SlideShare a Scribd company logo
 What is “C” ?
 Feature of “C” Program
 “C” Keywords
 “C” Character Set
 Rules for Writing, Compiling & Executing
“C” Program
 Data types & Placeholders
 Control characters
 Receiving input values from keyboard
 Basic “C” Program example
 References
 “C” is a programming language developed at AT
&T’s Bell Laboratories of USA in 1972 by
Dennis Ritchie.
 Any programming language can be divided into
2 categories:
 Problem oriented (HLL)
 Machine oriented (LLL)
 But “C” is considered as Middle Level
Language.
 “C” is modular, portable, reusable.
 General purpose language
 Limited no. of keyword
 Code Re-usability & Ability to customize and
extend
 Portability
 Structured language
 Make it ideal language for system
programming.
 It can also be used for business & scientific
application.
 ANSI established a standard for “C” in 1983.
 The ability of “C” is to manipulate bits, byte &
addresses.
 It is adopted in later 1990.
 It has ability to divide & hide all the
information & instruction.
 Code can be partitioned in “C” using
functions or code block.
 C is a well structured language compare to
other.
 Portability is the ability to port or use the
software written.
 One computer C program can be reused.
 By modification or no modification.
 A programmer can easily create his own
function.
 It can be used repeatedly in different
application.
 “C” program basically collection of function.
 The function are supported by “C” library.
 Function can be added to “C” library
continuously.
 There are only 32 keywords in ”C”.
 27 keywords are given by Ritchie.
 5 is added by ANSI.
 The strength of “C” lies in its in-built function.
 Unix system provides as large number of “C”
function.
 Some function are used in operation.
 Other are for specialized in their application.
 Keywords are the
words whose
meaning has
already been
explained to the C
compiler.
 There are only 32
keywords available
in C.
 The keywords are
also called
‘Reserved words’.
 A character denotes any alphabet, digit or
special symbol used to represent
information.
 Following are the valid alphabets, numbers
and special symbols allowed in C:
 Alphabets - A, B, ….., Y, Z a, b, ……, y, z
 Digits - 0, 1, 2, 3, 4, 5, 6, 7, 8, 9
 Special symbols - ~ ‘ ! @ # % ^ & * ( ) _ - +
= |  { } [ ] : ; " ' < > , . ? /
 C is case sensitive means variable named "COUNTER" is different from
a variable named "counter".
 All keywords are lowercased.
 Keywords cannot be used for any other purpose (like variable names).
 Every C statement must end with a ”;”. Thus “;” acts as a statement
terminator.
 First character must be an alphabet or underscore, no special symbol
other than an underscore, no commas or blank spaces are allowed with
in a variable, constant or keyword.
 Blank spaces may be inserted between two words to improve the
readability of the statement. However, no blank spaces are allowed
within a variable, constant or keyword.
 Variable must be declared before it is used in the program.
 File should be have the extension .c
 Program need to be compiled before execution.
 Data type defines a set
of values that a variable
can store along with a
set of operations that
can be performed on it.
 Common data types are:
 int - integer
 char - character
 long - long integer
 float - float number
 double - long float
 a - Bell
 n - New line
 r - Carriage return
 b - Backspace
 f - Form feed
 t - Horizontal tab
 " - Quotation mark
 v - Vertical tab
 ' - Apostrophe
  - Backslash
 ? - Question mark
 0 - Null
 scanf function used to receiving input from user.
 Format string contains placeholders for variables that we
intend to receive from user.
 A”&” sign comes before each variable name that comes in
variable listing.
Note: You are not allowed to insert any additional characters in
format string other than placeholders and some special
characters. Entering even a space or other undesired
character will cause your program to work incorrectly and
the results will be unexpected. So make sure you just insert
placeholder characters in scanf format string.
 Kanetkar, P.Y. “Let Us C” Seventh Edition
2007, pp. 34-37, BPB Publications, New
Delhi-1.
 Sharan, B. V. and Jagdeesh, G. “Computer
Fundamentals And programming in C” First
Edition 2004, pp. 07-16 SMT. Sumitra
Handa, SatyaPrakashans, New Delhi.
Introduction to C Programming

More Related Content

What's hot

Introduction to C Programming - I
Introduction to C Programming - I Introduction to C Programming - I
Introduction to C Programming - I
vampugani
 
