Full download C programming from problem analysis to program design 4th ed Edition D S Malik pdf docx
Full download C programming from problem analysis to program design 4th ed Edition D S Malik pdf docx
https://ebookultra.com/download/java-tm-programming-from-problem-
analysis-to-program-design-5th-edition-d-s-malik/
https://ebookultra.com/download/problem-solving-and-program-design-in-
c-third-edition-jeri-r-hanly/
https://ebookultra.com/download/introduction-to-numerical-
analysis-2nd-edition-d-c-sanyal/
https://ebookultra.com/download/visual-c-2010-how-to-program-4th-
edition-1-29-pdf-paul-deitel/
Analysis and Design of Analog Integrated Circuits 4th ed
Edition Paul R. Gray
https://ebookultra.com/download/analysis-and-design-of-analog-
integrated-circuits-4th-ed-edition-paul-r-gray/
https://ebookultra.com/download/programming-and-problem-solving-with-
c-comprehensive-comprehensive-edition-nell-b-dale/
https://ebookultra.com/download/c-how-to-program-tenth-edition-deitel/
https://ebookultra.com/download/programming-c-2nd-ed-edition-jesse-
liberty/
https://ebookultra.com/download/c-programming-in-linux-1st-edition-
edition-haskins-d/
C programming from problem analysis to program
design 4th ed Edition D S Malik Digital Instant Download
Author(s): D S Malik
ISBN(s): 9781423902096, 1423902092
Edition: 4th ed
File Details: PDF, 11.47 MB
Year: 2009
Language: english
C++ PROGRAMMING:
FROM PROBLEM ANALYSIS TO PROGRAM DESIGN
FOURTH EDITION
D.S. MALIK
Australia Brazil Japan Korea Mexico Singapore Spain United Kingdom United States
C++ Programming: From Problem Analysis ª 2009 Course Technology, Cengage Learning
to Program Design, Fourth Edition
ALL RIGHTS RESERVED. No part of this work covered by the
by D.S. Malik copyright herein may be reproduced, transmitted, stored or used
Senior Product Manager: Alyssa Pratt in any form or by any means graphic, electronic, or mechanical,
including but not limited to photocopying, recording, scanning,
Acquisitions Editor: Amy Jollymore digitizing, taping, Web distribution, information networks, or
Content Product Manager: Jill Braiewa information storage and retrieval systems, except as permitted
Marketing Manager: Bryant Chrzan under Section 107 or 108 of the 1976 United States Copyright Act,
without the prior written permission of the publisher.
Editorial Assistant: Patrick Frank
Print Buyer: Julio Esperas
For product information and technology assistance, contact us at
Cover Designer: Lisa Kuhn, Curio Press, LLC Cengage Learning Customer & Sales Support, 1-800-354-9706
Compositor: Integra For permission to use material from this text or product, submit
all requests online at cengage.com/permissions
Art Director: Marissa Falco
Further permissions questions can be emailed to
Validation: Green Pen Quality Assurance permissionrequest@cengage.com
Proofreader: Green Pen Quality Assurance
Indexer: Liz Cunningham ISBN-13: 978-1-4239-0209-6
ISBN-10: 1-4239-0209-2
Course Technology
25 Thomson Place
Boston, MA 02210
USA
Visual C++ .NET and PowerPoint are registered trademarks
of the Microsoft Corporation; Pentium is a registered
trademark of Intel Corporation; IBM is a registered trademark
of Industrial Business Machines.
Disclaimer
Course Technology reserves the right to revise this publication
and make changes from time to time in its content without
notice.
The programs in this book are for instructional purposes only.
They have been tested with care, but are not guaranteed for any
particular intent beyond educational purposes. The authors and
the publisher do not offer any warranties or representations, nor
do they accept any liabilities with respect to the programs.
Cengage Learning is a leading provider of customized
learning solutions with office locations around the globe,
including Singapore, the United Kingdom, Australia, Mexico,
Brazil, and Japan. Locate your local office at:
international.cengage.com/region
Cengage Learning products are represented in Canada
by Nelson Education, Ltd.
