当前位置:网站首页>3day
3day
2022-07-25 22:06:00 【denggongming】
Variable : Variables are storage space in memory , The quantity that often changes is stored in the space, which is called variable .
classification : integer constants 、 Floating-Point Literals 、 character constants 、 Boolean Literals 、 String constant
Define format : data type Variable name = initialize value
Such as : int a = 1;
Variable considerations :
1. Variable name cannot be defined repeatedly
2. A statement can define multiple variables , Separated by commas
3. Variables must be assigned before use
4. Definition float and long Variable considerations
5. Scope of variable
Constant : During program execution , The amount whose value will not change is called a constant
data type : The minimum information unit of a computer storage device is bit( position ), And the smallest storage unit is called byte( byte ).
1byte=8bit

Implicit conversion : Assign a value or variable that represents a small range of data to another variable that represents a large range of data .
Small data types , And large data types , The small one will be promoted to the big one , recompute .
byte short char Three kinds of data in operation , Whether or not there are higher data types , Will be promoted to int, And then we do the calculation .
Display conversion : Assign a value or variable that represents a large range of data to another variable that represents a small range of data .
Format : Target data type Variable name = ( Target data type ) Value or variable name ;


Code sharing


边栏推荐
- 【GO基础02】第一个程序
- Why does redis choose single thread?
- JS timer and swiper plug-in
- 还不懂mock测试?一篇文章带你熟悉mock
- 2年功能测试,却感觉自己什么都不会,2022我该何去何从?
- Victoriametrics single node of kubernetes
- Redis master-slave architecture lock failure problem (master-slave)
- 如何实现一个App应用程序,限制用户时间使用?
- YUV420 YUV420sp 图像格式「建议收藏」
- Redis foundation 2 (notes)
猜你喜欢

【饭谈】那些看似为公司着想,实际却让人无法理解的事(二:面试时的软素质“眼缘”)

五种分配方式是否会产生内部碎片、外部碎片

虚拟内存与磁盘

6-17 vulnerability exploitation - deserialization remote command execution vulnerability
![[hand torn STL] unordered_ set、unordered_ Map (encapsulated with hash table)](/img/33/08f7b72ce99e07821a1f4b6e594e13.png)
[hand torn STL] unordered_ set、unordered_ Map (encapsulated with hash table)

别投了,软件测试岗位饱和了...

Special class design

Guiding principles of information security construction

在腾讯干软件测试3年,7月无情被辞,想给划水的兄弟提个醒...

2022最新软件测试八股文,能不能拿心仪Offer就看你背得怎样了
随机推荐
I/o case practice
C language left value and right value description [easy to understand]
Create EDA - why should I learn EDA
mysql: error while loading shared libraries: libncurses.so.5: cannot open shared object file: No suc
Redis memory elimination mechanism?
文件无法保存(文件夹已损坏无法读取怎么办)
Virtual memory and disk
[dinner talk] those things that seem to be for the sake of the company but are actually incomprehensible (2: soft quality "eye edge" during interview)
开源的RSS订阅器FreshRSS
The testing work is not valued. Have you changed your position?
[assembly language 01] basic knowledge
Don't know mock test yet? An article to familiarize you with mock
Uninstall NPM and install NPM_ Use 'NPM uninstall' to uninstall the NPM package 'recommended collection'
还不懂mock测试?一篇文章带你熟悉mock
Wet- a good choice for people with English difficulties - console translation
Solutions to the failure of win key in ikbc keyboard
[hand torn STL] unordered_ set、unordered_ Map (encapsulated with hash table)
核电站在席卷欧洲的热浪中努力保持安全工作
这次龙蜥展区玩的新花样,看看是谁的 DNA 动了?
dovecot 设置邮箱quota