SlideShare a Scribd company logo
1 of 23
CONSTANTS, VARIABLES &
DATATYPES
BY
SAHITHI NARAPARAJU
INRODUCTION
• A programming language is designed to help process certain
kinds of data consisting of numbers, characters and strings to
provide useful output known as information.
• The task of processing of data is accomplished by executing a
sequence of precise instructions called program.
• These instructions are formed using certain symbols and
words according to some rigid rules known as syntax rules.
CHARACTER SET:
• The characters in C are grouped into following categories:
1) Letters 2) digits
3) special characters 4) white spaces.
• Compiler ignores white spaces unless they are part of a string
constant.
• White spaces may be used to separate words but prohibited
between characters of keywords and identifiers.
• LETTERS: Uppercase A….Z, lower case a..z.
• DIGITS: All decimal digits 0..9
• SPECIAL CHARACTERS: comma(,), period(.),
semicolon(;) , colon(:), question mark(?), quotation(“), dollar
sign($), slash(/),back slash(), percent sign(%), underscore(_),
ampersand(&), asterisk(*), number sign(#).
• WHITE SPACES: Blank space, Horizontal tab, Carriage
return, Newline, Form feed.
Trigraph characters:
• C introduces the concept of trigraph sequences to provide a
way to enter certain characters that are not available on some
keywords.
• Each trigraph sequence consists of three characters, 2 question
marks followed by another character.
• Eg: ??= (number sign), ??)(right bracket]), ??( (left
bracket[) , ??! (vertical bar), ??< (left brace {) , ??> (right brace
}),??/ (back slash).
C tokens:
•

In a passage of text individual words and punctuation marks
are called tokens.

•

In a C program the smallest individual units known as C
tokens.

•
C has 6 types of tokens namely:
1) Keywords
2) identifiers
3)constants
4)Strings
5)special symbols
6)operators.
Keywords and identifiers.
• Every C word is classified as either a keyword or an identifier.
• All keywords have fixed meanings and these meanings cannot
be changed.
• Keywords serve as basic building blocks for program
statements.
• All keywords must be written in lower case.
• The underscore character is also permitted in identifiers.
• It is usually used a link between two words in long identifiers
RULES FOR IDENTIFIERS:
1.
2.
3.
4.
5.

First character must be an alphabet.
Must consist of only letters, digits or underscore.
Only first 31 characters are significant.
Cannot use keyword.
Must not contain white space.
CONSTANTS
• Constants refer to fixed values that do not change during the
execution of program.

INTEGER CONSTANTS:
• An integer constant refer to a sequence of digits.
• There are 3 types of integers namely:
Decimal integer, octal integer and hexadecimal integer.
• Decimal integer consist of a set of digits 0 through
9,precceded by an optional – or + sign.
• An octal integer constant consist of any combination of digits
from the set 0 through 7. with a leading 0
• Eg: 037,0, 0456.
• A sequence of digits preceded by 0x or 0X is considered as
hexadecimal integer.
• They may include alphabets A through F or f.
• Letter A through F represents numbesr 10 to 15.
REAL CONSTANTS:
• To represent quantities that vary continuously real constants
are used.
• A real number may be expressed in exponential notation.
SYNTAX: mantissa e exponent.
• Mantissa can be either real number expressed in decimal
notation or an integer.
• Exponent is an integer number with an optional + or – sign.
• The letter ‘e’ separating the mantissa and the exponent, it can
be written either lower case or upper case.
SYNTAX: 0.65e4,12e-2.
• White space is not allowed.
• Exponential notation is useful for representing numbers that
are either very large or very small in magnitude.
• Floating point constants are normally represented as doubleprecision quantities.

SINGLE CHARACTER CONSTANTS:
• A single character constant contains a single character enclose
in a pair of single quote marks.
Eg: ‘5’,’x’.
• Character constant ‘5’ is not same as number 5.
• Character constants have integer values known as ASCII
values.
• Statement: printf (“%d”, ’a’); would print number 97, the
ASCII value of letter ‘a’.
• Since each character constant represent an integer value, it is
possible to perform arithmetic operations on character
constants.
STRING CONSTANTS:
• A string constant is a sequence of characters enclosed in
double quotes.
• Characters may be letters, numbers, special characters and
blank spaces.
Eg: “hello” , “1987”, “?...!”.
• Character constant is not equivalent to single character string
constant.