For your lifelong learning solutions, visit
course.cengage.com
Visit our corporate website at cengage.com
Printed in Canada
1 2 3 4 5 6 7 14 13 12 11 10 09 08
TO
My Daughter
Shelly Malik
BRIEF CONTENTS
PREFACE xxvii
3. Input/Output 115
INDEX 1327
TABLE OF CONTENTS
Preface xxvii
AN OVERVIEW OF COMPUTERS
1 AND PROGRAMMING LANGUAGES 1
Introduction 2
A C++ Program 10
Programming Methodologies 22
Structured Programming 22
Object-Oriented Programming 22
Quick Review 24
Exercises 26
viii | C++ Programming: From Problem Analysis to Program Design, Fourth Edition
Data Types 34
Simple Data Types 35
Floating-Point Data Types 38
Expressions 45
Mixed Expressions 46
string Type 50
Input 51
Allocating Memory with Constants and Variables 52
Putting Data into Variables 54
Assignment Statement 54
Saving and Using the Value of an Expression 58
Declaring and Initializing Variables 59
Input (Read) Statement 60
Variable Initialization 63
Output 69
Preprocessor Directives 77
namespace and Using cin and cout in a Program 78
Using the string Data Type in a Program 78
Quick Review 97
Exercises 99
INPUT/OUTPUT 115
3 I/O Streams and Standard I/O Devices 116
cin and the Extraction Operator >> 117
Exercises 160
Exercises 220
Exercises 290
Exercises 335
Exercises 400
Namespaces 437
Exercises 463
Exercises 534
Exercises 597
Exercises 635
Exercises 708
Composition 743
Exercises 773
Exercises 844
Templates 917
Function Templates 917
Class Templates 919
Exercises 929
RECURSION 981
17 Recursive Definitions 982
Direct and Indirect Recursion 985
Infinite Recursion 985
Exercises 1009
Exercises 1101
Queues 1167
Queue Operations 1167
Implementation of Queues as Arrays 1169
Linked Implementation of Queues 1180
Queue Derived from the class
unorderedLinkedListType 1185
Exercises 1207
Iterators 1288
IOStream Iterators 1289
Container Adapters 1289
Algorithms 1293
STL Algorithm Classification 1293
STL Algorithms 1295
Functions fill and fill_n 1295
Functions find and find_if 1298
Functions remove and replace 1299
Functions search, sort, and binary_search 1301
Chapter 2 1308
Chapter 3 1310
Chapter 4 1310
xxvi | C++ Programming: From Problem Analysis to Program Design, Fourth Edition
Chapter 5 1311
Chapter 6 1313
Chapter 7 1313
Chapter 8 1314
Chapter 9 1315
Chapter 10 1316
Chapter 11 1316
Chapter 12 1317
Chapter 13 1319
Chapter 14 1320
Chapter 15 1321
Chapter 16 1322
Chapter 17 1323
Chapter 18 1323
Chapter 19 1324
INDEX 1327
PREFACE
Approach
The programming language C++, which evolved from C, is no longer considered an
industry-only language. Numerous colleges and universities use C++ for their first program-
ming language course. C++ is a combination of structured programming and object-oriented
programming, and this book addresses both types.
This book can be easily divided into two parts: structured programming and object-oriented
programming. The first 11 chapters form the structured programming part; Chapters 12
through 19 form the object-oriented part. However, only the first seven chapters are essential
to move on to the object-oriented portion.
In July 1998, ANSI/ISO Standard C++ was officially approved. This book focuses on ANSI/
ISO Standard C++. Even though the syntax of Standard C++ and ANSI/ISO Standard C++
is very similar, Chapter 8 discusses some of the features of ANSI/ISO Standard C++ that are
not available in Standard C++.
Chapter 1 briefly reviews the history of computers and programming languages. The reader can
quickly skim through this chapter and become familiar with some of the hardware components
and the software parts of the computer. This chapter contains a section on processing a C++
program. This chapter also describes structured and object-oriented programming.
