Skip to main content

Basics of Java Programming - Part 1



  • Datatypes in Java

    • int 4 bytes
      • short int 2 bytes
      • long int 8 bytes
      • byte 1 byte
    • float  4 bytes
    • double 8 bytes
    • char 2 bytes

  • Character to ASCII conversion in JAVA

        class CharToASCII {
public static void main(String a[]) {
char c1 = 'A';
char c2 = 'a';
System.out.print((int)c1); // OUTPUT: 65
System.out.print((int)c2); // OUTPUT: 97
System.out.print((char)66); // OUTPUT: B  --> ASCII to int conversion
          }
       }


  • "printf" is also available in JAVA

          class PrintfInJava {
            public static void main(String a[]) {
int i = 4;
int j = 7;
                 int i+j;
System.out.printf("Addition of %d and %d is %d", i, j, k); // OUTPUT: 65
           }
       }

  • Binary Literals

        public class BinaryLiterals {
public static void main(String a[]) {
// i, j and k are same representation
int i = 0b10000000;
int j = 0B10000000;
int k = 0b100_00_000;
System.out.printf("value of i is %d, j is %d and k is %d", ijk); 
}
      }
      //OUTPUT: value of i is 128, j is 128 and k is 128

  • Post increment

       public class PostIncrement {
public static void main(String a[]) {
int i = 10;
i = i++;
/*
           i = i++; is similar to:
          int temp;
          temp = i;
           i++;
           i = temp;
         //OUTPUT 10
*/
System.out.println("value of i is " + i );
int j = 7;
int k;
k = j++;
System.out.println("\n value of k is: "+ k + " and j is: "+ );
}
     }

     //OUTPUT: 
     // value of i is 10
    //  value of k is: 7 and j is: 8

  • Bitwise left and right shift operator

       public class LeftAndRightShiftOps {
public static void main(String a[]) {
int i = 25; // Binary  1 1 0 0 1
int j = i << 2; // Binary 1 1 0 0 1 0 0
int k = i >> 2; // Binary 1 1 0
System.out.printf("value of j is %d \nvalue of k is %d", j, k);
}
     }

    //OUTPUT: 
   // value of j is 100 
  // value of k is 6

Comments

  1. Bettors can choose their own parlays from a variety of|quite so much of|a big selection of} choices offered on particular person games, like McAfee did, or combine and match them across a variety of|quite so much of|a big selection of} contests on a given day. Betting outlets additionally supply particular parlays on which gamblers can wager. They need to be on their phones, and sports activities gaming firms know that. Their enterprise bet365 survival practically is determined by} engaging with folks ages 21 to 30, gaining them as customers, and maintaining them coming again. For younger sports activities followers — no one underneath the age of 21 can guess legally — playing is more than just a way to make or lose a couple of dollars on the game. It has turn out to be one of many major entry points to sports activities fandom and is changing the elemental nature of what it means to be a fan in Philly.

    ReplyDelete

Post a Comment

Popular posts from this blog

Blockchain in Theory - Blockchain, Bitcoin, Mining

   Blockchain is the software protocol that tell the Internet how to transfer money and assets. Blockchain is the layer and Bitcoin is the application. Just one of many cryptocurrency kinds of applications. When one user send email to another then both users do not have to know about the underlaying process except email address. Similarly,  User don't need to know anything other than other user's wallet address to send some bitcoin or other cryptocurrencies.  Any file on Internet may have multiple copies but money is something that should not be copied multiple times. This has been a longstanding problem in computing networks namely the double spend problem. Satoshi Nakamoto introduced white paper for digital cash system in 2008 to resolve the double spending problem and fortified by a ledger which enforces the money is only spent once. It took 15 years alone for corporate email as the main application to be a standard thing in our lives. And similarly the money Internet block

How to kill a process running on particular port in Linux

  If port 8080 needs to be kill use below single command: kill -9 $(lsof -t -i:8080) Note: remove -9 from the command, if you don't want to kill the process violently. To list any process listening to the port 8080: lsof -i:8080 Use any port number that you want to kill.

Nudge Notes - Python Language Basics

  1. Datatypes in Python: None Numeric float -> 1.5 int -> 5 complex -> 2+5j bool -> True/false Sequence List -> [3,5,6,7,1] Tuple -> (3,5,6,7,1) Set -> {3,5,6,7,1} String -> "Akshay" Range  range(5) -> range(0, 5)  list(range(5)) -> [0,1,2,3,4] list(range(2,10,2)) -> [2,4,6,8] Dictonary product_price = {'book': 50, 'pen': 300, 'eraser': 10}  product_price.get('book') -> 50 2. Number Conversion in Python bin( 28 ) -> 0b 11100 oct( 28 ) -> 0o 34  hex( 28 ) ->  0x 1c 3. Swap two numbers in Python           a = 5       b = 6 Method #1:             a, b = b, a Method #2            a = a + b         b = a - b         a = a - b 4. "math" module in python     import math math.sqrt(25) -> 5.0 math.floor(2.5) -> 2.0 math.ceil(2.5) -> 3.0 math.pow(2, 3) -> 8.0 math.pi -> 3.141592653589793 math.e -> 2.718281828459045 5. How to import a module in python import math import math as