SlideShare ist ein Scribd-Unternehmen logo
1 von 23
CONSTANTS, VARIABLES &
DATATYPES
BY
SAHITHI NARAPARAJU
INRODUCTION
• A programming language is designed to help process certain
kinds of data consisting of numbers, characters and strings to
provide useful output known as information.
• The task of processing of data is accomplished by executing a
sequence of precise instructions called program.
• These instructions are formed using certain symbols and
words according to some rigid rules known as syntax rules.
CHARACTER SET:
• The characters in C are grouped into following categories:
1) Letters 2) digits
3) special characters 4) white spaces.
• Compiler ignores white spaces unless they are part of a string
constant.
• White spaces may be used to separate words but prohibited
between characters of keywords and identifiers.
• LETTERS: Uppercase A….Z, lower case a..z.
• DIGITS: All decimal digits 0..9
• SPECIAL CHARACTERS: comma(,), period(.),
semicolon(;) , colon(:), question mark(?), quotation(“), dollar
sign($), slash(/),back slash(), percent sign(%), underscore(_),
ampersand(&), asterisk(*), number sign(#).
• WHITE SPACES: Blank space, Horizontal tab, Carriage
return, Newline, Form feed.
Trigraph characters:
• C introduces the concept of trigraph sequences to provide a
way to enter certain characters that are not available on some
keywords.
• Each trigraph sequence consists of three characters, 2 question
marks followed by another character.
• Eg: ??= (number sign), ??)(right bracket]), ??( (left
bracket[) , ??! (vertical bar), ??< (left brace {) , ??> (right brace
}),??/ (back slash).
C tokens:
•

In a passage of text individual words and punctuation marks
are called tokens.

•

In a C program the smallest individual units known as C
tokens.

•
C has 6 types of tokens namely:
1) Keywords
2) identifiers
3)constants
4)Strings
5)special symbols
6)operators.
Keywords and identifiers.
• Every C word is classified as either a keyword or an identifier.
• All keywords have fixed meanings and these meanings cannot
be changed.
• Keywords serve as basic building blocks for program
statements.
• All keywords must be written in lower case.
• The underscore character is also permitted in identifiers.
• It is usually used a link between two words in long identifiers
RULES FOR IDENTIFIERS:
1.
2.
3.
4.
5.

First character must be an alphabet.
Must consist of only letters, digits or underscore.
Only first 31 characters are significant.
Cannot use keyword.
Must not contain white space.
CONSTANTS
• Constants refer to fixed values that do not change during the
execution of program.

INTEGER CONSTANTS:
• An integer constant refer to a sequence of digits.
• There are 3 types of integers namely:
Decimal integer, octal integer and hexadecimal integer.
• Decimal integer consist of a set of digits 0 through
9,precceded by an optional – or + sign.
• An octal integer constant consist of any combination of digits
from the set 0 through 7. with a leading 0
• Eg: 037,0, 0456.
• A sequence of digits preceded by 0x or 0X is considered as
hexadecimal integer.
• They may include alphabets A through F or f.
• Letter A through F represents numbesr 10 to 15.
REAL CONSTANTS:
• To represent quantities that vary continuously real constants
are used.
• A real number may be expressed in exponential notation.
SYNTAX: mantissa e exponent.
• Mantissa can be either real number expressed in decimal
notation or an integer.
• Exponent is an integer number with an optional + or – sign.
• The letter ‘e’ separating the mantissa and the exponent, it can
be written either lower case or upper case.
SYNTAX: 0.65e4,12e-2.
• White space is not allowed.
• Exponential notation is useful for representing numbers that
are either very large or very small in magnitude.
• Floating point constants are normally represented as doubleprecision quantities.