Chapter 2 discusses the basic elements of C++. After completing this chapter, students
become familiar with the basics of C++ and are ready to write programs that are complicated
enough to do some computations. Input/output is fundamental to any programming
language. It is introduced early, in Chapter 3, and is covered in detail.
Chapters 4 and 5 introduce control structures to alter the sequential flow of execution.
Chapters 6 and 7 study user-defined functions. It is recommended that readers with no prior
programming background spend extra time on Chapters 6 and 7. Several examples are provided
to help readers understand the concepts of parameter passing and the scope of an identifier.
Chapter 8 discusses the user-defined simple data type (enumeration type), the namespace
mechanism of ANSI/ISO Standard C++, and the string type. The earlier versions of C did
not include the enumeration type. Enumeration types have very limited use; their main
purpose is to make the program readable. This book is organized such that readers can skip
the section on enumeration types during the first reading without experiencing any disconti-
nuity, and then later go through this section.
Chapter 9 discusses arrays in detail. Chapter 10 describes various searching and sorting
algorithms as well as an introduction to the vector class. Chapter 11 introduces records
(structs). The introduction of structs in this book is similar to C structs. This chapter is
optional; it is not a prerequisite for any of the remaining chapters.
Chapter 12 begins the study of object-oriented programming (OOP) and introduces classes.
The first half of this chapter shows how classes are defined and used in a program. The second
half of the chapter introduces abstract data types (ADTs). This chapter shows how classes in
C++ are a natural way to implement ADTs. Chapter 13 continues with the fundamentals of
Preface | xxix
object-oriented design (OOD) and OOP and discusses inheritance and composition. It
explains how classes in C++ provide a natural mechanism for OOD and how C++ supports
OOP. Chapter 13 also discusses how to find the objects in a given problem.
Chapter 14 studies pointers in detail. After introducing pointers and how to use them in a
program, this chapter highlights the peculiarities of classes with pointer data members and
how to avoid them. Moreover, this chapter also discusses how to create and work with
dynamic two-dimensional arrays. Chapter 14 also discusses abstract classes and a type of
polymorphism accomplished via virtual functions.
Chapter 15 continues the study of OOD and OOP. In particular, it studies polymorphism
in C++. The chapter specifically discusses two types of polymorphism—overloading and
templates.
Chapter 16 discusses exception handling in detail. Chapter 17 introduces and discusses recur-
sion. Moreover, this is a standalone chapter, so it can be studied anytime after Chapter 10.
Chapters 18 and 19 are devoted to the study of data structures. Discussed in detail are linked
lists in Chapter 18 and stacks and queues in Chapter 19. The programming code developed in
these chapters is generic. These chapters effectively use the fundamentals of OOD.
Appendix A lists the reserved words in C++. Appendix B shows the precedence and
associativity of the C++ operators. Appendix C lists the ASCII (American Standard Code
for Information Interchange) and EBCDIC (Extended Binary Coded Decimal Interchange
Code) character sets. Appendix D lists the C++ operators that can be overloaded.
Appendix E has three objectives. First, we discuss how to convert a number from decimal to
binary and binary to decimal. We then discuss binary and random access files in detail.
Finally, we describe the naming conventions of the header files in both ANSI/ISO Standard
C++ and Standard C++. Appendix F discusses some of the most widely used library
routines, and includes the names of the standard C++ header files. The programs in
Appendix G show how to print the memory size for the built-in data types on your system
as well as how to use a random number generator. Appendix H gives an introduction to
the Standard Template Library, and Appendix I provides the answers to odd-numbered
exercises in the book.
xxx | C++ Programming: From Problem Analysis to Program Design, Fourth Edition
Chapter 1
Chapter 2
Chapter 3
Chapter 4
Chapter 5
Chapter 6
Chapter 7
Chapter 8 Chapter 9*
Chapter 15
Chapter 17
Chapter 18
Chapter 19
In Figure 1, dotted lines mean the preceding chapter is used in one of the sections of the
chapter and is not necessarily a prerequisite for the next chapter. For example, Chapter 9
covers arrays in detail. In Chapters 11 and 12, we show the relationship between arrays and
structs and arrays and classes, respectively. However, if Chapter 12 is studied before
Chapter 9, then the section dealing with arrays in Chapter 12 can be skipped without any
discontinuation. This particular section can be studied after studying chapter 9.
