Solved

How do I insert the copyright symbol © in vi ?

Posted on 2007-11-29
10
4,045 Views
Last Modified: 2013-12-20
How do I insert the copyright symbol © in vi ?

Ryan Upton
BE (hons) MBA (adv)

{Links to personal websites removed -- mbizup, Access ZAPE 06-Feb-08}
0
Comment
Question by:rctems
  • 3
  • 3
  • 2
  • +1
10 Comments
 
LVL 84

Expert Comment

by:ozo
Comment Utility
i©
0
 
LVL 84

Expert Comment

by:ozo
Comment Utility
i<control-V>169
0
 

Author Comment

by:rctems
Comment Utility
its putting an a in front of it ?
0
 
LVL 40

Expert Comment

by:evilrix
Comment Utility
I usually just use the quick and dirty way

(c) Copyright EvilRix -- but you can use it if you want :)
0
Threat Intelligence Starter Resources

Integrating threat intelligence can be challenging, and not all companies are ready. These resources can help you build awareness and prepare for defense.

 
LVL 1

Expert Comment

by:deanmb
Comment Utility
you can do &copy; will do it, i don't know if thats going to show up so it's "& c o p y ;" without the spaces and quotation marks.
0
 
LVL 40

Accepted Solution

by:
evilrix earned 500 total points
Comment Utility
I think all the suggestions made are valid; however, since the copyright symbol isn't a standard ASCII char from my (biased) point of view (c) is the simplest solution.
0
 
LVL 84

Expert Comment

by:ozo
Comment Utility
legally, (c) is not recognized as equivalent to the © symbol
The simplest solution is the word "Copyright"
0
 
LVL 40

Expert Comment

by:evilrix
Comment Utility
>> legally, (c) is not recognized as equivalent to the © symbol
Doesn't that depend which country you are in? Besides, my post did say, "(c) Copyright ..."  :)   {http:#20377614}
0
 

Author Comment

by:rctems
Comment Utility
©
When I type i<control-V>169 this is what I get I gues I'll have to use (c) Copyright

-R
0

Featured Post

Better Security Awareness With Threat Intelligence

See how one of the leading financial services organizations uses Recorded Future as part of a holistic threat intelligence program to promote security awareness and proactively and efficiently identify threats.

Join & Write a Comment

Suggested Solutions

Password hashing is better than message digests or encryption, and you should be using it instead of message digests or encryption.  Find out why and how in this article, which supplements the original article on PHP Client Registration, Login, Logo…
"In order to have an organized way for empathy mapping, we rely on a psychological model and trying to model it in a simple way, so we will split the board to three section for each persona and a scenario and try to see what those personas would Do,…
This tutorial demonstrates how to identify and create boundary or building outlines in Google Maps. In this example, I outline the boundaries of an enclosed skatepark within a community park.  Login to your Google Account, then  Google for "Google M…
The viewer will get a basic understanding of what section 508 compliance can entail, learn about skip navigation links, alt text, transcripts, and font size controls.

728 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

9 Experts available now in Live!

Get 1:1 Help Now