SINGLE CHARACTER CONSTANTS:
• A single character constant contains a single character enclose
in a pair of single quote marks.
Eg: ‘5’,’x’.
• Character constant ‘5’ is not same as number 5.
• Character constants have integer values known as ASCII
values.
• Statement: printf (“%d”, ’a’); would print number 97, the
ASCII value of letter ‘a’.
• Since each character constant represent an integer value, it is
possible to perform arithmetic operations on character
constants.
STRING CONSTANTS:
• A string constant is a sequence of characters enclosed in
double quotes.
• Characters may be letters, numbers, special characters and
blank spaces.
Eg: “hello” , “1987”, “?...!”.
• Character constant is not equivalent to single character string
constant.

.
BACK SLASH CHARACTER CONSTANTS:
• C supports some special back slash character constants that
are used in output functions.
• These characters combinations are known as escape
sequences.
• Back slash character constants are:
‘a’ audible alert; ‘b’ backspace; ‘f’ form feed; ‘n’ newline;
‘r’ carriage return; ‘t’ horizontal tab; ‘v’ vertical tab;
‘”single quote, ‘?’ question mark; ‘’ backslash; ‘0’ null.
VARIABLES
•

A variable is a data name that may be used to store a data
value.

•

A variable may take different values at different times
during execution.

•

A variable can be chosen by the programmer in a
meaningful way.

CONDITIONS FOR SPECIFYING VARIABLES:
1.

They must begin with a letter. Some systems may permit
underscore as first character.
1.

Uppercase and lowercase are significant. The variable
TOTAL is different from total and Total.

2.

It should not be keyword.

3.

Whitespace is not allowed.

4.

Length should be normally more than 8 characters are
treated as significant by many compilers.

•

Examples of valid variables are:
john, x1,T_raise, first_tag.

•

Examples of invalid variables are:
123,(area),25th,price$, %.
DATATYPES
• C language is rich in its data types.
• Storage representations and machine instructions to handle
constants differ from machine to machine.
• The variety of datatypes allow to select the type appropriate to
the needs of the application as well as machine.
• C supports 3 classes of datatypes:
1)Primary datatypes
2) derived datatypes
3)derived datatypes.
• All C compilers support 5 fundamental datatypes namely:
integer (int), character (char), floating point (float), doubleprecision floating point (double) and void.
• Many of them also offer extended datatypes such as long int,
int ,long double.
Data type
Range of values
char
-128 to 127
int
-32768 to 32767
float
-3.4e+8 to 3.4e+8
double
1.7e-308 to 1.7e+308.
INTEGER TYPES:
• Integers are whole numbers with a range of values supported
by particular machine.
• Integers occupy one word storage generally and since the
word sizes of machine vary the size of integer that can be
stored depends on computer.
• If we use 16-bit word length, the size of integer value is
limited to range -32768 to 32767.
• If we use 32-bit word length can store an integer ranging from
-2147483648 to 2147483647.
• In order to provide control over range of numbers and storage
space C has 3 classes of integer storage namely: short int, int,
long int in both signed and unsigned.
• Short int represents fairly small integer values and requires
half amount as regular int number uses.

FLOATING POINT TYPE:
•

Floating point numbers are stored in 32bits, with 6 digit
precision.

• Floating point numbers are defined by keyword “float”.
• When accuracy is provided by a float number is not sufficient,
double can be used to define number.
• A double datatype number uses 64 bits giving a precision of
14 digits.
• These are known as double precision number.
• Double datatype represent the same datatype that float
represents but with greater precision.
• To extend the precision we may use long double which uses
80 bits.
VOID TYPES:
• Void type has no values. This is used to specify the type of
functions.
• The type of function is said to be void when it doesn't return
any value to the calling function.

CHARACTER TYPES:
• A single character can be defined as a character (char) type
data.
• Characters are usually store in one byte of internal storage.
• Qualifier signed or unsigned may be used in char explicitly.
Unsigned characters have values between 0 and 255, signed
characters have values from -128 to 127

Weitere ähnliche Inhalte

Was ist angesagt?