Chapter3
Chapter3Chapter3
Chapter3
Kamran
 
Introduction to C programming
Introduction to C programmingIntroduction to C programming
Introduction to C programming
Kathmandu University
 
C tokens
C tokensC tokens
C tokens
Manu1325
 
Unit 4 Foc
Unit 4 FocUnit 4 Foc
Unit 4 Foc
JAYA
 
Features of c
Features of cFeatures of c
Features of c
Hitesh Kumar
 
C notes by m v b reddy(gitam)imp notes all units notes 5 unit order
C notes by m v b  reddy(gitam)imp  notes  all units notes  5 unit orderC notes by m v b  reddy(gitam)imp  notes  all units notes  5 unit order
C notes by m v b reddy(gitam)imp notes all units notes 5 unit orderMalikireddy Bramhananda Reddy
 
C language
C languageC language
C language
Yasir Khan
 
C programming
C programmingC programming
C programming
Rounak Samdadia
 
C programming language Reference Note
C programming language Reference NoteC programming language Reference Note
C programming language Reference Note
Chetan Thapa Magar
 
Programming in C- Introduction
Programming in C- IntroductionProgramming in C- Introduction
Programming in C- Introduction
savitamhaske
 
C programming languag for cse students
C programming languag for cse studentsC programming languag for cse students
C programming languag for cse students
Abdur Rahim
 
Javascript by Yahoo
Javascript by YahooJavascript by Yahoo
Javascript by Yahoobirbal
 
Overview of c#
Overview of c#Overview of c#
Overview of c#
Prasanna Kumar SM
 

What's hot (19)

Introduction to C Programming - I
Introduction to C Programming - I Introduction to C Programming - I
Introduction to C Programming - I
 
Programming in c
Programming in cProgramming in c
Programming in c
 
C languaGE UNIT-1
C languaGE UNIT-1C languaGE UNIT-1
C languaGE UNIT-1
 
C tutorial
C tutorialC tutorial
C tutorial
 
C LANGUAGE NOTES
C LANGUAGE NOTESC LANGUAGE NOTES
C LANGUAGE NOTES
 
Chapter3
Chapter3Chapter3
Chapter3
 
C notes
C notesC notes
C notes
 
Introduction to C programming
Introduction to C programmingIntroduction to C programming
Introduction to C programming
 
C tokens
C tokensC tokens
C tokens
 
Unit 4 Foc
Unit 4 FocUnit 4 Foc
Unit 4 Foc
 
Features of c
Features of cFeatures of c
Features of c
 
C notes by m v b reddy(gitam)imp notes all units notes 5 unit order
C notes by m v b  reddy(gitam)imp  notes  all units notes  5 unit orderC notes by m v b  reddy(gitam)imp  notes  all units notes  5 unit order
C notes by m v b reddy(gitam)imp notes all units notes 5 unit order
 
C language
C languageC language
C language
 
C programming
C programmingC programming
C programming
 
C programming language Reference Note
C programming language Reference NoteC programming language Reference Note
C programming language Reference Note
 
Programming in C- Introduction
Programming in C- IntroductionProgramming in C- Introduction
Programming in C- Introduction
 
C programming languag for cse students
C programming languag for cse studentsC programming languag for cse students
C programming languag for cse students
 
Javascript by Yahoo
Javascript by YahooJavascript by Yahoo
Javascript by Yahoo
 
Overview of c#
Overview of c#Overview of c#
Overview of c#
 

Similar to Introduction to C Programming

Unit 2 introduction to c programming
Unit 2   introduction to c programmingUnit 2   introduction to c programming
Unit 2 introduction to c programming
Mithun DSouza
 
C language ppt
C language pptC language ppt
C language ppt
Ğäùråv Júñêjå
 
UNIT 1 NOTES.docx
UNIT 1 NOTES.docxUNIT 1 NOTES.docx
UNIT 1 NOTES.docx
Revathiparamanathan
 
Lecture 01 2017
Lecture 01 2017Lecture 01 2017
Lecture 01 2017
Jesmin Akhter
 
history of c.ppt
history of c.ppthistory of c.ppt
history of c.ppt
arpanabharani
 
C programming.pdf
C programming.pdfC programming.pdf
C programming.pdf
JitendraYadav351971
 