It is recommended that the first seven chapters be covered sequentially. After covering the
first seven chapters, if the reader is interested in learning OOD and OOP early, then Chapter
12 can be studied right after Chapter 7. Chapter 8 can be studied any time after Chapter 7.
After studying the first seven chapters in sequence, some of the approaches are:
1. Study chapters in the sequence: 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19.
2. Study chapters in the sequence: 9, 12, 14, 15, 13, 17, 18, 19, 10, 16.
3. Study chapters in the sequence: 12, 9, 10, 14, 15, 13, 17, 18, 19, 16.
4. Study chapters in the sequence: 12, 9, 14, 15, 13, 17, 18, 19, 10, 16.
FEATURES OF THE BOOK
Four-color
interior design
shows
accurate C++
code and
related
comments.
More than 300
visual diagrams,
both extensive
and exhaustive,
illustrate difficult
concepts.
Notes highlight important facts about
the concepts introduced in the
chapter.
Numbered examples
illustrate the key
concepts with their
relevant code. The
programming code
in these examples is
followed by a
Sample Run. An
explanation then
follows that
describes what each
line in the code
does.
Programming
Examples are
complete programs
featured in each
chapter. These
examples include the
accurate, concrete
stages of Input,
Output, Problem
Analysis and
Algorithm Design, and
a Complete Program
Listing.
Exercises further
reinforce learning
and ensure that
students have, in
fact, mastered the
material.
Programming
Exercises challenge
students to write
C++ programs with
a specified
outcome.
SUPPLEMENTAL RESOURCES
The following supplemental materials are available when this book is used in a classroom
setting.
ExamViewÒ
This textbook is accompanied by ExamView, a powerful testing software package that allows
instructors to create and administer printed, computer (LAN-based), and Internet exams.
ExamView includes hundreds of questions that correspond to the topics covered in this
text, enabling students to generate detailed study guides that include page references for
further review. These computer-based and Internet testing components allow students to take
exams at their computers, and save the instructor time because each exam is graded auto-
matically.
PowerPoint Presentations
This book comes with Microsoft PowerPoint slides for each chapter. These are included as a
teaching aid for classroom presentations, either to make available to students on the network
for chapter review, or to be printed for classroom distribution. Instructors can add their own
slides for additional topics that they introduce to the class.
Supplemental Resources | xxxix
Distance Learning
Course Technology Cengage Learning is proud to present online courses in WebCT and
Blackboard to provide the most complete and dynamic learning experience possible. When
you add online content to one of your courses, you’re adding value to your course: Topic
Reviews, Practice Tests, Review Questions, Assignments, PowerPoint presentations, and,
most of all, a gateway to the 21st century’s most important information resource. We hope
you will make the most of your course, both online and offline. For more information on
how to bring distance learning to your course, contact your local Course Technology
Cengage Learning sales representative.
Source Code
The source code, in ANSI/ISO Standard C++, is available at www.course.com, and is also
available on the Teaching Tools CD-ROM. The input files needed to run some of the
programs are also included with the source code.
Solution Files
The solution files for all Programming Exercises, in ANSI/ISO C++, are available at
www.course.com, and are also available on the Teaching Tools CD-ROM. The input files
needed to run some of the Programming Exercises are also included with the solution files.
ACKNOWLEDGEMENTS
There are many people that I must thank who, one way or another, contributed to the success
of this book. First, I would like to thank all the students who, during the preparation, were
spontaneous in telling me if certain portions needed to be reworded for better understanding
and clearer reading. Next, I would like to thank those who e-mailed numerous comments to
improve upon the second edition. I am thankful to Professors S.C. Cheng, John N.
Mordeson, and Vasant Raval for constantly supporting this project. I must thank Lee I.
Fenicle, Director, Office of Technology Transfer, Creighton University, for his involvement,
support, and for providing encouraging words when I needed them. I am also very grateful to
the reviewers who reviewed earlier versions of this book and offered many critical suggestions
on how to improve it.