Operators in C Programming
Operators in C ProgrammingOperators in C Programming
Operators in C ProgrammingQazi Shahzad Ali
 
Mesics lecture 3 c – constants and variables
Mesics lecture 3   c – constants and variablesMesics lecture 3   c – constants and variables
Mesics lecture 3 c – constants and variableseShikshak
 
Data Types and Variables In C Programming
Data Types and Variables In C ProgrammingData Types and Variables In C Programming
Data Types and Variables In C ProgrammingKamal Acharya
 
C data type format specifier
C data type format specifierC data type format specifier
C data type format specifierSandip Sitäulä
 
Variables and data types in C++
Variables and data types in C++Variables and data types in C++
Variables and data types in C++Ameer Khan
 
Lecture 2 variables
Lecture 2 variablesLecture 2 variables
Lecture 2 variablesTony Apreku
 
Data Types in C
Data Types in CData Types in C
Data Types in Cyarkhosh
 
Data types in c language
Data types in c languageData types in c language
Data types in c languageHarihamShiwani
 
Datatype in c++ unit 3 -topic 2
Datatype in c++ unit 3 -topic 2Datatype in c++ unit 3 -topic 2
Datatype in c++ unit 3 -topic 2MOHIT TOMAR
 
Complete Tokens in c/c++
Complete Tokens in c/c++Complete Tokens in c/c++
Complete Tokens in c/c++Shobi P P
 
3 data-types-in-c
3 data-types-in-c3 data-types-in-c
3 data-types-in-cteach4uin
 
Variables in C and C++ Language
Variables in C and C++ LanguageVariables in C and C++ Language
Variables in C and C++ LanguageWay2itech
 

Was ist angesagt? (20)

Operators in C Programming
Operators in C ProgrammingOperators in C Programming
Operators in C Programming
 
Mesics lecture 3 c – constants and variables
Mesics lecture 3   c – constants and variablesMesics lecture 3   c – constants and variables
Mesics lecture 3 c – constants and variables
 
Data Types and Variables In C Programming
Data Types and Variables In C ProgrammingData Types and Variables In C Programming
Data Types and Variables In C Programming
 
C Tutorial
C TutorialC Tutorial
C Tutorial
 
C data type format specifier
C data type format specifierC data type format specifier
C data type format specifier
 
Variables and data types in C++
Variables and data types in C++Variables and data types in C++
Variables and data types in C++
 
Lecture 2 variables
Lecture 2 variablesLecture 2 variables
Lecture 2 variables
 
Data type
Data typeData type
Data type
 
Character set of c
Character set of cCharacter set of c
Character set of c
 
Data Types in C
Data Types in CData Types in C
Data Types in C
 
Lecture 2
Lecture 2Lecture 2
Lecture 2
 
Data types in c language
Data types in c languageData types in c language
Data types in c language
 
Datatype in c++ unit 3 -topic 2
Datatype in c++ unit 3 -topic 2Datatype in c++ unit 3 -topic 2
Datatype in c++ unit 3 -topic 2
 
Data type
Data typeData type
Data type
 
Tokens in C++
Tokens in C++Tokens in C++
Tokens in C++
 
Complete Tokens in c/c++
Complete Tokens in c/c++Complete Tokens in c/c++
Complete Tokens in c/c++
 
3 data-types-in-c
3 data-types-in-c3 data-types-in-c
3 data-types-in-c
 
Data type in c
Data type in cData type in c
Data type in c
 
Variables in C and C++ Language
Variables in C and C++ LanguageVariables in C and C++ Language
Variables in C and C++ Language
 
Mql4 manual
Mql4 manualMql4 manual
Mql4 manual
 

Andere mochten auch

literature survey for identity based secure distributed data storage
literature survey for identity based secure distributed data storage literature survey for identity based secure distributed data storage
literature survey for identity based secure distributed data storage Sahithi Naraparaju
 