Cnotes
CnotesCnotes
C Lang notes.ppt
C Lang notes.pptC Lang notes.ppt
C Lang notes.ppt
ShivanadhuniBhanuPra
 
Copy of UNIT 2 -- Basics Of Programming.pptx
Copy of UNIT 2 -- Basics Of Programming.pptxCopy of UNIT 2 -- Basics Of Programming.pptx
Copy of UNIT 2 -- Basics Of Programming.pptx
rahulrajbhar06478
 
C Programming Unit-1
C Programming Unit-1C Programming Unit-1
C Programming Unit-1
Vikram Nandini
 
C PROGRAMMING LANGUAGE.pptx
 C PROGRAMMING LANGUAGE.pptx C PROGRAMMING LANGUAGE.pptx
C PROGRAMMING LANGUAGE.pptx
AnshSrivastava48
 
Unit-1 (introduction to c language).pptx
Unit-1 (introduction to c language).pptxUnit-1 (introduction to c language).pptx
Unit-1 (introduction to c language).pptx
saivasu4
 
Aniket tore
Aniket toreAniket tore
Aniket tore
anikettore1
 
Chapter 3(1)
Chapter 3(1)Chapter 3(1)
Chapter 3(1)
TejaswiB4
 
unit 1 cpds.pptx
unit 1 cpds.pptxunit 1 cpds.pptx
unit 1 cpds.pptx
madhurij54
 
Msc prev updated
Msc prev updatedMsc prev updated
Msc prev updated
mshoaib15
 
Features and Fundamentals of C Language for Beginners
Features and Fundamentals of C Language for BeginnersFeatures and Fundamentals of C Language for Beginners
Features and Fundamentals of C Language for Beginners
Chandrakant Divate
 
Msc prev completed
Msc prev completedMsc prev completed
Msc prev completed
mshoaib15
 
unit2.pptx
unit2.pptxunit2.pptx
unit2.pptx
sscprep9
 
C presentation book
C presentation bookC presentation book
C presentation book
krunal1210
 

Similar to Introduction to C Programming (20)

Unit 2 introduction to c programming
Unit 2   introduction to c programmingUnit 2   introduction to c programming
Unit 2 introduction to c programming
 
C language ppt
C language pptC language ppt
C language ppt
 
UNIT 1 NOTES.docx
UNIT 1 NOTES.docxUNIT 1 NOTES.docx
UNIT 1 NOTES.docx
 
Lecture 01 2017
Lecture 01 2017Lecture 01 2017
Lecture 01 2017
 
history of c.ppt
history of c.ppthistory of c.ppt
history of c.ppt
 
C programming.pdf
C programming.pdfC programming.pdf
C programming.pdf
 
Cnotes
CnotesCnotes
Cnotes
 
C Lang notes.ppt
C Lang notes.pptC Lang notes.ppt
C Lang notes.ppt
 
Copy of UNIT 2 -- Basics Of Programming.pptx
Copy of UNIT 2 -- Basics Of Programming.pptxCopy of UNIT 2 -- Basics Of Programming.pptx
Copy of UNIT 2 -- Basics Of Programming.pptx
 
C Programming Unit-1
C Programming Unit-1C Programming Unit-1
C Programming Unit-1
 
C PROGRAMMING LANGUAGE.pptx
 C PROGRAMMING LANGUAGE.pptx C PROGRAMMING LANGUAGE.pptx
C PROGRAMMING LANGUAGE.pptx
 
Unit-1 (introduction to c language).pptx
Unit-1 (introduction to c language).pptxUnit-1 (introduction to c language).pptx
Unit-1 (introduction to c language).pptx
 
Aniket tore
Aniket toreAniket tore
Aniket tore
 
Chapter 3(1)
Chapter 3(1)Chapter 3(1)
Chapter 3(1)
 
unit 1 cpds.pptx
unit 1 cpds.pptxunit 1 cpds.pptx
unit 1 cpds.pptx
 
Msc prev updated
Msc prev updatedMsc prev updated
Msc prev updated
 
Features and Fundamentals of C Language for Beginners
Features and Fundamentals of C Language for BeginnersFeatures and Fundamentals of C Language for Beginners
Features and Fundamentals of C Language for Beginners
 
