2. Which of the following explicit data type conversions in the code above is unsafe? [A] (float) (b / a)

Size: px
Start display at page:

Download "2. Which of the following explicit data type conversions in the code above is unsafe? [A] (float) (b / a)"

Transcription

1 1. Given that a and b are integer variables and both variables are currently storing a positive value, and a is greater than b, which of the following is FALSE about the result of a % b? [A]The result cannot be greater than b. [B] The result cannot equal b. [C] The result cannot be 0. Use the code below for problems 2 3 int a = 3; int b = 5; int c; float d = 3.75; c = (float) (b / a); c += a / (float) b + 0.5; c = (int) d / b + 0.5; printf("c = %d\n", c); 2. Which of the following explicit data type conversions in the code above is unsafe? [A] (float) (b / a) [C] (int) d [B] (float) b 3. What is the output generated by the code above? [A] c = 0 [B] c = 1 [C] c = 2 4. Which of the following is used to represent the user-defined functions and the order in which they are called in a program? [A] A Flowchart [C] A Specification Chart [B] A Structure Chart [D]None of the Above 5. According to course standards, which of the following should always be given local scope? [A]Function prototypes. [C] Variables. [B] Function definitions. 6. Which of the following is TRUE regarding scope? [A]It is poor programming style to reuse identifiers within the same scope. [B] It is poor programming style to reuse identifiers with non-overlapping scope. [C] It is always poor programming style to reuse identifiers. 7. Which of the following can be detected by the compiler? [A]A reference to an array index value that exceeds the defined limits of the array. [B] A loop control expression that will result in an infinite loop. [C] A function call that includes fewer parameters than was specified in the function prototype. 8. Which of the following refers to the act of identifying individual sub-tasks in a larger problem which will be ultimately coded as a user-defined function? [A] Prototyping [C] Declaring [B] Factoring

2 int month = 3; int year = 1900; int day = 17; Use the code below for problem #9 switch(month) case 5: day += 30; case 4: day += 31; case 3: day += 28 + ((!(year % 4) && (year % 100))!(year % 400)); case 2: day += 31; printf("day = %d\n", day); 9. What is the output generated by the code above? [A] day = 74 [B] day = 75 [C] day = 76 int a = 3; int b = 5; int result; Use the code below for problem #10 if(a && ++b - 6) result = 1; else if(a > 0) result = 2; else result = 0; printf("a = %d b = %d\n", a, b); 10. Which of the following is the output of the print statement of the code above? [A] a = 2 b = 6 [C] a = 0 b = 0 [B] a = 3 b = Which of the following statements regarding selection constructs is FALSE? [A] The default in a switch statement is not required. [B] No two else if's can represent the same condition. [C] Conditional expressions can be used with floating-point or integer data types. Use the code below for problem #12 int c = -1; int d = 1; int result; result = --d && ++c; printf("c = %d d = %d\n", c, d); 12. What is the output generate by the code segment on the left? [A] c = 0 d = 0 [B] c = -1 d = 0 [C] c = 0 d = -1

3 #define MULTIPLE 0 Use the code below for problems int main() int x = 35; int y = 7; int z = -1; switch(x % y == MULTIPLE) case MULTIPLE: z = 1; break; default: z = 0; break; printf("z = %d\n", z); return(0); 13. Which of the following switch statement rules is being violated by the code segment above? [A] The control expression must be integral. [B] Each case label is the keyword case followed by a constant expression. [C] No two case labels can have the same value. 14. Which of the following is the output generated by the code segment above? [A] z = -1 [C] z = 1 [B] z = Which of the following logical expressions is the complement of the expression below? a > b && a > c [A] a > b a > c [B] a < b a < c [C] a <= b && a <= c 16. Which of the following logical expressions is the complement of the expression below? a!= b b!= c a!= c [A] a == b b == c a == c [B] a!= b && b!= c && a!= c int x = 3; int y = 2; int z = 3; Use the code below for problem #17 printf("result #1 = %d\n", x <= 3 y >= 2 && z!= 3); printf("result #2 = %d\n", x <= 3 (y >= 2 && z!= 3)); printf("result #3 = %d\n", (x <= 3 y >= 2) && z!= 3); 17. Which of the following is TRUE regarding the code segment above? [A] All three results will generate the same value. [B] Only results #1 and #3 will generate the same value. [C] Only results #1 and #2 will generate the same value. [C] a == b && b == c && a == c

4 Use the code below for problems int x = 3; int y = 2; int z = 1; int a = z; int b; a = x!= y && y!= z? x : y; b = z > 1? x : z < 1? y : z; 18. What is the first line of output generated by the code segment on the left? [A] a = 1 [B] a = 2 [C] a = 3 printf("a = %d\n", a); printf("b = %d\n", b); 19. What is the second line of output generated by the code segment above? [A] b = 1 [C] b = 3 [B] b = 2 Use the code below for problems #include<stdio.h> 2 #include<math.h> 3 4 int main() 5 6 int a = 0; 7 int b = 11010; 8 int c = 0; 9 10 do c += b % 10 * pow(2, a); 13 a++; 14 b /= 10; 15 while(b!= 0); printf("a = %d\n", a); 18 printf("c = %d\n", c); return(0); What is the first line of output generated by the program above? [A] a = 7 [C] a = 5 [B] a = What is the second line of output generated by the program above? [A] c = 26 [C] c = 28 [B] c = Which of the following is NEVER a value stored by the integer variable b during the execution of the above program? [A] 1101 [C] 11 [B] Which of the following would produce the same results if it replaced the expression on line #12 in the program above? [A] c += pow(2, a) * b % 10; [C] c = b % 10 * pow(2, a) + c; [B] c = b % 10 + c * pow(2, a);

5 int sz = 5; int row; int col; Use the code below for problems for(row = 0; row <= sz; row++) for(col = 0; col <= sz; col++) if(col < sz - (sz - row)) printf("%d", sz); else printf("%c", '$'); printf("\n"); 24. Which of the following is the first line of output generated by the code segment above? [A] $$$$$$ [C] 5$$$$$ [B] $$$$$ 25. Which of the following is the last line of output generated by the code segment above? [A] 55555$ [C] [B] What is the total number of characters ($ and 5) displayed to the monitor? [A]30 [C] 25 [B] 36