Social Media: What it is and what it can do for you
Social Media: What it is and what it can do for youSocial Media: What it is and what it can do for you
Social Media: What it is and what it can do for youhmetcalf
 
17 19 51_09_referat_mpd
17 19 51_09_referat_mpd17 19 51_09_referat_mpd
17 19 51_09_referat_mpdc00mn
 
Falsafah pendidikan kebangsaan
Falsafah pendidikan kebangsaanFalsafah pendidikan kebangsaan
Falsafah pendidikan kebangsaanooi Yingfei
 
Gherezghiersamuele20102011 es4
 Gherezghiersamuele20102011 es4 Gherezghiersamuele20102011 es4
Gherezghiersamuele20102011 es4Zemmo90
 
Flick group information (1)
Flick group information (1)Flick group information (1)
Flick group information (1)Neil Osborne
 
Om&m context
Om&m contextOm&m context
Om&m contextMrLane
 
Flick Lighting Catalogue
Flick Lighting CatalogueFlick Lighting Catalogue
Flick Lighting CatalogueNeil Osborne
 
Self protecteion in clustered distributed system new
Self protecteion in clustered distributed system newSelf protecteion in clustered distributed system new
Self protecteion in clustered distributed system newSahithi Naraparaju
 
Identity based secure distributed data storage schemes
Identity based secure distributed data storage schemesIdentity based secure distributed data storage schemes
Identity based secure distributed data storage schemesSahithi Naraparaju
 
Steps for Developing a 'C' program
 Steps for Developing a 'C' program Steps for Developing a 'C' program
Steps for Developing a 'C' programSahithi Naraparaju
 
Bank management sy stem
Bank management sy stemBank management sy stem
Bank management sy stemTashaf Mukhtar
 
Srs document for identity based secure distributed data storage schemes
Srs document for identity based secure distributed data storage schemesSrs document for identity based secure distributed data storage schemes
Srs document for identity based secure distributed data storage schemesSahithi Naraparaju
 

Andere mochten auch (19)

literature survey for identity based secure distributed data storage
literature survey for identity based secure distributed data storage literature survey for identity based secure distributed data storage
literature survey for identity based secure distributed data storage
 
Social Media: What it is and what it can do for you
Social Media: What it is and what it can do for youSocial Media: What it is and what it can do for you
Social Media: What it is and what it can do for you
 
Haptic technology
Haptic technologyHaptic technology
Haptic technology
 
17 19 51_09_referat_mpd
17 19 51_09_referat_mpd17 19 51_09_referat_mpd
17 19 51_09_referat_mpd
 
OVERVIEW OF ‘C’ PROGRAM
OVERVIEW OF ‘C’ PROGRAMOVERVIEW OF ‘C’ PROGRAM
OVERVIEW OF ‘C’ PROGRAM
 
Falsafah pendidikan kebangsaan
Falsafah pendidikan kebangsaanFalsafah pendidikan kebangsaan
Falsafah pendidikan kebangsaan
 
Gherezghiersamuele20102011 es4
 Gherezghiersamuele20102011 es4 Gherezghiersamuele20102011 es4
Gherezghiersamuele20102011 es4
 
Flick group information (1)
Flick group information (1)Flick group information (1)
Flick group information (1)
 
Om&m context
Om&m contextOm&m context
Om&m context
 
Flick Lighting Catalogue
Flick Lighting CatalogueFlick Lighting Catalogue
Flick Lighting Catalogue
 
Self protecteion in clustered distributed system new
Self protecteion in clustered distributed system newSelf protecteion in clustered distributed system new
Self protecteion in clustered distributed system new
 
Ch3
Ch3Ch3
Ch3
 
Identity based secure distributed data storage schemes
Identity based secure distributed data storage schemesIdentity based secure distributed data storage schemes
Identity based secure distributed data storage schemes
 