.
BACK SLASH CHARACTER CONSTANTS:
• C supports some special back slash character constants that
are used in output functions.
• These characters combinations are known as escape
sequences.
• Back slash character constants are:
‘a’ audible alert; ‘b’ backspace; ‘f’ form feed; ‘n’ newline;
‘r’ carriage return; ‘t’ horizontal tab; ‘v’ vertical tab;
‘”single quote, ‘?’ question mark; ‘’ backslash; ‘0’ null.
VARIABLES
•

A variable is a data name that may be used to store a data
value.

•

A variable may take different values at different times
during execution.

•

A variable can be chosen by the programmer in a
meaningful way.

CONDITIONS FOR SPECIFYING VARIABLES:
1.

They must begin with a letter. Some systems may permit
underscore as first character.
1.

Uppercase and lowercase are significant. The variable
TOTAL is different from total and Total.

2.

It should not be keyword.

3.

Whitespace is not allowed.

4.

Length should be normally more than 8 characters are
treated as significant by many compilers.

•

Examples of valid variables are:
john, x1,T_raise, first_tag.

•

Examples of invalid variables are:
123,(area),25th,price$, %.
DATATYPES
• C language is rich in its data types.
• Storage representations and machine instructions to handle
constants differ from machine to machine.
• The variety of datatypes allow to select the type appropriate to
the needs of the application as well as machine.
• C supports 3 classes of datatypes:
1)Primary datatypes
2) derived datatypes
3)derived datatypes.
• All C compilers support 5 fundamental datatypes namely:
integer (int), character (char), floating point (float), doubleprecision floating point (double) and void.
• Many of them also offer extended datatypes such as long int,
int ,long double.
Data type
Range of values
char
-128 to 127
int
-32768 to 32767
float
-3.4e+8 to 3.4e+8
double
1.7e-308 to 1.7e+308.
INTEGER TYPES:
• Integers are whole numbers with a range of values supported
by particular machine.
• Integers occupy one word storage generally and since the
word sizes of machine vary the size of integer that can be
stored depends on computer.
• If we use 16-bit word length, the size of integer value is
limited to range -32768 to 32767.
• If we use 32-bit word length can store an integer ranging from
-2147483648 to 2147483647.
• In order to provide control over range of numbers and storage
space C has 3 classes of integer storage namely: short int, int,
long int in both signed and unsigned.
• Short int represents fairly small integer values and requires
half amount as regular int number uses.

FLOATING POINT TYPE:
•

Floating point numbers are stored in 32bits, with 6 digit
precision.

• Floating point numbers are defined by keyword “float”.
• When accuracy is provided by a float number is not sufficient,
double can be used to define number.
• A double datatype number uses 64 bits giving a precision of
14 digits.
• These are known as double precision number.
• Double datatype represent the same datatype that float
represents but with greater precision.
• To extend the precision we may use long double which uses
80 bits.
VOID TYPES:
• Void type has no values. This is used to specify the type of
functions.
• The type of function is said to be void when it doesn't return
any value to the calling function.

CHARACTER TYPES:
• A single character can be defined as a character (char) type
data.
• Characters are usually store in one byte of internal storage.
• Qualifier signed or unsigned may be used in char explicitly.
Unsigned characters have values between 0 and 255, signed
characters have values from -128 to 127

More Related Content

What's hot (20)

Tokens in C++
Tokens in C++Tokens in C++
Tokens in C++
 
Constants and variables in c programming
Constants and variables in c programmingConstants and variables in c programming
Constants and variables in c programming
 
Programming in c Arrays
Programming in c ArraysProgramming in c Arrays
Programming in c Arrays
 
Array in c
Array in cArray in c
Array in c
 
FUNCTIONS IN c++ PPT
FUNCTIONS IN c++ PPTFUNCTIONS IN c++ PPT
FUNCTIONS IN c++ PPT
 
Structure in C
Structure in CStructure in C
Structure in C
 
C keywords and identifiers
C keywords and identifiersC keywords and identifiers
C keywords and identifiers
 