6 #include<stdio.h> #include<string.h> Use the code below for problems #define SIZE 31 int main() char str1[size] = "Test"; char str2[size] = "Tests"; char str3[size] = "tests"; char str4[size] = "Tset"; int ct = 0; printf("compare = %d\n", strcmp(str1, str4)); strcmp(str1, str2) > 0? ct++ : ct--; strcmp(str1, str3) > 0? ct++ : ct--; printf("ct = %d\n", ct); return(0); 27. Which of the following describes the integer output of the first print statement in the program above? [A]The integer will be a positive value. [B] The integer will be zero. [C] The integer will be a negative value. 28. What is the output of the second print statement in the program above? [A] ct = -2 [B] ct = 0 [C] ct = 2

7 Use the code below for problems #include<stdio.h> #include<math.h> int makecount(int); int nexttest(int, int); int main() int x = 37473; int y; int z; y = makecount(x); z = nexttest(x, y); printf("y = %d\n", y); printf("z = %d\n", z); 29. What is the first line of output generated by the program on the left? [A] y = 4 [B] y = 5 [C] y = What is the second line of output generated by the program on the left? [A] z = 1 [B] z = 0 [C] z = -1 return(0); int makecount(int x) int ct = 0; do ct++; x /= 10; while(x > 0); return(ct); int nexttest(int x, int y) int z = 1; int ct = 1; int a; int b; do a = x / (int)pow(10, ct - 1) % 10; b = x / (int)pow(10, y - ct) % 10; if(a!= b) z--; while(z == 1 && ct++ <= y / 2); return(z); 31. What is the second line of output generated by the program above if the integer variable x in main was initialized to ? [A] z = 1 [B] z = 0 [C] z = -1

8 #define SIZE 11 Use the code below for problem #32 void addnum(int); int main() int x[11] = 3, 2, 5, 4, 11, 8, 9, 10, 7, 6, 1; int i; for(i = SIZE; i > 0; --i) addnum(x[i - 1]); printf("x[3] = %d\n", x[3]); return(0); void addnum(int x) x++; 32. What is the output generated by the code above? [A] x[3] = 4 [B] x[3] = 5 [C] x[3] = 6 #define SIZE 11 Use the code below for problem #33 void addnum(int[]); int main() int x[11] = 3, 2, 5, 4, 11, 8, 9, 10, 7, 6, 1; addnum(x); printf("x[3] = %d\n", x[3]); return(0); void addnum(int x[]) int i; for(i = 0; i < SIZE; i++) x[i] = x[i] + 1; 33. What is the output generated by the code above? [A] x[3] = 6 [B] x[3] = 5 [C] x[3] = 4

9 #include<stdio.h> Use the code below for problem #34 int main() int x[5] = 21, 27, 29, 33, 37; int i; int j; int ct = 0; for(i = 0; i < 5; i++) for(j = 2; j <= x[i] / 2; j++) if(x[i] % j == 0) j = x[i]; if(x[i]!= j - 1) ct++; printf("ct = %d\n", ct); return(0); 34. What is the output generated by the code above? [A] ct = 4 [B] ct = 3 [C] ct = 2 #include<stdio.h> Use the code below for problem #35 int main() int array[5] = 5, 4, 3, 2, 1; int i = 3; while(i >= 0) array[i] += array[i + 1] % array[i]; i--; return(0); 35. Which value is NOT found in the array after the code above has been executed? [A] 7 [B] 5 [C] 3

10 int a = 3; int b; int *x; int *y; Use the code segment below for problems x = &a; y = x; *x = 1; a = 5; printf("*x = %3d *y = %3d a = %3d\n", *x, *y, a); x = &b; b = 11; printf("*x = %3d *y = %3d a = %3d b = %3d\n", *x, *y, a, b); 36. What is the output generated by the first print statement in the code segment above? [A] *x = 1 *y = 1 a = 5 [B] *x = 5 *y = 1 a = 5 [C] *x = 5 *y = 5 a = What is the output generated by the second print statement in the code segment above? [A] *x = 11 *y = 11 a = 5 b = 11 [B] *x = 11 *y = 5 a = 5 b = 11 [C] *x = 5 *y = 1 a = 5 b = Which of the following is FALSE regarding arrays? [A]All elements of an array share a single data type. [B] All elements of an array share a single variable name. [C] All elements of an array have a unique index value. Use the array below for problem #39 int data[13] = 10, 10, 10, 14, 15, 16, 18, 20, 21, 24, 24, 24, 24; 39. Which of the following represents the number of comparisons output from lab #12 given the array above and the target value 24? [A] Total number of comparisons required: 5 [B] Total number of comparisons required: 6 [C] Total number of comparisons required: 7 Use the array below for problem #40 int data[13] = 10, 10, 10, 14, 15, 16, 18, 20, 21, 21, 21, 25, 33; 40. Which of the following represents the number of comparisons output from lab #12 given the array above and the target value 15? [A] Total number of comparisons required: 3 [B] Total number of comparisons required: 4 [C] Total number of comparisons required: 5

11 Use the array below for problem #41 int data[13] = 10, 5, 10, 8, 1, 1, 8, 8, 21, 21, 21, 5, 3; 41. Which of the following represents the number of comparisons output from lab #12 given the array above and the target value 1? [A] Total number of comparisons required: 13 [B] Total number of comparisons required: 5 [C] Total number of comparisons required: 6 Use the array below for problems int array[13] = 10, 12, 13, 14, 15, 16, 18, 20, 21, 23, 24, 25, 33; 42. Which of the following represents the values of the variable mid in the binary search algorithm when applying that algorithm to seek the target value 14? [A] 6, 2, 3 [C] 6, 3, 4 [B] 6, 2, 4, Which of the following represents the values of the variable mid in the binary search algorithm when applying that algorithm to seek the target value 22? [A] 6, 9, 8 [C] 6, 9, 7, 8 [B] 6, 9, Which of the following is used to redirect input from a file to the executable (a.out) file? [A] > [C] < [B] << 45. Which of the following is false regarding the scanf function in the C programming language and the fscanf function in MATLAB (or Octave)? [A] The fscanf function in MATLAB (or Octave) has no address list similar to the scanf function in C. [B] The fscanf function in MATLAB (or Octave) includes the name of the file handle variable to indicate the source of the data. [C] The format string in C's scanf function uses double quotes while the format string in MATLAB's fscanf function uses single quotes. Given the following array: int x[7] = 8, 7, 2, 4, 3, 1, 5; And the array after two passes through one of the three sorting algorithms: Which sorting algorithm has been applied? [A] Selection Sort [B] Insertion Sort [C] Bubble Sort [D] More than one of the above.

