeed in an online setting without participating (Nagel, Blinaught, & Cronje, 2007). However research by: Nagel, Blinaught, & Cronje (2007); Klemm (1998); Rovai & Barnum (2003); Swan, Shea, Frederickson, Pickett, & Pelz (2000), indicate that participation is essential to be a successful online student. Read-only students also have the tendency to create a negative environment within an online learning environment, with other having the perception that the read-only student does not care and does not want to contribute. This is extremely evident when they are in a collaborative learning environment and participation in a project by all involved is essential for the group’s success. ......

Words: 636 - Pages: 3