Constants in C Programming
Constants in C ProgrammingConstants in C Programming
Constants in C Programming
 
INTRODUCTION TO C PROGRAMMING
INTRODUCTION TO C PROGRAMMINGINTRODUCTION TO C PROGRAMMING
INTRODUCTION TO C PROGRAMMING
 
Arrays in c
Arrays in cArrays in c
Arrays in c
 
Basics of C programming
Basics of C programmingBasics of C programming
Basics of C programming
 
Fundamentals of c programming
Fundamentals of c programmingFundamentals of c programming
Fundamentals of c programming
 
Structures in c language
Structures in c languageStructures in c language
Structures in c language
 
String functions in C
String functions in CString functions in C
String functions in C
 
Strings in C
Strings in CStrings in C
Strings in C
 
Formatted input and output
Formatted input and outputFormatted input and output
Formatted input and output
 
Control statements in c
Control statements in cControl statements in c
Control statements in c
 
Pointers C programming
Pointers  C programmingPointers  C programming
Pointers C programming
 
Pointer in c
Pointer in cPointer in c
Pointer in c
 
Data Type in C Programming
Data Type in C ProgrammingData Type in C Programming
Data Type in C Programming
 

Viewers also liked

The Literature Review Process
The Literature Review ProcessThe Literature Review Process
The Literature Review Processannielibrarian
 
Ethical issues in research
Ethical issues in researchEthical issues in research
Ethical issues in researchR.Harish Kumar
 
Educational research
Educational researchEducational research
Educational researchmeenuch
 
Characteristics and criteria of good research
Characteristics and criteria of good researchCharacteristics and criteria of good research
Characteristics and criteria of good researchA B
 
Literature review in research
Literature review in researchLiterature review in research
Literature review in researchNursing Path
 

Viewers also liked (9)

Presentation on literature review
Presentation on literature reviewPresentation on literature review
Presentation on literature review
 
The Literature Review Process
The Literature Review ProcessThe Literature Review Process
The Literature Review Process
 
Concept, Construct and Variable
Concept, Construct and VariableConcept, Construct and Variable
Concept, Construct and Variable
 
The research instruments
The research instrumentsThe research instruments
The research instruments
 
Ethical issues in research
Ethical issues in researchEthical issues in research
Ethical issues in research
 
Educational research
Educational researchEducational research
Educational research
 
Literature Review
Literature ReviewLiterature Review
Literature Review
 
Characteristics and criteria of good research
Characteristics and criteria of good researchCharacteristics and criteria of good research
Characteristics and criteria of good research
 
Literature review in research
Literature review in researchLiterature review in research
Literature review in research
 

Similar to constants, variables and datatypes in C

C Programming Lecture 3 - Elements of C.pptx
C Programming Lecture 3 - Elements of C.pptxC Programming Lecture 3 - Elements of C.pptx
C Programming Lecture 3 - Elements of C.pptxMurali M
 
Constants Variables Datatypes by Mrs. Sowmya Jyothi
Constants Variables Datatypes by Mrs. Sowmya JyothiConstants Variables Datatypes by Mrs. Sowmya Jyothi
Constants Variables Datatypes by Mrs. Sowmya JyothiSowmyaJyothi3
 
Module 1:Introduction
Module 1:IntroductionModule 1:Introduction
Module 1:Introductionnikshaikh786
 
Structure of c_program_to_input_output
Structure of c_program_to_input_outputStructure of c_program_to_input_output
Structure of c_program_to_input_outputAnil Dutt
 
CSE 1201: Structured Programming Language
CSE 1201: Structured Programming LanguageCSE 1201: Structured Programming Language
CSE 1201: Structured Programming LanguageZubayer Farazi
 
Programming in c
Programming in cProgramming in c
Programming in cvineet4523
 
Chapter 2: Elementary Programming
Chapter 2: Elementary ProgrammingChapter 2: Elementary Programming
Chapter 2: Elementary ProgrammingEric Chou
 