12 Given the following array: int x[7] = 8, 7, 2, 4, 3, 1, 5; And the array after two passes through one of the three sorting algorithms: Which sorting algorithm has been applied? [A] Selection Sort [B] Insertion Sort [C] Bubble Sort [D] More than one of the above. Given the following array: int x[7] = 3, 5, 4, 6, 8, 7, 9; And the array after two passes through one of the three sorting algorithms: Which sorting algorithm has been applied? [A] Selection Sort [B] Insertion Sort [C] Bubble Sort [D] More than one of the above.

13 Given the following array: int x[7] = 3, 5, 4, 6, 8, 7, 9; And the array after two passes through one of the three sorting algorithms: Which sorting algorithm has been applied? [A] Selection Sort [B] Insertion Sort [C] Bubble Sort [D] More than one of the above. 50. What should you be sure to do when contacting the instructor regarding your course grade? [A]Wait until minimums for each letter grade are announced. [B] Be sure to use your Purdue address and state which course you were taking. [C] Provide specific concerns you have with specific assignments as grades in the course will be based on points earn and not factors external to the course. [D]All of the above.

14 This page lists C operators in order of precedence (highest to lowest). Their associativity indicates in what order operators of equal precedence in an expression are applied. Operator Description Associativity () []. -> ! ~ (type) * & sizeof Parentheses (function call) (see Note 1) Brackets (array subscript) Member selection via object name Member selection via pointer Postfix increment/decrement (see Note 2) Prefix increment/decrement Unary plus/minus Logical negation/bitwise complement Cast (change type) Dereference Address Determine size in bytes left-to-right right-to-left * / % Multiplication/division/modulus left-to-right + - Addition/subtraction left-to-right << >> Bitwise shift left, Bitwise shift right left-to-right < <= > >= Relational less than/less than or equal to Relational greater than/greater than or equal to left-to-right ==!= Relational is equal to/is not equal to left-to-right & Bitwise AND left-to-right ^ Bitwise exclusive OR left-to-right Bitwise inclusive OR left-to-right && Logical AND left-to-right Logical OR left-to-right?: Ternary conditional right-to-left = += -= *= /= %= &= ^= = <<= >>= Assignment Addition/subtraction assignment Multiplication/division assignment Modulus/bitwise AND assignment Bitwise exclusive/inclusive OR assignment Bitwise shift left/right assignment right-to-left, Comma (separate expressions) left-to-right

15 ASCII Table Char Dec Char Dec Char Dec Char Dec (nul) 0 space 64 ` 96 (soh) 1! 33 A 65 a 97 (stx) 2 " 34 B 66 b 98 (etx) 3 # 35 C 67 c 99 (eot) 4 $ 36 D 68 d 100 (enq) 5 % 37 E 69 e 101 (ack) 6 & 38 F 70 f 102 (bel) 7 39 G 71 g 103 (bs) 8 ( 40 H 72 h 104 (ht) 9 ) 41 I 73 i 105 (nl) 10 * 42 J 74 j 106 (vt) K 75 k 107 (np) 12, 44 L 76 l 108 (cr) M 77 m 109 (so) N 78 n 110 (si) 15 / 47 O 79 o 111 (dle) P 80 p 112 (dc1) Q 81 q 113 (dc2) R 82 r 114 (dc3) S 83 s 115 (dc4) T 84 t 116 (nak) U 85 u 117 (syn) V 86 v 118 (etb) W 87 w 119 (can) X 88 x 120 (em) Y 89 y 121 (sub) 26 : 58 Z 90 z 122 (esc) 27 ; 59 [ (fs) 28 < 60 \ (gs) 29 = 61 ] (rs) 30 > 62 ^ 94 ~ 126 (us) 31? 63 _ 95 (del) 127

16 Lab Time Lab Day Location and TA Section 7:30 Tuesday SC 189 Jessica Sparks :30 Tuesday SC 189 Sebastian Lee :30 Tuesday SC 189 Amir Warsanah :30 Tuesday SC 189 Nicki Schrank :30 Wednesday SC 189 Kuan-Po Chen :30 Wednesday SC 189 Caleb Bean :30 Wednesday SC 189 Alyssa Welles :30 Thursday SC 189 Ryne Rayburn :30 Thursday SC 289 Xi Luo :30 Thursday SC 189 Mike James :30 Thursday SC 189 John Grabarczyk 2101

Numeral Systems. The number twenty-five can be represented in many ways: Decimal system (base 10): 25 Roman numerals:

Numeral Systems. The number twenty-five can be represented in many ways: Decimal system (base 10): 25 Roman numerals: Numeral Systems Which number is larger? 25 8 We need to distinguish between numbers and the symbols that represent them, called numerals. The number 25 is larger than 8, but the numeral 8 above is larger

More information

Memory is implemented as an array of electronic switches

Memory is implemented as an array of electronic switches Memory Structure Memory is implemented as an array of electronic switches Each switch can be in one of two states 0 or 1, on or off, true or false, purple or gold, sitting or standing BInary digits (bits)

More information

ASCII Code. Numerous codes were invented, including Émile Baudot's code (known as Baudot

ASCII Code. Numerous codes were invented, including Émile Baudot's code (known as Baudot ASCII Code Data coding Morse code was the first code used for long-distance communication. Samuel F.B. Morse invented it in 1844. This code is made up of dots and dashes (a sort of binary code). It was

More information

BI-300. Barcode configuration and commands Manual

BI-300. Barcode configuration and commands Manual BI-300 Barcode configuration and commands Manual 1. Introduction This instruction manual is designed to set-up bar code scanner particularly to optimize the function of BI-300 bar code scanner. Terminal

More information

URL encoding uses hex code prefixed by %. Quoted Printable encoding uses hex code prefixed by =.

URL encoding uses hex code prefixed by %. Quoted Printable encoding uses hex code prefixed by =. ASCII = American National Standard Code for Information Interchange ANSI X3.4 1986 (R1997) (PDF), ANSI INCITS 4 1986 (R1997) (Printed Edition) Coded Character Set 7 Bit American National Standard Code

More information

This is great when speed is important and relatively few words are necessary, but Max would be a terrible language for writing a text editor.

