1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Pachacha [2.7K]
3 years ago
8

The C programming language distinguishes character constants from string constants by using single quotation marks for character

s and double quotation marks for strings. Thus, 'c' is the character c, while "c" is a string of length 1 consisting of the single character c.
1. Why do you think this distinction is made? Is it useful?
Computers and Technology
1 answer:
ad-work [718]3 years ago
7 0

Answer:

The C programming language distinguishes character constants from string constants by

using single quotation marks for characters and double quotation marks for strings. Thus,

'c' is the character c, while "c" is a string of length 1 consisting of the single character c.

Why do you think this distinction is made? Is it useful?

(b) Python, on the other hand, uses double quotation marks for both characters and strings

(thus, "c" is either a character or string, depending on context). Discuss the advantages and

disadvantages of these two approaches.

6.3 Discuss the pros and cons of ignoring or requiring “white space” (i.e., blanks, end-of-lines, and

tabs) when recognizing tokens.

6.4 Many programming languages (like C) do not allow nested comments. Why is this requirement

made? Modula-2 and a few other languages do allow nested comments. Why is this useful?

6.5 (a) Describe the strings that are represented by the regular expression:

[0-9]+((E|e)(\+|\-)?[0-9]+)?

(b) Write a regular expression for C identifiers consisting of letters, digits, and the underscore

character ‘_’, and starting with a letter or underscore.

Explanation:

You might be interested in
In symmetric key cryptosystem, assume that Alice and Bob have set up a common key Kab. This key is only known to Alice and Bob.
azamat

Answer:

yes

Explanation:

If it is guranteed the key is only known to Alice and Bob and there is no risk of man in the middle attack or channel spoofing so we can achieve data origin authentication

4 0
3 years ago
What describes Accenture's approach to automation?
Mrrafil [7]
<h2>Answer:</h2>

<h2>intelligence - centered</h2>

<h2>Explanation:</h2>

I hope it helps you

4 0
2 years ago
How do u friend people
Verdich [7]
You click on the three dots and click the person silhouette with the plus sign on it.
4 0
4 years ago
Read 2 more answers
What is the best Describe an integer data type
kolbaska11 [484]

Answer:

It is a data type that only holds whole numbers, a.k.a. integers.

what is the picture about?

3 0
3 years ago
Which is NOT a valid compute shape option within the Oracle Cloud Infrastructure (OCI) compute service
inessss [21]

The option that is not a valid compute shape option within the Oracle Cloud Infrastructure (OCI) compute service is;

A: Container Instance

<h3>Cloud Computing</h3>

Cloud computing is simply a system that makes use of the Internet to store, manage and access data from a remote server on the internet.

Now, this cloud system infrastructure makes use of middleware software to ensure that there is proper connectivity between devices and computers connected via the cloud.

Finally there are different types of cloud computing shape but among the given options the only one that is not a type is Option A.

The missing options are;

A) Container Instance.

B) Bare Metal.

C) Dedicated Virtual Machine Host.

D) Virtual Machine.

Read more about cloud computing at; brainly.com/question/19057393

6 0
3 years ago
Other questions:
  • Write a method that checks whether the input string or a sentence (a string with spaces) is a palindrome or not. The method shou
    13·1 answer
  • Application partitioning gives developers the opportunity to write application code that can later be placed on either a client
    7·1 answer
  • Data hiding, which means that critical data stored inside the object is protected from code outside the object, is accomplished
    14·2 answers
  • Which type of address is used at the transport layer to identify the receiving application?
    14·1 answer
  • Limitations of the information systems used by tesco​
    7·1 answer
  • I need help. I wanna help a friend by giving him my powerpoint but I dont want him to steal my work. Is their anyway to restrict
    8·1 answer
  • Evie clicks through her presentation slides and realizes they all have transition effects coming from the same location, from th
    13·1 answer
  • How can a user access the Mailbox Cleanup tools?
    11·2 answers
  • What is a functional organisation? and how it functions​?
    12·1 answer
  • Which of the following is not a common input device?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!