COM1407: Variables and Data Types
COM1407: Variables and Data Types COM1407: Variables and Data Types
COM1407: Variables and Data Types Hemantha Kulathilake
 

Similar to constants, variables and datatypes in C (20)

C Programming Lecture 3 - Elements of C.pptx
C Programming Lecture 3 - Elements of C.pptxC Programming Lecture 3 - Elements of C.pptx
C Programming Lecture 3 - Elements of C.pptx
 
Constants Variables Datatypes by Mrs. Sowmya Jyothi
Constants Variables Datatypes by Mrs. Sowmya JyothiConstants Variables Datatypes by Mrs. Sowmya Jyothi
Constants Variables Datatypes by Mrs. Sowmya Jyothi
 
C tokens.pptx
C tokens.pptxC tokens.pptx
C tokens.pptx
 
Module 1:Introduction
Module 1:IntroductionModule 1:Introduction
Module 1:Introduction
 
All C ppt.ppt
All C ppt.pptAll C ppt.ppt
All C ppt.ppt
 
Lec9
Lec9Lec9
Lec9
 
Cp presentation
Cp presentationCp presentation
Cp presentation
 
Constants variables data_types
Constants variables data_typesConstants variables data_types
Constants variables data_types
 
C language
C languageC language
C language
 
Structure of c_program_to_input_output
Structure of c_program_to_input_outputStructure of c_program_to_input_output
Structure of c_program_to_input_output
 
lec 2.pptx
lec 2.pptxlec 2.pptx
lec 2.pptx
 
CSE 1201: Structured Programming Language
CSE 1201: Structured Programming LanguageCSE 1201: Structured Programming Language
CSE 1201: Structured Programming Language
 
Chap 1 and 2
Chap 1 and 2Chap 1 and 2
Chap 1 and 2
 
Programming in c
Programming in cProgramming in c
Programming in c
 
Chapter 2: Elementary Programming
Chapter 2: Elementary ProgrammingChapter 2: Elementary Programming
Chapter 2: Elementary Programming
 
FUNDAMENTAL OF C
FUNDAMENTAL OF CFUNDAMENTAL OF C
FUNDAMENTAL OF C
 
Basics of C.ppt
Basics of C.pptBasics of C.ppt
Basics of C.ppt
 
Ch7 Basic Types
Ch7 Basic TypesCh7 Basic Types
Ch7 Basic Types
 
C PADHLO FRANDS.pdf
C PADHLO FRANDS.pdfC PADHLO FRANDS.pdf
C PADHLO FRANDS.pdf
 
COM1407: Variables and Data Types
COM1407: Variables and Data Types COM1407: Variables and Data Types
COM1407: Variables and Data Types
 

More from Sahithi Naraparaju

documentation for identity based secure distrbuted data storage schemes
documentation for identity based secure distrbuted data storage schemesdocumentation for identity based secure distrbuted data storage schemes
documentation for identity based secure distrbuted data storage schemesSahithi Naraparaju
 
SYSTEM ARCHITECTURE / UML DIAGRAMS FOR IDENTITY BASED SECURE DISTRIBUTED DATA...
SYSTEM ARCHITECTURE / UML DIAGRAMS FOR IDENTITY BASED SECURE DISTRIBUTED DATA...SYSTEM ARCHITECTURE / UML DIAGRAMS FOR IDENTITY BASED SECURE DISTRIBUTED DATA...
SYSTEM ARCHITECTURE / UML DIAGRAMS FOR IDENTITY BASED SECURE DISTRIBUTED DATA...Sahithi Naraparaju
 
literature survey for identity based secure distributed data storage
literature survey for identity based secure distributed data storage literature survey for identity based secure distributed data storage
literature survey for identity based secure distributed data storage Sahithi Naraparaju
 
Identity based secure distributed data storage schemes
Identity based secure distributed data storage schemesIdentity based secure distributed data storage schemes
Identity based secure distributed data storage schemesSahithi Naraparaju
 
Srs document for identity based secure distributed data storage schemes
Srs document for identity based secure distributed data storage schemesSrs document for identity based secure distributed data storage schemes
Srs document for identity based secure distributed data storage schemesSahithi Naraparaju
 