This is great when speed is important and relatively few words are necessary, but Max would be a terrible language for writing a text editor. Dealing With ASCII ASCII, of course, is the numeric representation of letters used in most computers. In ASCII, there is a number for each character in a message. Max does not use ACSII very much. In the

More information

Xi2000 Series Configuration Guide

Xi2000 Series Configuration Guide U.S. Default Settings Sequence Reset Scanner Xi2000 Series Configuration Guide Auto-Sense Mode ON UPC-A Convert to EAN-13 OFF UPC-E Lead Zero ON Save Changes POS-X, Inc. 2130 Grant St. Bellingham, WA 98225

More information

DEBT COLLECTION SYSTEM ACCOUNT SUBMISSION FILE

DEBT COLLECTION SYSTEM ACCOUNT SUBMISSION FILE CAPITAL RESOLVE LTD. DEBT COLLECTION SYSTEM ACCOUNT SUBMISSION FILE (DCS-ASF1107-7a) For further technical support, please contact Clive Hudson (IT Dept.), 01386 421995 13/02/2012 Account Submission File

More information

Chapter 1. Binary, octal and hexadecimal numbers

Chapter 1. Binary, octal and hexadecimal numbers Chapter 1. Binary, octal and hexadecimal numbers This material is covered in the books: Nelson Magor Cooke et al, Basic mathematics for electronics (7th edition), Glencoe, Lake Forest, Ill., 1992. [Hamilton

More information

Voyager 9520/40 Voyager GS9590 Eclipse 5145

Voyager 9520/40 Voyager GS9590 Eclipse 5145 Voyager 9520/40 Voyager GS9590 Eclipse 5145 Quick Start Guide Aller à www.honeywellaidc.com pour le français. Vai a www.honeywellaidc.com per l'italiano. Gehe zu www.honeywellaidc.com für Deutsch. Ir a

More information

plc numbers - 13.1 Encoded values; BCD and ASCII Error detection; parity, gray code and checksums

plc numbers - 13.1 Encoded values; BCD and ASCII Error detection; parity, gray code and checksums plc numbers - 3. Topics: Number bases; binary, octal, decimal, hexadecimal Binary calculations; s compliments, addition, subtraction and Boolean operations Encoded values; BCD and ASCII Error detection;

More information

Create!form Barcodes. User Guide

Create!form Barcodes. User Guide Create!form Barcodes User Guide Barcodes User Guide Version 6.3 Copyright Bottomline Technologies, Inc. 2008. All Rights Reserved Printed in the United States of America Information in this document is

More information

Chapter 5. Binary, octal and hexadecimal numbers

Chapter 5. Binary, octal and hexadecimal numbers Chapter 5. Binary, octal and hexadecimal numbers A place to look for some of this material is the Wikipedia page http://en.wikipedia.org/wiki/binary_numeral_system#counting_in_binary Another place that

More information

CHAPTER 8 BAR CODE CONTROL

CHAPTER 8 BAR CODE CONTROL CHAPTER 8 BAR CODE CONTROL CHAPTER 8 BAR CODE CONTROL - 1 CONTENTS 1. INTRODUCTION...3 2. PRINT BAR CODES OR EXPANDED CHARACTERS... 4 3. DEFINITION OF PARAMETERS... 5 3.1. Bar Code Mode... 5 3.2. Bar Code

More information

BARCODE READER V 2.1 EN USER MANUAL

BARCODE READER V 2.1 EN USER MANUAL BARCODE READER V 2.1 EN USER MANUAL INSTALLATION OF YOUR DEVICE PS-2 Connection RS-232 Connection (need 5Volts power supply) 1 INSTALLATION OF YOUR DEVICE USB Connection 2 USING THIS MANUAL TO SETUP YOUR

More information

Symbols in subject lines. An in-depth look at symbols

Symbols in subject lines. An in-depth look at symbols An in-depth look at symbols What is the advantage of using symbols in subject lines? The age of personal emails has changed significantly due to the social media boom, and instead, people are receving

More information

ASCII CODES WITH GREEK CHARACTERS

ASCII CODES WITH GREEK CHARACTERS ASCII CODES WITH GREEK CHARACTERS Dec Hex Char Description 0 0 NUL (Null) 1 1 SOH (Start of Header) 2 2 STX (Start of Text) 3 3 ETX (End of Text) 4 4 EOT (End of Transmission) 5 5 ENQ (Enquiry) 6 6 ACK

More information

Sources: On the Web: Slides will be available on:

Sources: On the Web: Slides will be available on: C programming Introduction The basics of algorithms Structure of a C code, compilation step Constant, variable type, variable scope Expression and operators: assignment, arithmetic operators, comparison,

More information

The ASCII Character Set

The ASCII Character Set The ASCII Character Set The American Standard Code for Information Interchange or ASCII assigns values between 0 and 255 for upper and lower case letters, numeric digits, punctuation marks and other symbols.

More information

BAR CODE 39 ELFRING FONTS INC.

BAR CODE 39 ELFRING FONTS INC. ELFRING FONTS INC. BAR CODE 39 This package includes 18 versions of a bar code 39 font in scalable TrueType and PostScript formats, a Windows utility, Bar39.exe, that helps you make bar codes, and Visual

More information

Characters & Strings Lesson 1 Outline

Characters & Strings Lesson 1 Outline Outline 1. Outline 2. Numeric Encoding of Non-numeric Data #1 3. Numeric Encoding of Non-numeric Data #2 4. Representing Characters 5. How Characters Are Represented #1 6. How Characters Are Represented

More information

Model 200 / 250 / 260 Programming Guide

Model 200 / 250 / 260 Programming Guide Model 200 / 250 / 260 Programming Guide E-SEEK Inc. R & D Center 9471 Ridgehaven Court #E San Diego, CA 92123 Tel: 858-495-1900 Fax: 858-495-1901 Sales & Marketing 245 Fischer Ave #D5 Costa Mesa, CA 92626

More information

Embedded Systems. Review of ANSI C Topics. A Review of ANSI C and Considerations for Embedded C Programming. Basic features of C

Embedded Systems. Review of ANSI C Topics. A Review of ANSI C and Considerations for Embedded C Programming. Basic features of C Embedded Systems A Review of ANSI C and Considerations for Embedded C Programming Dr. Jeff Jackson Lecture 2-1 Review of ANSI C Topics Basic features of C C fundamentals Basic data types Expressions Selection

More information

Command Emulator STAR Line Mode Command Specifications

Command Emulator STAR Line Mode Command Specifications Line Thermal Printer Command Emulator STAR Line Mode Command Specifications Revision 0.01 Star Micronics Co., Ltd. Special Products Division Table of Contents 1. Command Emulator 2 1-1) Command List 2

More information

Keywords are identifiers having predefined meanings in C programming language. The list of keywords used in standard C are : unsigned void

Keywords are identifiers having predefined meanings in C programming language. The list of keywords used in standard C are : unsigned void 1. Explain C tokens Tokens are basic building blocks of a C program. A token is the smallest element of a C program that is meaningful to the compiler. The C compiler recognizes the following kinds of