I would like to thank the reviewers of the proposal package: William Barrett, San Jose State
University; Vana Doufexi, Northwestern University; William Duncan, Louisiana State Uni-
versity; Brian Noble, University of Michigan; Kami Makki, University of Toledo; Jeanna
Matthews, Clarkson University; Patricia Smallwood, Regis University; David Topham,
Ohlone College; and Umit Uyar, City College of New York. The reviewers will recognize
that their criticisms have not been overlooked and, in fact, made this a better book. All this
would not have been possible without the careful planning of Senior Product Manager Alyssa
Pratt. I extend my sincere thanks to Alyssa, as well as to Content Project Manager Jill
Braiewa. I also thank Tintu Thomas of Integra Software Services for assisting us in keeping
the project on schedule and Green Pen Quality Assurance for carefully testing the code.
I am thankful to my parents for their blessings.
Finally, I am thankful for the support of my wife Sadhana and especially my daughter Shelly,
to whom this book is dedicated. She cheered me up whenever I was overwhelmed during the
writing of this book, and also made sure that the corrections were in place. Shelly always
draws special joy whenever I undertake such projects.
I welcome any comments concerning the text. Comments may be forwarded to the following
e-mail address: malik@creighton.edu
D. S. Malik
CHAPTER
1
A N O VERVIEW OF C OMPUTERS
AND P ROGRAMMING L ANGUAGES
IN THIS CHAPTER, YOU WILL:
Introduction
Terms such as ‘‘the Internet,’’ which were unfamiliar just 20 years are now common.
Students in elementary school regularly ‘‘surf ’’ the Internet and use computers to design
their classroom projects. Many people use the Internet to look for information and to
communicate with others. This is all made possible by the availability of different software,
also known as computer programs. Without software, a computer is useless. Software is
developed by using programming languages. The programming language C++ is especially
well suited for developing software to accomplish specific tasks. Our main objective is to help
you learn how to write programs in the C++ programming language. Before you begin
programming, it is useful to understand some of the basic terminology and different
components of a computer. We begin with an overview of the history of computers.
The first computer-like machine was the Mark I. It was built, in 1944, jointly by IBM and
Harvard University under the leadership of Howard Aiken. Punched cards were used to feed 1
data into the machine. The Mark I was 52 feet long, weighed 50 tons, and had 750,000 parts.
In 1946, the ENIAC (Electronic Numerical Integrator and Calculator) was built at the
University of Pennsylvania. It contained 18,000 vacuum tubes and weighed some 30 tons.
The computers that we know today use the design rules given by John von Neumann in
the late 1940s. His design included components such as an arithmetic logic unit, a control
unit, memory, and input/output devices. These components are described in the next
section. Von Neumann’s computer design makes it possible to store the programming
instructions and the data in same memory space. In 1951, the UNIVAC (Universal
Automatic Computer) was built and sold to the U.S. Census Bureau.
In 1956, the invention of transistors resulted in smaller, faster, more reliable, and more
energy-efficient computers. This era also saw the emergence of the software development
industry with the introduction of FORTRAN and COBOL, two early programming
languages. In the next major technological advancement, transistors were replaced by tiny
integrated circuits or ‘‘chips.’’ Chips are smaller and cheaper than transistors and can contain
thousands of circuits on a single chip. They give computers tremendous processing speed.
In 1970, the microprocessor, an entire CPU on a single chip, was invented. In 1977,
Stephen Wozniak and Steven Jobs designed and built the first Apple computer in their
garage. In 1981, IBM introduced its personal computer (PC). In the 1980s, clones of the
IBM PC made the personal computer even more affordable. By the mid-1990s, people
from many walks of life were able to afford them. Computers continue to become faster
and less expensive as technology advances.
Modern-day computers are powerful, reliable, and easy to use. They can accept spoken-word
instructions and imitate human reasoning through artificial intelligence. Expert systems assist
doctors in making diagnoses. Mobile computing applications are growing significantly. Using
hand held devices, delivery drivers can access global positioning satellites (GPS) to verify
customer locations for pickups and deliveries. Cell phones permit you to check your e-mail,
make airline reservations, see how stocks are performing, and access your bank accounts.