PPT FOR IDBSDDS SCHEMES
PPT FOR IDBSDDS SCHEMESPPT FOR IDBSDDS SCHEMES
PPT FOR IDBSDDS SCHEMES
 
Steps for Developing a 'C' program
 Steps for Developing a 'C' program Steps for Developing a 'C' program
Steps for Developing a 'C' program
 
Q canalytic aas2
Q canalytic aas2Q canalytic aas2
Q canalytic aas2
 
Bank management sy stem
Bank management sy stemBank management sy stem
Bank management sy stem
 
pre processor directives in C
pre processor directives in Cpre processor directives in C
pre processor directives in C
 
Srs document for identity based secure distributed data storage schemes
Srs document for identity based secure distributed data storage schemesSrs document for identity based secure distributed data storage schemes
Srs document for identity based secure distributed data storage schemes
 

Ähnlich wie CONSTANTS, VARIABLES & DATATYPES IN C

C Programming Lecture 3 - Elements of C.pptx
C Programming Lecture 3 - Elements of C.pptxC Programming Lecture 3 - Elements of C.pptx
C Programming Lecture 3 - Elements of C.pptxMurali M
 
Constants Variables Datatypes by Mrs. Sowmya Jyothi
Constants Variables Datatypes by Mrs. Sowmya JyothiConstants Variables Datatypes by Mrs. Sowmya Jyothi
Constants Variables Datatypes by Mrs. Sowmya JyothiSowmyaJyothi3
 
Module 1:Introduction
Module 1:IntroductionModule 1:Introduction
Module 1:Introductionnikshaikh786
 
Structure of c_program_to_input_output
Structure of c_program_to_input_outputStructure of c_program_to_input_output
Structure of c_program_to_input_outputAnil Dutt
 
CSE 1201: Structured Programming Language
CSE 1201: Structured Programming LanguageCSE 1201: Structured Programming Language
CSE 1201: Structured Programming LanguageZubayer Farazi
 
Programming in c
Programming in cProgramming in c
Programming in cvineet4523
 
Chapter 2: Elementary Programming
Chapter 2: Elementary ProgrammingChapter 2: Elementary Programming
Chapter 2: Elementary ProgrammingEric Chou
 
COM1407: Variables and Data Types
COM1407: Variables and Data Types COM1407: Variables and Data Types
COM1407: Variables and Data Types Hemantha Kulathilake
 

Ähnlich wie CONSTANTS, VARIABLES & DATATYPES IN C (20)

C Programming Lecture 3 - Elements of C.pptx
C Programming Lecture 3 - Elements of C.pptxC Programming Lecture 3 - Elements of C.pptx
C Programming Lecture 3 - Elements of C.pptx
 
Constants Variables Datatypes by Mrs. Sowmya Jyothi
Constants Variables Datatypes by Mrs. Sowmya JyothiConstants Variables Datatypes by Mrs. Sowmya Jyothi
Constants Variables Datatypes by Mrs. Sowmya Jyothi
 
C tokens.pptx
C tokens.pptxC tokens.pptx
C tokens.pptx
 
Module 1:Introduction
Module 1:IntroductionModule 1:Introduction
Module 1:Introduction
 
All C ppt.ppt
All C ppt.pptAll C ppt.ppt
All C ppt.ppt
 
Lec9
Lec9Lec9
Lec9
 
Cp presentation
Cp presentationCp presentation
Cp presentation
 
C language
C languageC language
C language
 
Structure of c_program_to_input_output
Structure of c_program_to_input_outputStructure of c_program_to_input_output
Structure of c_program_to_input_output
 
lec 2.pptx
lec 2.pptxlec 2.pptx
lec 2.pptx
 
CSE 1201: Structured Programming Language
CSE 1201: Structured Programming LanguageCSE 1201: Structured Programming Language
CSE 1201: Structured Programming Language
 
Chap 1 and 2
Chap 1 and 2Chap 1 and 2
Chap 1 and 2
 
Programming in c
Programming in cProgramming in c
Programming in c
 
Chapter 2: Elementary Programming
Chapter 2: Elementary ProgrammingChapter 2: Elementary Programming
Chapter 2: Elementary Programming
 