More information

DL910 SERIES. Instruction Manual

DL910 SERIES. Instruction Manual DL910 SERIES Instruction Manual DL910 SERIES INSTRUCTION MANUAL ALL RIGHTS RESERVED Datalogic reserves the right to make modifications and improvements without prior notification. Datalogic shall not

More information

TELOCATOR ALPHANUMERIC PROTOCOL (TAP)

TELOCATOR ALPHANUMERIC PROTOCOL (TAP) TELOCATOR ALPHANUMERIC PROTOCOL (TAP) Version 1.8 February 4, 1997 TABLE OF CONTENTS 1.0 Introduction...1 2.0 TAP Operating Environment...1 3.0 Recommended Sequence Of Call Delivery From An Entry Device...2

More information

Security Protection of Software Programs by Information Sharing and Authentication Techniques Using Invisible ASCII Control Codes

Security Protection of Software Programs by Information Sharing and Authentication Techniques Using Invisible ASCII Control Codes International Journal of Network Security, Vol.10, No.1, PP.1 10, Jan. 2010 1 Security Protection of Software Programs by Information Sharing and Authentication Techniques Using Invisible ASCII Control

More information

KITES TECHNOLOGY COURSE MODULE (C, C++, DS)

KITES TECHNOLOGY COURSE MODULE (C, C++, DS) KITES TECHNOLOGY 360 Degree Solution www.kitestechnology.com/academy.php info@kitestechnology.com technologykites@gmail.com Contact: - 8961334776 9433759247 9830639522.NET JAVA WEB DESIGN PHP SQL, PL/SQL

More information

I PUC - Computer Science. Practical s Syllabus. Contents

I PUC - Computer Science. Practical s Syllabus. Contents I PUC - Computer Science Practical s Syllabus Contents Topics 1 Overview Of a Computer 1.1 Introduction 1.2 Functional Components of a computer (Working of each unit) 1.3 Evolution Of Computers 1.4 Generations

More information

Memory management. Announcements. Safe user input. Function pointers. Uses of function pointers. Function pointer example

Memory management. Announcements. Safe user input. Function pointers. Uses of function pointers. Function pointer example Announcements Memory management Assignment 2 posted, due Friday Do two of the three problems Assignment 1 graded see grades on CMS Lecture 7 CS 113 Spring 2008 2 Safe user input If you use scanf(), include

More information

Java Interview Questions and Answers

Java Interview Questions and Answers 1. What is the most important feature of Java? Java is a platform independent language. 2. What do you mean by platform independence? Platform independence means that we can write and compile the java

More information

arrays C Programming Language - Arrays

arrays C Programming Language - Arrays arrays So far, we have been using only scalar variables scalar meaning a variable with a single value But many things require a set of related values coordinates or vectors require 3 (or 2, or 4, or more)

More information

The C Programming Language course syllabus associate level

The C Programming Language course syllabus associate level TECHNOLOGIES The C Programming Language course syllabus associate level Course description The course fully covers the basics of programming in the C programming language and demonstrates fundamental programming

More information

Representação de Caracteres

Representação de Caracteres Representação de Caracteres IFBA Instituto Federal de Educ. Ciencia e Tec Bahia Curso de Analise e Desenvolvimento de Sistemas Introdução à Ciência da Computação Prof. Msc. Antonio Carlos Souza Coletânea

More information

C Examples! Jennifer Rexford!

C Examples! Jennifer Rexford! C Examples! Jennifer Rexford! 1 Goals of this Lecture! Help you learn about:! The fundamentals of C! Deterministic finite state automata (DFA)! Expectations for programming assignments! Why?! The fundamentals

More information

Statements and Control Flow

Statements and Control Flow Contents 1. Introduction 2. Types and Variables 3. Statements and Control Flow 4. Reading Input 5. Classes and Objects 6. Arrays 7. Methods 8. Scope and Lifetime 9. Utility classes 10. Introduction to

More information

Object Oriented Software Design

Object Oriented Software Design Object Oriented Software Design Introduction to Java - II Giuseppe Lipari http://retis.sssup.it/~lipari Scuola Superiore Sant Anna Pisa September 14, 2011 G. Lipari (Scuola Superiore Sant Anna) Introduction

More information

Barcode Magstripe. Decoder & Scanner. Programming Manual

Barcode Magstripe. Decoder & Scanner. Programming Manual Barcode Magstripe Decoder & Scanner Programming Manual CONTENTS Getting Started... 2 Setup Procedures... 3 Setup Flow Chart...4 Group 0 : Interface Selection... 5 Group 1 : Device Selection for keyboard

More information

Object Oriented Software Design

Object Oriented Software Design Object Oriented Software Design Introduction to Java - II Giuseppe Lipari http://retis.sssup.it/~lipari Scuola Superiore Sant Anna Pisa October 28, 2010 G. Lipari (Scuola Superiore Sant Anna) Introduction

More information

MK-SERIE 1000/1500/2000 AllOfBarcode.de Michael Krug - 83278Traunstein BARCODE SCANNER

MK-SERIE 1000/1500/2000 AllOfBarcode.de Michael Krug - 83278Traunstein BARCODE SCANNER MK-SERIE 1000/1500/2000 AllOfBarcode.de Michael Krug - 83278Traunstein BARCODE SCANNER Configuration Guide - 1 - Table of Contents Chapter 1 System Information 1.1 About this manual 3 1.2 How to set up

More information

ESPA 4.4.4 Nov 1984 PROPOSAL FOR SERIAL DATA INTERFACE FOR PAGING EQUIPMENT CONTENTS 1. INTRODUCTION 2. CHARACTER DESCRIPTION

ESPA 4.4.4 Nov 1984 PROPOSAL FOR SERIAL DATA INTERFACE FOR PAGING EQUIPMENT CONTENTS 1. INTRODUCTION 2. CHARACTER DESCRIPTION PROPOSAL FOR SERIAL DATA INTERFACE FOR PAGING EQUIPMENT CONTENTS 1. INTRODUCTION 2. CHARACTER DESCRIPTION 2.1 CHARACTER STRUCTURE 2.2 THE CHARACTER SET 2.3 CONTROL CHARACTERS 2.3.1 Transmission control

More information

Part No. : MUL-53221-07 PROGRAMMING GUIDE

Part No. : MUL-53221-07 PROGRAMMING GUIDE Part No. : MUL-53221-07 PROGRAMMING GUIDE PROGRAMMING GUIDE for BARCODE SCANNERS The guide can be used as keyboard emulation, RS- 232C serial interface, and USB 1.1 interface and wand emulation. IMPORTANT