Although there are several categories of computers, such as mainframe, midsize, and
micro, all computers share some basic elements, described in the next section.
Processor 2.80 GHz, 1GB RAM, 250GB HD, VX750 19" Silver Flat CRT Color Monitor’’
fall into the hardware category; items such as ‘‘operating system, games, encyclopedias, and
application software’’ fall into the software category. Let’s consider the hardware first.
Hardware
Major hardware components include the central processing unit (CPU); main memory
(MM), also called random access memory (RAM); input/output devices; and secondary
storage. Some examples of input devices are the keyboard, mouse, and secondary storage.
Examples of output devices are the screen, printer, and secondary storage. Let’s look at
each of these components in more detail.
Output Device
Main Memory
Secondary Storage
Main Memory
The main memory is directly connected to the CPU. All programs must be loaded into
main memory before they can be executed. Similarly, all data must be brought into main
memory before a program can manipulate it. When the computer is turned off, every-
thing in main memory is lost for good.
The main memory is an ordered sequence of cells, called memory cells. Each cell has a
unique location in main memory, called the address of the cell. These addresses help you
access the information stored in the cell. Figure 1-2 shows main memory with storage cells.
. .
. .
. .
1000 54
1001 A
. .
. .
. .
2000
2001
. .
. .
. .
Today’s computers come with main memory consisting of millions to billions of cells.
Although Figure 1-2 shows data stored in cells, the content of a cell can be either a
programming instruction or data. Moreover, this figure shows the data as numbers and
letters. However, as explained later in this chapter, main memory stores everything as
sequences of 0s and 1s. The memory addresses also are expressed as sequences of 0s and 1s.
Another Random Scribd Document
with Unrelated Content
Mantin, L.
Marshall, Elias J.
Marshall, Hugh Lewis
Marshall, John, Jr.
Marshall, Joseph Taylor
Marshall, Samuel B.
Mather, Elisha
Maurry, James
McCrocklin, Jesse Lindsey
McFaddin, Nathaniel A.
McFadin, William M.
McFall, Samuel
McGown, Samuel
McIntire, William
McLaughlin, James
McLaughlin, William
McMaster, William
McMillan, Andrew
McMillan, James
McNutt, Robert
Means, William
Merritt, Robert
Moore, Azariah G.
Moore, John D.
Moore, Lewis
Moore, Morris
Morris, Burrel
Morris, George
Morris, James H.
Morris, Spencer
Newton, John
Norment, Thomas
Owen, James D.
Rankin, David
Raper, Daniel
Reamos, Sherwood Y.
Rhodes, John B.
Rhorer, Conrad
Ricks, George Washington
Robbins, Early
Roberts, Stephen R.
Robertson, Sterling Clack
Robinett, Enoch
Robinett, James M.
Robinson, Benjamin W.
Robinson, James
Rowlett, Alexander W.
Scaggs, John H.
Scott, Robert
Seaton, George Washington
Sharp, John
Simpson, Jeremiah W.
Smith, John G.
Smith, William A.
Smith, William P.
Smith, William W.
Snodgrass, J. G.
Splane, Peyton R.
Splane, Thomas M.
Stephens, John
Stevenson, Thomas B.
Swoap, Benjamin Franklin
Taylor, Josiah
Teal, Henry
Thompson, Thomas
Tinnett, Robert
Tollett, Wesley
Tong, John B.
Townsend, Moses
Townsend, P. John
Townsend, Stephen
Townsend, William
Vardeman, Henry W.
Varner, Martin
Vaughan, Richard
Walker, John
Walker, Josiah
Walling, John C.
Whitehead, Nicholas
Whitlock, Robert
Wilburn, Ransom
Williams, Edward
Williams, Hezekiah, Sr.
Williams, Jesse
Winnett, Robert
Winters, Agabus
Wood, William Riley
Woods, Joseph H.
Wright, Gilbert
Mr. Payne also photographed the base of the monument, showing the
inscriptions.