Msc prev completed
Msc prev completedMsc prev completed
Msc prev completed
 
unit2.pptx
unit2.pptxunit2.pptx
unit2.pptx
 
C presentation book
C presentation bookC presentation book
C presentation book
 

Recently uploaded

Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 

Recently uploaded (20)

Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 

Introduction to C Programming

  • 1.
  • 2.  What is “C” ?  Feature of “C” Program  “C” Keywords  “C” Character Set  Rules for Writing, Compiling & Executing “C” Program  Data types & Placeholders  Control characters  Receiving input values from keyboard  Basic “C” Program example  References
  • 3.  “C” is a programming language developed at AT &T’s Bell Laboratories of USA in 1972 by Dennis Ritchie.  Any programming language can be divided into 2 categories:  Problem oriented (HLL)  Machine oriented (LLL)  But “C” is considered as Middle Level Language.  “C” is modular, portable, reusable.
  • 4.  General purpose language  Limited no. of keyword  Code Re-usability & Ability to customize and extend  Portability  Structured language
  • 5.  Make it ideal language for system programming.  It can also be used for business & scientific application.  ANSI established a standard for “C” in 1983.  The ability of “C” is to manipulate bits, byte & addresses.  It is adopted in later 1990.
  • 6.  It has ability to divide & hide all the information & instruction.  Code can be partitioned in “C” using functions or code block.  C is a well structured language compare to other.
  • 7.  Portability is the ability to port or use the software written.  One computer C program can be reused.  By modification or no modification.
  • 8.  A programmer can easily create his own function.  It can be used repeatedly in different application.  “C” program basically collection of function.  The function are supported by “C” library.  Function can be added to “C” library continuously.
  • 9.  There are only 32 keywords in ”C”.  27 keywords are given by Ritchie.  5 is added by ANSI.  The strength of “C” lies in its in-built function.  Unix system provides as large number of “C” function.  Some function are used in operation.  Other are for specialized in their application.
  • 10.  Keywords are the words whose meaning has already been explained to the C compiler.  There are only 32 keywords available in C.  The keywords are also called ‘Reserved words’.
  • 11.  A character denotes any alphabet, digit or special symbol used to represent information.  Following are the valid alphabets, numbers and special symbols allowed in C:  Alphabets - A, B, ….., Y, Z a, b, ……, y, z  Digits - 0, 1, 2, 3, 4, 5, 6, 7, 8, 9  Special symbols - ~ ‘ ! @ # % ^ & * ( ) _ - + = | { } [ ] : ; " ' < > , . ? /
  • 12.  C is case sensitive means variable named "COUNTER" is different from a variable named "counter".  All keywords are lowercased.  Keywords cannot be used for any other purpose (like variable names).  Every C statement must end with a ”;”. Thus “;” acts as a statement terminator.  First character must be an alphabet or underscore, no special symbol other than an underscore, no commas or blank spaces are allowed with in a variable, constant or keyword.  Blank spaces may be inserted between two words to improve the readability of the statement. However, no blank spaces are allowed within a variable, constant or keyword.  Variable must be declared before it is used in the program.  File should be have the extension .c  Program need to be compiled before execution.
  • 13.  Data type defines a set of values that a variable can store along with a set of operations that can be performed on it.  Common data types are:  int - integer  char - character  long - long integer  float - float number  double - long float
  • 14.  a - Bell  n - New line  r - Carriage return  b - Backspace  f - Form feed  t - Horizontal tab  " - Quotation mark  v - Vertical tab  ' - Apostrophe  - Backslash  ? - Question mark  0 - Null
  • 15.  scanf function used to receiving input from user.  Format string contains placeholders for variables that we intend to receive from user.  A”&” sign comes before each variable name that comes in variable listing. Note: You are not allowed to insert any additional characters in format string other than placeholders and some special characters. Entering even a space or other undesired character will cause your program to work incorrectly and the results will be unexpected. So make sure you just insert placeholder characters in scanf format string.
  • 16.
  • 17.
  • 18.  Kanetkar, P.Y. “Let Us C” Seventh Edition 2007, pp. 34-37, BPB Publications, New Delhi-1.  Sharan, B. V. and Jagdeesh, G. “Computer Fundamentals And programming in C” First Edition 2004, pp. 07-16 SMT. Sumitra Handa, SatyaPrakashans, New Delhi.