当前位置:网站首页>关于交换a和b的值的四种方法
关于交换a和b的值的四种方法
2022-07-06 09:23:00 【王业强】
交换a,b的值,大家可能认为很简单,但是如果突然让你想出4种方法,可能大家一瞬间脑子里只出现了用第三变量暂存的这种最基本的方法,下面我总结了四种方法:
初始化a和b:
#关于python较换 a b 值的 方法
a = 3
b = 5
print("开始时:a = {} , b = {}".format(a,b))
1.用第三变量c暂存:
def ChangeFirst(a,b): #取第三变量C暂存
c = a
a = b
b = c
print("ChangeFirst方法交换后 :a = {} , b = {}".format(a,b))
2.用和与差交换(暂存):
def ChangeSecond(a,b): #用和与差
a = a+b
b = a-b
a = a-b
print("ChangeSecond方法交换后:a = {} , b = {}".format(a,b))
3.用按位异或的方法:
def ChangeThird(a,b): #按位异或(按二进制位,相同为0不同为1)
a = a^b
b = a^b
a = a^b
print("ChangeThird方法交换后 :a = {} , b = {}".format(a,b))
4.Python特有的方法:
def ChangeFourth(a,b): #python特有的方法
a,b = b,a
print("ChangeFourth方法交换后:a = {} , b = {}".format(a,b))
代码运行:
ChangeFirst(a,b)
ChangeSecond(a,b)
ChangeThird(a,b)
ChangeFourth(a,b)
代码输出:
边栏推荐
- HackMyvm靶机系列(3)-visions
- [insert, modify and delete data in the headsong educator data table]
- Experiment 7 use of common classes (correction post)
- 7-5 staircase upgrade (PTA program design)
- Record once, modify password logic vulnerability actual combat
- What language should I learn from zero foundation. Suggestions
- List and data frame of R language experiment III
- The most popular colloquial system explains the base of numbers
- 《统计学》第八版贾俊平第二章课后习题及答案总结
- An unhandled exception occurred when C connected to SQL Server: system Argumentexception: "keyword not supported:" integrated
猜你喜欢
《统计学》第八版贾俊平第十一章一元线性回归知识点总结及课后习题答案
记一次edu,SQL注入实战
链队实现(C语言)
Realize applet payment function with applet cloud development (including source code)
《统计学》第八版贾俊平第二章课后习题及答案总结
"Gold, silver and four" job hopping needs to be cautious. Can an article solve the interview?
Detailed explanation of network foundation routing
网络基础详解
HackMyvm靶机系列(1)-webmaster
Intranet information collection of Intranet penetration (5)
随机推荐
《统计学》第八版贾俊平第十四章指数知识点总结及课后习题答案
SQL注入
外网打点(信息收集)
内网渗透之内网信息收集(五)
HackMyvm靶机系列(1)-webmaster
The United States has repeatedly revealed that the yield of interest rate hiked treasury bonds continued to rise
Wei Shen of Peking University revealed the current situation: his class is not very good, and there are only 5 or 6 middle-term students left after leaving class
XSS之冷门事件
《统计学》第八版贾俊平第五章概率与概率分布
Always of SystemVerilog usage_ comb 、always_ iff
Detailed explanation of network foundation
Feature extraction and detection 14 plane object recognition
Network layer - simple ARP disconnection
Experiment 7 use of common classes (correction post)
Web vulnerability - File Inclusion Vulnerability of file operation
Hackmyvm target series (4) -vulny
Markdown font color editing teaching
Attach the simplified sample database to the SQLSERVER database instance
WEB漏洞-文件操作之文件包含漏洞
Middleware vulnerability recurrence Apache