More information

C PROGRAMMING FOR MATHEMATICAL COMPUTING

C PROGRAMMING FOR MATHEMATICAL COMPUTING UNIVERSITY OF CALICUT SCHOOL OF DISTANCE EDUCATION BSc MATHEMATICS (2011 Admission Onwards) VI Semester Elective Course C PROGRAMMING FOR MATHEMATICAL COMPUTING QUESTION BANK Multiple Choice Questions

More information

7-Bit coded Character Set

7-Bit coded Character Set Standard ECMA-6 6 th Edition - December 1991 Reprinted in electronic form in August 1997 Standardizing Information and Communication Systems 7-Bit coded Character Set Phone: +41 22 849.60.00 - Fax: +41

More information

PROGRAMMING IN C PROGRAMMING IN C CONTENT AT A GLANCE

PROGRAMMING IN C PROGRAMMING IN C CONTENT AT A GLANCE PROGRAMMING IN C CONTENT AT A GLANCE 1 MODULE 1 Unit 1 : Basics of Programming Unit 2 : Fundamentals Unit 3 : C Operators MODULE 2 unit 1 : Input Output Statements unit 2 : Control Structures unit 3 :

More information

About The Tutorial. Audience. Prerequisites. Copyright & Disclaimer

About The Tutorial. Audience. Prerequisites. Copyright & Disclaimer About The Tutorial C is a general-purpose, procedural, imperative computer programming language developed in 1972 by Dennis M. Ritchie at the Bell Telephone Laboratories to develop the UNIX operating system.

More information

VB.NET Programming Fundamentals

VB.NET Programming Fundamentals Chapter 3 Objectives Programming Fundamentals In this chapter, you will: Learn about the programming language Write a module definition Use variables and data types Compute with Write decision-making statements

More information

C Programming. for Embedded Microcontrollers. Warwick A. Smith. Postbus 11. Elektor International Media BV. 6114ZG Susteren The Netherlands

C Programming. for Embedded Microcontrollers. Warwick A. Smith. Postbus 11. Elektor International Media BV. 6114ZG Susteren The Netherlands C Programming for Embedded Microcontrollers Warwick A. Smith Elektor International Media BV Postbus 11 6114ZG Susteren The Netherlands 3 the Table of Contents Introduction 11 Target Audience 11 What is

More information

Talk 2008. Encoding Issues. An overview to understand and be able to handle encoding issues in a better way. Susanne Ebrecht

Talk 2008. Encoding Issues. An overview to understand and be able to handle encoding issues in a better way. Susanne Ebrecht Talk 2008 Encoding Issues An overview to understand and be able to handle encoding issues in a better way Susanne Ebrecht PostgreSQL Usergroup Germany PostgreSQL European User Group PostgreSQL Project

More information

Storage Classes CS 110B - Rule Storage Classes Page 18-1 \handouts\storclas

Storage Classes CS 110B - Rule Storage Classes Page 18-1 \handouts\storclas CS 110B - Rule Storage Classes Page 18-1 Attributes are distinctive features of a variable. Data type, int or double for example, is an attribute. Storage class is another attribute. There are four storage

More information

AP Computer Science Java Subset

AP Computer Science Java Subset APPENDIX A AP Computer Science Java Subset The AP Java subset is intended to outline the features of Java that may appear on the AP Computer Science A Exam. The AP Java subset is NOT intended as an overall

More information

CS 141: Introduction to (Java) Programming: Exam 1 Jenny Orr Willamette University Fall 2013

CS 141: Introduction to (Java) Programming: Exam 1 Jenny Orr Willamette University Fall 2013 Oct 4, 2013, p 1 Name: CS 141: Introduction to (Java) Programming: Exam 1 Jenny Orr Willamette University Fall 2013 1. (max 18) 4. (max 16) 2. (max 12) 5. (max 12) 3. (max 24) 6. (max 18) Total: (max 100)

More information

C / C++ and Unix Programming. Materials adapted from Dan Hood and Dianna Xu

C / C++ and Unix Programming. Materials adapted from Dan Hood and Dianna Xu C / C++ and Unix Programming Materials adapted from Dan Hood and Dianna Xu 1 C and Unix Programming Today s goals ú History of C ú Basic types ú printf ú Arithmetic operations, types and casting ú Intro

More information

Answers to Review Questions Chapter 7

Answers to Review Questions Chapter 7 Answers to Review Questions Chapter 7 1. The size declarator is used in a definition of an array to indicate the number of elements the array will have. A subscript is used to access a specific element

More information

FEEG6002 - Applied Programming 5 - Tutorial Session

FEEG6002 - Applied Programming 5 - Tutorial Session FEEG6002 - Applied Programming 5 - Tutorial Session Sam Sinayoko 2015-10-30 1 / 38 Outline Objectives Two common bugs General comments on style String formatting Questions? Summary 2 / 38 Objectives Revise

More information

ASCII Characters. 146 CHAPTER 3 Information Representation. The sign bit is 1, so the number is negative. Converting to decimal gives

ASCII Characters. 146 CHAPTER 3 Information Representation. The sign bit is 1, so the number is negative. Converting to decimal gives 146 CHAPTER 3 Information Representation The sign bit is 1, so the number is negative. Converting to decimal gives 37A (hex) = 134 (dec) Notice that the hexadecimal number is not written with a negative

More information

Digital Logic Design. Introduction

Digital Logic Design. Introduction Digital Logic Design Introduction A digital computer stores data in terms of digits (numbers) and proceeds in discrete steps from one state to the next. The states of a digital computer typically involve

More information

Barcode Scanning Made Easy. Programming Guide

Barcode Scanning Made Easy. Programming Guide Barcode Scanning Made Easy Programming Guide CCD Scanner Programming Guide Please Read Note: The Wasp WCS3900 Series Scanners are ready to scan the most popular barcodes out of the box. This manual should

More information

5 Arrays and Pointers

5 Arrays and Pointers 5 Arrays and Pointers 5.1 One-dimensional arrays Arrays offer a convenient way to store and access blocks of data. Think of arrays as a sequential list that offers indexed access. For example, a list of

More information

UIL Computer Science for Dummies by Jake Warren and works from Mr. Fleming

UIL Computer Science for Dummies by Jake Warren and works from Mr. Fleming UIL Computer Science for Dummies by Jake Warren and works from Mr. Fleming 1 2 Foreword First of all, this book isn t really for dummies. I wrote it for myself and other kids who are on the team. Everything

More information

ASCII control characters (character code 0-31)

ASCII control characters (character code 0-31) ASCII control characters (character code 0-31) DEC HEX 0 00 NUL Null char 1 01 SOH Start of Heading 2 02 STX Start of Text 3 03 ETX End of Text 4 04 EOT End of Transmission

More information

PART-A Questions. 2. How does an enumerated statement differ from a typedef statement?