The map showing the route of Sam Houston’s army was drawn by L.
W. Kemp. Map of San Jacinto battleground by Ed Kilman.
44
Bronze armillary sun dial erected on the battlefield in memory of the
nine Texans killed or mortally wounded at San Jacinto.
[1]
This plantation belonging to Groce has been confused by the
historian John Henry Brown, and perhaps others, with another
plantation he owned which was situated in the present county of
Grimes, and known as “Groce’s Retreat.”
[2]
Thomas J. Rusk, Secretary of War, and other Texans who were in
the battle said the battle cry was “Remember the Alamo!”
“Remember La Bahia!”
[3]
With “Deaf” Smith in the detail that destroyed the bridge were
Young P. Alsbury, John Coker, John Garner, Moses Lapham. Edwin
R. Rainwater and Dimer W. Reaves.
[4]
In his official report of the battle, April 25, 1836, Houston said 783
Texans took part. Yet in a roster published later he listed 845
officers and men at San Jacinto, and by oversight omitted Captain
Alfred H. Wyly’s Company. In a Senate speech February 28, 1859,
Houston said his effective force never exceeded 700 at any point.
Conclusive evidence in official records brings the total number at
San Jacinto up to 910.
[5]
Several veterans of the battle said the tune played was “Yankee
Doodle.”
[6]
With Sylvester in the capture of Santa Anna were Joel W. Robison,
Joseph D. Vermillion, Alfred H. Miles and David Cole.
Transcriber’s Notes
Retained publication information from the printed edition: this
eBook is public-domain in the country of publication.
Silently corrected a few palpable typos.
In the text versions only, text in italics is delimited by
_underscores_.
*** END OF THE PROJECT GUTENBERG EBOOK THE BATTLE OF
SAN JACINTO AND THE SAN JACINTO CAMPAIGN ***
1.D. The copyright laws of the place where you are located also
govern what you can do with this work. Copyright laws in most
countries are in a constant state of change. If you are outside
the United States, check the laws of your country in addition to
the terms of this agreement before downloading, copying,
displaying, performing, distributing or creating derivative works
based on this work or any other Project Gutenberg™ work. The
Foundation makes no representations concerning the copyright
status of any work in any country other than the United States.
1.E.6. You may convert to and distribute this work in any binary,
compressed, marked up, nonproprietary or proprietary form,
including any word processing or hypertext form. However, if
you provide access to or distribute copies of a Project
Gutenberg™ work in a format other than “Plain Vanilla ASCII” or
other format used in the official version posted on the official
Project Gutenberg™ website (www.gutenberg.org), you must,
at no additional cost, fee or expense to the user, provide a copy,
a means of exporting a copy, or a means of obtaining a copy
upon request, of the work in its original “Plain Vanilla ASCII” or
other form. Any alternate format must include the full Project
Gutenberg™ License as specified in paragraph 1.E.1.
• You pay a royalty fee of 20% of the gross profits you derive
from the use of Project Gutenberg™ works calculated using the
method you already use to calculate your applicable taxes. The
fee is owed to the owner of the Project Gutenberg™ trademark,
but he has agreed to donate royalties under this paragraph to
the Project Gutenberg Literary Archive Foundation. Royalty
payments must be paid within 60 days following each date on
which you prepare (or are legally required to prepare) your
periodic tax returns. Royalty payments should be clearly marked
as such and sent to the Project Gutenberg Literary Archive
Foundation at the address specified in Section 4, “Information
about donations to the Project Gutenberg Literary Archive
Foundation.”
• You comply with all other terms of this agreement for free
distribution of Project Gutenberg™ works.
1.F.
Most people start at our website which has the main PG search
facility: www.gutenberg.org.
Our website is not just a platform for buying books, but a bridge
connecting readers to the timeless values of culture and wisdom. With
an elegant, user-friendly interface and an intelligent search system,
we are committed to providing a quick and convenient shopping
experience. Additionally, our special promotions and home delivery
services ensure that you save time and fully enjoy the joy of reading.
ebookultra.com