CDataFile Class

Environment: VC++ 6.0. SP5, Win2k SP2

Functions and Usage

The main functions of CDataFile are shown in the following:

1. Create a file with two modes:

Function : BOOL CDataFile::CreateFile(LPCTSTR lpszFileName, UINT nFlags)

Usage: nFlags may be CREATE_MODE_REBUILD (Whether the file exists or not, recreate it) or CREATE_MODE_NOREBUILD (If the file has existed ,do not recreate it)

2. Open a file with three modes:

Function : BOOL CDataFile::OpenFile(LPCTSTR lpszFileName, UINT nFlags)

Usage: nFlags may be OPEN_MODE_READ ,OPEN_MODE_WRITE ,OPEN_MODE_READWRITE

3. Check a file whether it has exisited:

Function : INT CDataFile::CheckFileExsist(LPCTSTR lpszFileName)

Usage : Return values may be FLAG_FILE_EXIST , FLAG_FILE_NOEXIST

4. Get the number of lines in the file:

Function : UINT CDataFile::GetLines()

Usage : Return value is the number of lines.

5. Move the pointer to the line you want to operate:

Function : BOOL CDataFile::MoveToLine(UINT line)

Usage : If you want to use ReadLine() or WriteLine(),you must use MoveToLine() first.

6. Read the line you move to:

Function: BOOL CDataFile::ReadLine(CString &rString)

7. Insert, overwrite, delete a line at current line:

Function : void CDataFile::WriteLine(CString &wString, UINT nFlag)

Usage : nFlag may be WRITE_MODE_INSERT ,WRITE_MODE_OVERWRITE or WRITE_MODE_DELETE.If nFlag is WRITE_MODE_DELETE , the wString is the content of the line you will delete.

8. Close a file:

Function : void CDataFile::CloseFile()

Downloads

Download demo project - 24 Kb
Download source - 3 Kb


Comments

  • nice & lite code~

    Posted by Legacy on 08/12/2002 12:00am

    Originally posted by: neoleftz

    nice & lite code~

    Reply
  • Works fine

    Posted by Legacy on 07/31/2002 12:00am

    Originally posted by: Matthias

    ..It does what It should do (As far as I used it). Thanks for this Class

    Reply
Leave a Comment
  • Your email address will not be published. All fields are required.

Top White Papers and Webcasts

  • Who can you trust? Learn from the IBM X-Force team in this new quarterly report how the Internet of Things and IP reputation tracking are transforming the security landscape.

  • Although much publicity around computer security points to hackers and other outside attacks, insider threats can be particularly insidious and dangerous, whether caused by malice or employee negligence. In this report, you learn the eight most significant cybersecurity threats that could impact your organization (at any time), Forbes cited internal threats as No. 3, noting that internal attacks can be "the most devastating" due to the amount of damage privileged users can inflict and the type of data they can …

Most Popular Programming Stories

More for Developers

RSS Feeds

Thanks for your registration, follow us on our social networks to keep up-to-date