CDataFile Class

Environment: VC++ 6.0. SP5, Win2k SP2

Functions and Usage

The main functions of CDataFile are shown in the following:

1. Create a file with two modes:

Function : BOOL CDataFile::CreateFile(LPCTSTR lpszFileName, UINT nFlags)

Usage: nFlags may be CREATE_MODE_REBUILD (Whether the file exists or not, recreate it) or CREATE_MODE_NOREBUILD (If the file has existed ,do not recreate it)

2. Open a file with three modes:

Function : BOOL CDataFile::OpenFile(LPCTSTR lpszFileName, UINT nFlags)

Usage: nFlags may be OPEN_MODE_READ ,OPEN_MODE_WRITE ,OPEN_MODE_READWRITE

3. Check a file whether it has exisited:

Function : INT CDataFile::CheckFileExsist(LPCTSTR lpszFileName)

Usage : Return values may be FLAG_FILE_EXIST , FLAG_FILE_NOEXIST

4. Get the number of lines in the file:

Function : UINT CDataFile::GetLines()

Usage : Return value is the number of lines.

5. Move the pointer to the line you want to operate:

Function : BOOL CDataFile::MoveToLine(UINT line)

Usage : If you want to use ReadLine() or WriteLine(),you must use MoveToLine() first.

6. Read the line you move to:

Function: BOOL CDataFile::ReadLine(CString &rString)

7. Insert, overwrite, delete a line at current line:

Function : void CDataFile::WriteLine(CString &wString, UINT nFlag)

Usage : nFlag may be WRITE_MODE_INSERT ,WRITE_MODE_OVERWRITE or WRITE_MODE_DELETE.If nFlag is WRITE_MODE_DELETE , the wString is the content of the line you will delete.

8. Close a file:

Function : void CDataFile::CloseFile()

Downloads

Download demo project - 24 Kb
Download source - 3 Kb


Comments

  • nice & lite code~

    Posted by Legacy on 08/12/2002 12:00am

    Originally posted by: neoleftz

    nice & lite code~

    Reply
  • Works fine

    Posted by Legacy on 07/31/2002 12:00am

    Originally posted by: Matthias

    ..It does what It should do (As far as I used it). Thanks for this Class

    Reply
Leave a Comment
  • Your email address will not be published. All fields are required.

Top White Papers and Webcasts

  • A majority of organizations are operating under the assumption that their network has already been compromised, or will be, according to a survey conducted by the SANS Institute. With many high profile breaches in 2013 occurring on endpoints, interest in improving endpoint security is top-of-mind for many information security professionals. The full results of the inaugural SANS Endpoint Security Survey are summarized in this white paper to help information security professionals track trends in endpoint …

  • Adaptation and evolution are fundamental requirements of survival -- not only in nature, but also in business. Our world has changed dramatically in a short amount of time. Many businesses are fueling and capitalizing on this change, while others are desperately clinging to a bygone era. Who is left standing in the years and decades ahead should come as no surprise. This edition of Unleashing IT highlights the companies that are embracing new circumstances, new methods, and new opportunities. By downloading …

Most Popular Programming Stories

More for Developers

Latest Developer Headlines

RSS Feeds