FUNDAMENTAL OF C
FUNDAMENTAL OF CFUNDAMENTAL OF C
FUNDAMENTAL OF C
 
Basics of C.ppt
Basics of C.pptBasics of C.ppt
Basics of C.ppt
 
Ch7 Basic Types
Ch7 Basic TypesCh7 Basic Types
Ch7 Basic Types
 
C PADHLO FRANDS.pdf
C PADHLO FRANDS.pdfC PADHLO FRANDS.pdf
C PADHLO FRANDS.pdf
 
COM1407: Variables and Data Types
COM1407: Variables and Data Types COM1407: Variables and Data Types
COM1407: Variables and Data Types
 
fundamentals of c
fundamentals of cfundamentals of c
fundamentals of c
 

Mehr von Sahithi Naraparaju

documentation for identity based secure distrbuted data storage schemes
documentation for identity based secure distrbuted data storage schemesdocumentation for identity based secure distrbuted data storage schemes
documentation for identity based secure distrbuted data storage schemesSahithi Naraparaju
 
SYSTEM ARCHITECTURE / UML DIAGRAMS FOR IDENTITY BASED SECURE DISTRIBUTED DATA...
SYSTEM ARCHITECTURE / UML DIAGRAMS FOR IDENTITY BASED SECURE DISTRIBUTED DATA...SYSTEM ARCHITECTURE / UML DIAGRAMS FOR IDENTITY BASED SECURE DISTRIBUTED DATA...
SYSTEM ARCHITECTURE / UML DIAGRAMS FOR IDENTITY BASED SECURE DISTRIBUTED DATA...Sahithi Naraparaju
 
66913017 java-ring-1217949449014046-9 (1)
66913017 java-ring-1217949449014046-9 (1)66913017 java-ring-1217949449014046-9 (1)
66913017 java-ring-1217949449014046-9 (1)Sahithi Naraparaju
 
Self protecteion in clustered distributed system new
Self protecteion in clustered distributed system newSelf protecteion in clustered distributed system new
Self protecteion in clustered distributed system newSahithi Naraparaju
 
A Batch-authenticated And Key Agreement Framework For P2p-based Online Social...
A Batch-authenticated And Key AgreementFramework For P2p-based Online Social...A Batch-authenticated And Key AgreementFramework For P2p-based Online Social...
A Batch-authenticated And Key Agreement Framework For P2p-based Online Social...Sahithi Naraparaju
 

Mehr von Sahithi Naraparaju (6)

documentation for identity based secure distrbuted data storage schemes
documentation for identity based secure distrbuted data storage schemesdocumentation for identity based secure distrbuted data storage schemes
documentation for identity based secure distrbuted data storage schemes
 
SYSTEM ARCHITECTURE / UML DIAGRAMS FOR IDENTITY BASED SECURE DISTRIBUTED DATA...
SYSTEM ARCHITECTURE / UML DIAGRAMS FOR IDENTITY BASED SECURE DISTRIBUTED DATA...SYSTEM ARCHITECTURE / UML DIAGRAMS FOR IDENTITY BASED SECURE DISTRIBUTED DATA...
SYSTEM ARCHITECTURE / UML DIAGRAMS FOR IDENTITY BASED SECURE DISTRIBUTED DATA...
 
over view of viruses
over view of virusesover view of viruses
over view of viruses
 
66913017 java-ring-1217949449014046-9 (1)
66913017 java-ring-1217949449014046-9 (1)66913017 java-ring-1217949449014046-9 (1)
66913017 java-ring-1217949449014046-9 (1)
 
Self protecteion in clustered distributed system new
Self protecteion in clustered distributed system newSelf protecteion in clustered distributed system new
Self protecteion in clustered distributed system new
 
A Batch-authenticated And Key Agreement Framework For P2p-based Online Social...
A Batch-authenticated And Key AgreementFramework For P2p-based Online Social...A Batch-authenticated And Key AgreementFramework For P2p-based Online Social...
A Batch-authenticated And Key Agreement Framework For P2p-based Online Social...
 