66913017 java-ring-1217949449014046-9 (1)
66913017 java-ring-1217949449014046-9 (1)66913017 java-ring-1217949449014046-9 (1)
66913017 java-ring-1217949449014046-9 (1)Sahithi Naraparaju
 
Self protecteion in clustered distributed system new
Self protecteion in clustered distributed system newSelf protecteion in clustered distributed system new
Self protecteion in clustered distributed system newSahithi Naraparaju
 
CONSTANTS, VARIABLES & DATATYPES IN C
CONSTANTS, VARIABLES & DATATYPES IN CCONSTANTS, VARIABLES & DATATYPES IN C
CONSTANTS, VARIABLES & DATATYPES IN CSahithi Naraparaju
 
Steps for Developing a 'C' program
 Steps for Developing a 'C' program Steps for Developing a 'C' program
Steps for Developing a 'C' programSahithi Naraparaju
 
Self protecteion in clustered distributed system new
Self protecteion in clustered distributed system newSelf protecteion in clustered distributed system new
Self protecteion in clustered distributed system newSahithi Naraparaju
 
A Batch-authenticated And Key Agreement Framework For P2p-based Online Social...
A Batch-authenticated And Key AgreementFramework For P2p-based Online Social...A Batch-authenticated And Key AgreementFramework For P2p-based Online Social...
A Batch-authenticated And Key Agreement Framework For P2p-based Online Social...Sahithi Naraparaju
 

More from Sahithi Naraparaju (16)

PPT FOR IDBSDDS SCHEMES
PPT FOR IDBSDDS SCHEMESPPT FOR IDBSDDS SCHEMES
PPT FOR IDBSDDS SCHEMES
 
documentation for identity based secure distrbuted data storage schemes
documentation for identity based secure distrbuted data storage schemesdocumentation for identity based secure distrbuted data storage schemes
documentation for identity based secure distrbuted data storage schemes
 
SYSTEM ARCHITECTURE / UML DIAGRAMS FOR IDENTITY BASED SECURE DISTRIBUTED DATA...
SYSTEM ARCHITECTURE / UML DIAGRAMS FOR IDENTITY BASED SECURE DISTRIBUTED DATA...SYSTEM ARCHITECTURE / UML DIAGRAMS FOR IDENTITY BASED SECURE DISTRIBUTED DATA...
SYSTEM ARCHITECTURE / UML DIAGRAMS FOR IDENTITY BASED SECURE DISTRIBUTED DATA...
 
over view of viruses
over view of virusesover view of viruses
over view of viruses
 
literature survey for identity based secure distributed data storage
literature survey for identity based secure distributed data storage literature survey for identity based secure distributed data storage
literature survey for identity based secure distributed data storage
 
Identity based secure distributed data storage schemes
Identity based secure distributed data storage schemesIdentity based secure distributed data storage schemes
Identity based secure distributed data storage schemes
 
Srs document for identity based secure distributed data storage schemes
Srs document for identity based secure distributed data storage schemesSrs document for identity based secure distributed data storage schemes
Srs document for identity based secure distributed data storage schemes
 
66913017 java-ring-1217949449014046-9 (1)
66913017 java-ring-1217949449014046-9 (1)66913017 java-ring-1217949449014046-9 (1)
66913017 java-ring-1217949449014046-9 (1)
 
Self protecteion in clustered distributed system new
Self protecteion in clustered distributed system newSelf protecteion in clustered distributed system new
Self protecteion in clustered distributed system new
 
OVERVIEW OF ‘C’ PROGRAM
OVERVIEW OF ‘C’ PROGRAMOVERVIEW OF ‘C’ PROGRAM
OVERVIEW OF ‘C’ PROGRAM
 
CONSTANTS, VARIABLES & DATATYPES IN C
CONSTANTS, VARIABLES & DATATYPES IN CCONSTANTS, VARIABLES & DATATYPES IN C
CONSTANTS, VARIABLES & DATATYPES IN C
 