PART-A Questions. 2. How does an enumerated statement differ from a typedef statement? 1. Distinguish & and && operators. PART-A Questions 2. How does an enumerated statement differ from a typedef statement? 3. What are the various members of a class? 4. Who can access the protected members

More information

Name: Class: Date: 9. The compiler ignores all comments they are there strictly for the convenience of anyone reading the program.

Name: Class: Date: 9. The compiler ignores all comments they are there strictly for the convenience of anyone reading the program. Name: Class: Date: Exam #1 - Prep True/False Indicate whether the statement is true or false. 1. Programming is the process of writing a computer program in a language that the computer can respond to

More information

3/13/2012. Writing Simple C Programs. ESc101: Decision making using if-else and switch statements. Writing Simple C Programs

3/13/2012. Writing Simple C Programs. ESc101: Decision making using if-else and switch statements. Writing Simple C Programs Writing Simple C Programs ESc101: Decision making using if- and switch statements Instructor: Krithika Venkataramani Semester 2, 2011-2012 Use standard files having predefined instructions stdio.h: has

More information

Teletypewriter Communication Codes

Teletypewriter Communication Codes Teletypewriter Communication Codes Gil Smith gil@vauxelectronics.com 2001 (Document Notes) Abstract Preliminary -- 5/01 gil smith Corrections or comments to gil@vauxelectronics.com This information is

More information

Index...1. Introduction...3. Installation- Keyboard Wedge...3 RS-232...3 USB...3. Default Setting for each barcode shown as below:...

Index...1. Introduction...3. Installation- Keyboard Wedge...3 RS-232...3 USB...3. Default Setting for each barcode shown as below:... Index Index...1 Introduction...3 Installation- Keyboard Wedge...3 RS-232...3 USB...3 Default Setting for each barcode shown as below:...4 Programming the MS320...5 Interface Selection...7 Keyboard wedge...8

More information

Education: P.h.D. Candidate (Santa Clara University, California) M.S. in Computer Engineering (Santa Clara University, California)

Education: P.h.D. Candidate (Santa Clara University, California) M.S. in Computer Engineering (Santa Clara University, California) Instructor: Professor Neena Kaushik Education: P.h.D. Candidate (Santa Clara University, California) M.S. in Computer Engineering (Santa Clara University, California) M.S. in Biomedical Engineering (Northwestern

More information

Barcode Scanning Made Easy. WWS500 Programming Guide

Barcode Scanning Made Easy. WWS500 Programming Guide Barcode Scanning Made Easy WWS500 Programming Guide Table of Contents Chapter 1. Introduction...........................2 Chapter 2. Barcode Symbologies...................3 Chapter 3. Quick Start............................4

More information

Enter/Exit programming

Enter/Exit programming P/N: MUL-53247-02 Enter/Exit programming (This barcode is also found at back cover page.) Framed values are default values. All Rights Reserved This guide is designed for advanced settings of Hand Free

More information

Bar Code Reader Models 1000/1002 USER'S MANUAL 2190 Regal Parkway Euless, TX 76040 (817) 571-9015 (800) 648-4452 FAX (817) 685-6232 FCC NOTICE WARNING: This equipment generates, uses and can radiate radio

More information

Introduction to Java

Introduction to Java Introduction to Java The HelloWorld program Primitive data types Assignment and arithmetic operations User input Conditional statements Looping Arrays CSA0011 Matthew Xuereb 2008 1 Java Overview A high

More information

Boolean Expressions, Conditions, Loops, and Enumerations. Precedence Rules (from highest to lowest priority)

Boolean Expressions, Conditions, Loops, and Enumerations. Precedence Rules (from highest to lowest priority) Boolean Expressions, Conditions, Loops, and Enumerations Relational Operators == // true if two values are equivalent!= // true if two values are not equivalent < // true if left value is less than the

More information

Informatica e Sistemi in Tempo Reale

Informatica e Sistemi in Tempo Reale Informatica e Sistemi in Tempo Reale Introduction to C programming Giuseppe Lipari http://retis.sssup.it/~lipari Scuola Superiore Sant Anna Pisa October 25, 2010 G. Lipari (Scuola Superiore Sant Anna)

More information

BRMO 80 / ETH-IP. User Manual. Réf : MU-BRMO 80-ETH-IP-1.4-EN

BRMO 80 / ETH-IP. User Manual. Réf : MU-BRMO 80-ETH-IP-1.4-EN User Manual Réf : MU-BRMO 80-ETH-IP-1.4-EN BALOGH SA 189, rue d Aubervilliers - C.P. 97 75886 PARIS Cedex 18 France Tél : 33 (0)1 44 65 65 00 Fax : 33 (0)1 44 65 65 10 e-mail : balogh@balogh-group.com

More information

Handout 1. Introduction to Java programming language. Java primitive types and operations. Reading keyboard Input using class Scanner.

Handout 1. Introduction to Java programming language. Java primitive types and operations. Reading keyboard Input using class Scanner. Handout 1 CS603 Object-Oriented Programming Fall 15 Page 1 of 11 Handout 1 Introduction to Java programming language. Java primitive types and operations. Reading keyboard Input using class Scanner. Java

More information

S302D. Programming Guide. 2D Imaging Barcode Scanner. Advanced Handheld High-Speed Laser Scanner

S302D. Programming Guide. 2D Imaging Barcode Scanner. Advanced Handheld High-Speed Laser Scanner S302D 2D Imaging Barcode Scanner Programming Guide 1 Advanced Handheld High-Speed Laser Scanner Revision History Changes to the original manual are listed below: Version Date Description of Version 1.0

More information

JAVA - QUICK GUIDE. Java SE is freely available from the link Download Java. So you download a version based on your operating system.