Kürzlich hochgeladen

Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 

Kürzlich hochgeladen (20)

Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 

CONSTANTS, VARIABLES & DATATYPES IN C

  • 2. INRODUCTION • A programming language is designed to help process certain kinds of data consisting of numbers, characters and strings to provide useful output known as information. • The task of processing of data is accomplished by executing a sequence of precise instructions called program. • These instructions are formed using certain symbols and words according to some rigid rules known as syntax rules.
  • 3. CHARACTER SET: • The characters in C are grouped into following categories: 1) Letters 2) digits 3) special characters 4) white spaces. • Compiler ignores white spaces unless they are part of a string constant. • White spaces may be used to separate words but prohibited between characters of keywords and identifiers.
  • 4. • LETTERS: Uppercase A….Z, lower case a..z. • DIGITS: All decimal digits 0..9 • SPECIAL CHARACTERS: comma(,), period(.), semicolon(;) , colon(:), question mark(?), quotation(“), dollar sign($), slash(/),back slash(), percent sign(%), underscore(_), ampersand(&), asterisk(*), number sign(#). • WHITE SPACES: Blank space, Horizontal tab, Carriage return, Newline, Form feed.
  • 5. Trigraph characters: • C introduces the concept of trigraph sequences to provide a way to enter certain characters that are not available on some keywords. • Each trigraph sequence consists of three characters, 2 question marks followed by another character. • Eg: ??= (number sign), ??)(right bracket]), ??( (left bracket[) , ??! (vertical bar), ??< (left brace {) , ??> (right brace }),??/ (back slash).
  • 6. C tokens: • In a passage of text individual words and punctuation marks are called tokens. • In a C program the smallest individual units known as C tokens. • C has 6 types of tokens namely: 1) Keywords 2) identifiers 3)constants 4)Strings 5)special symbols 6)operators.
  • 7. Keywords and identifiers. • Every C word is classified as either a keyword or an identifier. • All keywords have fixed meanings and these meanings cannot be changed. • Keywords serve as basic building blocks for program statements. • All keywords must be written in lower case. • The underscore character is also permitted in identifiers. • It is usually used a link between two words in long identifiers
  • 8. RULES FOR IDENTIFIERS: 1. 2. 3. 4. 5. First character must be an alphabet. Must consist of only letters, digits or underscore. Only first 31 characters are significant. Cannot use keyword. Must not contain white space.
  • 9. CONSTANTS • Constants refer to fixed values that do not change during the execution of program. INTEGER CONSTANTS: • An integer constant refer to a sequence of digits. • There are 3 types of integers namely: Decimal integer, octal integer and hexadecimal integer. • Decimal integer consist of a set of digits 0 through 9,precceded by an optional – or + sign.
  • 10. • An octal integer constant consist of any combination of digits from the set 0 through 7. with a leading 0 • Eg: 037,0, 0456. • A sequence of digits preceded by 0x or 0X is considered as hexadecimal integer. • They may include alphabets A through F or f. • Letter A through F represents numbesr 10 to 15.
  • 11. REAL CONSTANTS: • To represent quantities that vary continuously real constants are used. • A real number may be expressed in exponential notation. SYNTAX: mantissa e exponent. • Mantissa can be either real number expressed in decimal notation or an integer. • Exponent is an integer number with an optional + or – sign. • The letter ‘e’ separating the mantissa and the exponent, it can be written either lower case or upper case. SYNTAX: 0.65e4,12e-2.
  • 12. • White space is not allowed. • Exponential notation is useful for representing numbers that are either very large or very small in magnitude. • Floating point constants are normally represented as doubleprecision quantities. SINGLE CHARACTER CONSTANTS: • A single character constant contains a single character enclose in a pair of single quote marks. Eg: ‘5’,’x’.