Steps for Developing a 'C' program
 Steps for Developing a 'C' program Steps for Developing a 'C' program
Steps for Developing a 'C' program
 
pre processor directives in C
pre processor directives in Cpre processor directives in C
pre processor directives in C
 
Self protecteion in clustered distributed system new
Self protecteion in clustered distributed system newSelf protecteion in clustered distributed system new
Self protecteion in clustered distributed system new
 
A Batch-authenticated And Key Agreement Framework For P2p-based Online Social...
A Batch-authenticated And Key AgreementFramework For P2p-based Online Social...A Batch-authenticated And Key AgreementFramework For P2p-based Online Social...
A Batch-authenticated And Key Agreement Framework For P2p-based Online Social...
 
Haptic technology
Haptic technologyHaptic technology
Haptic technology
 

Recently uploaded

AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)Samir Dash
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMKumar Satyam
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAnitaRaj43
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 

Recently uploaded (20)

AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 

constants, variables and datatypes in C

  • 2. INRODUCTION • A programming language is designed to help process certain kinds of data consisting of numbers, characters and strings to provide useful output known as information. • The task of processing of data is accomplished by executing a sequence of precise instructions called program. • These instructions are formed using certain symbols and words according to some rigid rules known as syntax rules.
  • 3. CHARACTER SET: • The characters in C are grouped into following categories: 1) Letters 2) digits 3) special characters 4) white spaces. • Compiler ignores white spaces unless they are part of a string constant. • White spaces may be used to separate words but prohibited between characters of keywords and identifiers.
  • 4. • LETTERS: Uppercase A….Z, lower case a..z. • DIGITS: All decimal digits 0..9 • SPECIAL CHARACTERS: comma(,), period(.), semicolon(;) , colon(:), question mark(?), quotation(“), dollar sign($), slash(/),back slash(), percent sign(%), underscore(_), ampersand(&), asterisk(*), number sign(#). • WHITE SPACES: Blank space, Horizontal tab, Carriage return, Newline, Form feed.
  • 5. Trigraph characters: • C introduces the concept of trigraph sequences to provide a way to enter certain characters that are not available on some keywords. • Each trigraph sequence consists of three characters, 2 question marks followed by another character. • Eg: ??= (number sign), ??)(right bracket]), ??( (left bracket[) , ??! (vertical bar), ??< (left brace {) , ??> (right brace }),??/ (back slash).
  • 6. C tokens: • In a passage of text individual words and punctuation marks are called tokens. • In a C program the smallest individual units known as C tokens. • C has 6 types of tokens namely: 1) Keywords 2) identifiers 3)constants 4)Strings 5)special symbols 6)operators.
  • 7. Keywords and identifiers. • Every C word is classified as either a keyword or an identifier. • All keywords have fixed meanings and these meanings cannot be changed. • Keywords serve as basic building blocks for program statements. • All keywords must be written in lower case. • The underscore character is also permitted in identifiers. • It is usually used a link between two words in long identifiers
  • 8. RULES FOR IDENTIFIERS: 1. 2. 3. 4. 5. First character must be an alphabet. Must consist of only letters, digits or underscore. Only first 31 characters are significant. Cannot use keyword. Must not contain white space.
  • 9. CONSTANTS • Constants refer to fixed values that do not change during the execution of program. INTEGER CONSTANTS: • An integer constant refer to a sequence of digits. • There are 3 types of integers namely: Decimal integer, octal integer and hexadecimal integer. • Decimal integer consist of a set of digits 0 through 9,precceded by an optional – or + sign.
  • 10. • An octal integer constant consist of any combination of digits from the set 0 through 7. with a leading 0 • Eg: 037,0, 0456. • A sequence of digits preceded by 0x or 0X is considered as hexadecimal integer. • They may include alphabets A through F or f. • Letter A through F represents numbesr 10 to 15.
  • 11. REAL CONSTANTS: • To represent quantities that vary continuously real constants are used. • A real number may be expressed in exponential notation. SYNTAX: mantissa e exponent. • Mantissa can be either real number expressed in decimal notation or an integer. • Exponent is an integer number with an optional + or – sign. • The letter ‘e’ separating the mantissa and the exponent, it can be written either lower case or upper case. SYNTAX: 0.65e4,12e-2.