JAVA - QUICK GUIDE. Java SE is freely available from the link Download Java. So you download a version based on your operating system. http://www.tutorialspoint.com/java/java_quick_guide.htm JAVA - QUICK GUIDE Copyright tutorialspoint.com What is Java? Java is: Object Oriented Platform independent: Simple Secure Architectural- neutral

More information

An Incomplete C++ Primer. University of Wyoming MA 5310

An Incomplete C++ Primer. University of Wyoming MA 5310 An Incomplete C++ Primer University of Wyoming MA 5310 Professor Craig C. Douglas http://www.mgnet.org/~douglas/classes/na-sc/notes/c++primer.pdf C++ is a legacy programming language, as is other languages

More information

C++ Programming Language

C++ Programming Language C++ Programming Language Lecturer: Yuri Nefedov 7th and 8th semesters Lectures: 34 hours (7th semester); 32 hours (8th semester). Seminars: 34 hours (7th semester); 32 hours (8th semester). Course abstract

More information

Arrays in Java. Working with Arrays

Arrays in Java. Working with Arrays Arrays in Java So far we have talked about variables as a storage location for a single value of a particular data type. We can also define a variable in such a way that it can store multiple values. Such

More information

Outline. Conditional Statements. Logical Data in C. Logical Expressions. Relational Examples. Relational Operators

Outline. Conditional Statements. Logical Data in C. Logical Expressions. Relational Examples. Relational Operators Conditional Statements For computer to make decisions, must be able to test CONDITIONS IF it is raining THEN I will not go outside IF Count is not zero THEN the Average is Sum divided by Count Conditions

More information

Arrays. number: Motivation. Prof. Stewart Weiss. Software Design Lecture Notes Arrays

Arrays. number: Motivation. Prof. Stewart Weiss. Software Design Lecture Notes Arrays Motivation Suppose that we want a program that can read in a list of numbers and sort that list, or nd the largest value in that list. To be concrete about it, suppose we have 15 numbers to read in from

More information

C++FA 5.1 PRACTICE MID-TERM EXAM

C++FA 5.1 PRACTICE MID-TERM EXAM C++FA 5.1 PRACTICE MID-TERM EXAM This practicemid-term exam covers sections C++FA 1.1 through C++FA 1.4 of C++ with Financial Applications by Ben Van Vliet, available at www.benvanvliet.net. 1.) A pointer

More information

MINIMAG. Magnetic Stripe Reader Keyboard Wedge. User s Manual

MINIMAG. Magnetic Stripe Reader Keyboard Wedge. User s Manual MINIMAG Magnetic Stripe Reader Keyboard Wedge User s Manual TM Agency Approved Specifications for subpart B of part 15 of FCC rule for a Class A computing device. Limited Warranty ID TECH warrants to the

More information

Phys4051: C Lecture 2 & 3. Comment Statements. C Data Types. Functions (Review) Comment Statements Variables & Operators Branching Instructions

Phys4051: C Lecture 2 & 3. Comment Statements. C Data Types. Functions (Review) Comment Statements Variables & Operators Branching Instructions Phys4051: C Lecture 2 & 3 Functions (Review) Comment Statements Variables & Operators Branching Instructions Comment Statements! Method 1: /* */! Method 2: // /* Single Line */ //Single Line /* This comment

More information

Goals for This Lecture:

Goals for This Lecture: Goals for This Lecture: Understand the pass-by-value and passby-reference argument passing mechanisms of C++ Understand the use of C++ arrays Understand how arrays are passed to C++ functions Call-by-value

More information

DATA STRUCTURES USING C

DATA STRUCTURES USING C DATA STRUCTURES USING C QUESTION BANK UNIT I 1. Define data. 2. Define Entity. 3. Define information. 4. Define Array. 5. Define data structure. 6. Give any two applications of data structures. 7. Give

More information

MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question.

MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question. Exam Name MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question. 1) The JDK command to compile a class in the file Test.java is A) java Test.java B) java

More information

Dalhousie University CSCI 2132 Software Development Winter 2015 Lab 7, March 11

Dalhousie University CSCI 2132 Software Development Winter 2015 Lab 7, March 11 Dalhousie University CSCI 2132 Software Development Winter 2015 Lab 7, March 11 In this lab, you will first learn how to use pointers to print memory addresses of variables. After that, you will learn

More information

ALLIED PAPER : DISCRETE MATHEMATICS (for B.Sc. Computer Technology & B.Sc. Multimedia and Web Technology)

ALLIED PAPER : DISCRETE MATHEMATICS (for B.Sc. Computer Technology & B.Sc. Multimedia and Web Technology) ALLIED PAPER : DISCRETE MATHEMATICS (for B.Sc. Computer Technology & B.Sc. Multimedia and Web Technology) Subject Description: This subject deals with discrete structures like set theory, mathematical

More information

C++ Language Tutorial

C++ Language Tutorial cplusplus.com C++ Language Tutorial Written by: Juan Soulié Last revision: June, 2007 Available online at: http://www.cplusplus.com/doc/tutorial/ The online version is constantly revised and may contain

More information

Scanner Configuration

Scanner Configuration Scanner Configuration SmartScan Manual DOC Version 2.21 This document is specifically designed for the user to print two pages per sheet of paper with optimal print quality. Copyright 2005~ 2008 CIPHERLAB

More information

Bachelors of Computer Application Programming Principle & Algorithm (BCA-S102T)

Bachelors of Computer Application Programming Principle & Algorithm (BCA-S102T) Unit- I Introduction to c Language: C is a general-purpose computer programming language developed between 1969 and 1973 by Dennis Ritchie at the Bell Telephone Laboratories for use with the Unix operating

More information

Moving from CS 61A Scheme to CS 61B Java

Moving from CS 61A Scheme to CS 61B Java Moving from CS 61A Scheme to CS 61B Java Introduction Java is an object-oriented language. This document describes some of the differences between object-oriented programming in Scheme (which we hope you

More information

COMPUTER SCIENCE. Paper 1 (THEORY)

COMPUTER SCIENCE. Paper 1 (THEORY) COMPUTER SCIENCE Paper 1 (THEORY) (Three hours) Maximum Marks: 70 (Candidates are allowed additional 15 minutes for only reading the paper. They must NOT start writing during this time) -----------------------------------------------------------------------------------------------------------------------

More information

1) The postfix expression for the infix expression A+B*(C+D)/F+D*E is ABCD+*F/DE*++

1) The postfix expression for the infix expression A+B*(C+D)/F+D*E is ABCD+*F/DE*++ Answer the following 1) The postfix expression for the infix expression A+B*(C+D)/F+D*E is ABCD+*F/DE*++ 2) Which data structure is needed to convert infix notations to postfix notations? Stack 3) The

More information

CS1020 Data Structures and Algorithms I Lecture Note #1. Introduction to Java

CS1020 Data Structures and Algorithms I Lecture Note #1. Introduction to Java CS1020 Data Structures and Algorithms I Lecture Note #1 Introduction to Java Objectives Java Basic Java features C Java Translate C programs in CS1010 into Java programs 2 References Chapter 1 Section

More information