  • 13. • Character constant ‘5’ is not same as number 5. • Character constants have integer values known as ASCII values. • Statement: printf (“%d”, ’a’); would print number 97, the ASCII value of letter ‘a’. • Since each character constant represent an integer value, it is possible to perform arithmetic operations on character constants.
  • 14. STRING CONSTANTS: • A string constant is a sequence of characters enclosed in double quotes. • Characters may be letters, numbers, special characters and blank spaces. Eg: “hello” , “1987”, “?...!”. • Character constant is not equivalent to single character string constant. .
  • 15. BACK SLASH CHARACTER CONSTANTS: • C supports some special back slash character constants that are used in output functions. • These characters combinations are known as escape sequences. • Back slash character constants are: ‘a’ audible alert; ‘b’ backspace; ‘f’ form feed; ‘n’ newline; ‘r’ carriage return; ‘t’ horizontal tab; ‘v’ vertical tab; ‘”single quote, ‘?’ question mark; ‘’ backslash; ‘0’ null.
  • 16. VARIABLES • A variable is a data name that may be used to store a data value. • A variable may take different values at different times during execution. • A variable can be chosen by the programmer in a meaningful way. CONDITIONS FOR SPECIFYING VARIABLES: 1. They must begin with a letter. Some systems may permit underscore as first character.
  • 17. 1. Uppercase and lowercase are significant. The variable TOTAL is different from total and Total. 2. It should not be keyword. 3. Whitespace is not allowed. 4. Length should be normally more than 8 characters are treated as significant by many compilers. • Examples of valid variables are: john, x1,T_raise, first_tag. • Examples of invalid variables are: 123,(area),25th,price$, %.
  • 18. DATATYPES • C language is rich in its data types. • Storage representations and machine instructions to handle constants differ from machine to machine. • The variety of datatypes allow to select the type appropriate to the needs of the application as well as machine. • C supports 3 classes of datatypes: 1)Primary datatypes 2) derived datatypes 3)derived datatypes.
  • 19. • All C compilers support 5 fundamental datatypes namely: integer (int), character (char), floating point (float), doubleprecision floating point (double) and void. • Many of them also offer extended datatypes such as long int, int ,long double. Data type Range of values char -128 to 127 int -32768 to 32767 float -3.4e+8 to 3.4e+8 double 1.7e-308 to 1.7e+308.
  • 20. INTEGER TYPES: • Integers are whole numbers with a range of values supported by particular machine. • Integers occupy one word storage generally and since the word sizes of machine vary the size of integer that can be stored depends on computer. • If we use 16-bit word length, the size of integer value is limited to range -32768 to 32767. • If we use 32-bit word length can store an integer ranging from -2147483648 to 2147483647.
  • 21. • In order to provide control over range of numbers and storage space C has 3 classes of integer storage namely: short int, int, long int in both signed and unsigned. • Short int represents fairly small integer values and requires half amount as regular int number uses. FLOATING POINT TYPE: • Floating point numbers are stored in 32bits, with 6 digit precision. • Floating point numbers are defined by keyword “float”.
  • 22. • When accuracy is provided by a float number is not sufficient, double can be used to define number. • A double datatype number uses 64 bits giving a precision of 14 digits. • These are known as double precision number. • Double datatype represent the same datatype that float represents but with greater precision. • To extend the precision we may use long double which uses 80 bits.
  • 23. VOID TYPES: • Void type has no values. This is used to specify the type of functions. • The type of function is said to be void when it doesn't return any value to the calling function. CHARACTER TYPES: • A single character can be defined as a character (char) type data. • Characters are usually store in one byte of internal storage. • Qualifier signed or unsigned may be used in char explicitly. Unsigned characters have values between 0 and 255, signed characters have values from -128 to 127