  • 12. • White space is not allowed. • Exponential notation is useful for representing numbers that are either very large or very small in magnitude. • Floating point constants are normally represented as doubleprecision quantities. SINGLE CHARACTER CONSTANTS: • A single character constant contains a single character enclose in a pair of single quote marks. Eg: ‘5’,’x’.
  • 13. • Character constant ‘5’ is not same as number 5. • Character constants have integer values known as ASCII values. • Statement: printf (“%d”, ’a’); would print number 97, the ASCII value of letter ‘a’. • Since each character constant represent an integer value, it is possible to perform arithmetic operations on character constants.
  • 14. STRING CONSTANTS: • A string constant is a sequence of characters enclosed in double quotes. • Characters may be letters, numbers, special characters and blank spaces. Eg: “hello” , “1987”, “?...!”. • Character constant is not equivalent to single character string constant. .
  • 15. BACK SLASH CHARACTER CONSTANTS: • C supports some special back slash character constants that are used in output functions. • These characters combinations are known as escape sequences. • Back slash character constants are: ‘a’ audible alert; ‘b’ backspace; ‘f’ form feed; ‘n’ newline; ‘r’ carriage return; ‘t’ horizontal tab; ‘v’ vertical tab; ‘”single quote, ‘?’ question mark; ‘’ backslash; ‘0’ null.
  • 16. VARIABLES • A variable is a data name that may be used to store a data value. • A variable may take different values at different times during execution. • A variable can be chosen by the programmer in a meaningful way. CONDITIONS FOR SPECIFYING VARIABLES: 1. They must begin with a letter. Some systems may permit underscore as first character.
  • 17. 1. Uppercase and lowercase are significant. The variable TOTAL is different from total and Total. 2. It should not be keyword. 3. Whitespace is not allowed. 4. Length should be normally more than 8 characters are treated as significant by many compilers. • Examples of valid variables are: john, x1,T_raise, first_tag. • Examples of invalid variables are: 123,(area),25th,price$, %.
  • 18. DATATYPES • C language is rich in its data types. • Storage representations and machine instructions to handle constants differ from machine to machine. • The variety of datatypes allow to select the type appropriate to the needs of the application as well as machine. • C supports 3 classes of datatypes: 1)Primary datatypes 2) derived datatypes 3)derived datatypes.
  • 19. • All C compilers support 5 fundamental datatypes namely: integer (int), character (char), floating point (float), doubleprecision floating point (double) and void. • Many of them also offer extended datatypes such as long int, int ,long double. Data type Range of values char -128 to 127 int -32768 to 32767 float -3.4e+8 to 3.4e+8 double 1.7e-308 to 1.7e+308.
  • 20. INTEGER TYPES: • Integers are whole numbers with a range of values supported by particular machine. • Integers occupy one word storage generally and since the word sizes of machine vary the size of integer that can be stored depends on computer. • If we use 16-bit word length, the size of integer value is limited to range -32768 to 32767. • If we use 32-bit word length can store an integer ranging from -2147483648 to 2147483647.
  • 21. • In order to provide control over range of numbers and storage space C has 3 classes of integer storage namely: short int, int, long int in both signed and unsigned. • Short int represents fairly small integer values and requires half amount as regular int number uses. FLOATING POINT TYPE: • Floating point numbers are stored in 32bits, with 6 digit precision. • Floating point numbers are defined by keyword “float”.
  • 22. • When accuracy is provided by a float number is not sufficient, double can be used to define number. • A double datatype number uses 64 bits giving a precision of 14 digits. • These are known as double precision number. • Double datatype represent the same datatype that float represents but with greater precision. • To extend the precision we may use long double which uses 80 bits.
  • 23. VOID TYPES: • Void type has no values. This is used to specify the type of functions. • The type of function is said to be void when it doesn't return any value to the calling function. CHARACTER TYPES: • A single character can be defined as a character (char) type data. • Characters are usually store in one byte of internal storage. • Qualifier signed or unsigned may be used in char explicitly. Unsigned characters have values between 0 and 255, signed characters have values from -128 to 127