Computer Programming Laboratory 2015-2016
Total Page:16
File Type:pdf, Size:1020Kb
Computer Programming Laboratory 2015-2016
Course objectives:
To provide basic principles C programming language. To provide design & develop of C programming skills. To provide practical exposures like designing flowcharts, algorithms, how to debug programs etc. Course outcomes:
Gaining the Knowledge on various parts of a computer. Able to draw flowcharts and write algorithms Able to design and development of C problem solving skills. Able to design and develop modular programming skills. Able to trace and debug a program
ISE Dept., CIT, Gubbi. Page 1 Computer Programming Laboratory 2015-2016
SYLLABUS SEMESTER I/ II COMPUTER PROGRAMMING LABORATORY Sub Code : 15CPL16 / 15CPL26 IA Marks :20 Hrs/ Week : 03 Exam Hours :03 Total Hrs. : 42 Exam Marks :80
PART – A Demonstration of Personal Computer and its Accessories. Demonstration and Explanation on disassembly and assembly of a personal computer by the Faculty-in-Charge. Students have to prepare a write-up on the same and include it in the Lab record and evaluated. Laboratory Session-1: Write-up on Functional block diagram of Computer, CPU, Buses, Mother Board, Chip sets, Operating System & types of OS, Basics of Networking & Topology and NIC. Laboratory Session-2: Write-up on RAM, SDRAM, FLASH memory, Hard disks, Optical media, CD- ROM/R/RW, DVDs, Flash drives, Keyboard, Mouse, Printers and Plotters. Note: These TWO Laboratory sessions are used to fill the gap between theory classes and practical sessions.
PART – B Problem Solving in C - Implement the following problems with WINDOWS / LINUX platform using appropriate C compiler. 1. Design and develop a flowchart or an algorithm that takes three coefficients (a, b, and c) of a Quadratic equation (ax2+bx+c=0) as input and compute all possible roots. Implement a C program for the developed flowchart/algorithm and execute the same to output the possible roots for a given set of coefficients with appropriate messages.
2. Design and develop an algorithm to find the reverse of an integer number NUM and check whether it is PALINDROME or NOT. Implement a C program for the developed algorithm that takes an integer number as input and output the reverse of the same with suitable messages. Ex: Num: 2014, Reverse: 4102, Not a Palindrome.
3. i)Design and develop a flowchart to find the square root of a given number N. Implement a C program for the same and execute for all possible inputs with appropriate messages. Note: Don’t use library function sqrt(n). ii)Design and develop a C program to read a year as an input and find whether it is leap year or not. Also consider end of the centuries.
ISE Dept., CIT, Gubbi. Page 2 Computer Programming Laboratory 2015-2016
4. Design and develop an algorithm for evaluating the polynomial f(x) = a4x4 + a3x3 + a2x2 + a1x1 + a0x0, for a given value of x and its coefficients using Horner’s method. Implement a C program for the developed algorithm and execute for different sets of values of coefficients and x. 5. Draw the flowchart and Write C Program to compute Sin(x) using Taylor series approximation given by Sin(x)Compare the result with the built- in Library function and print both the results with appropriate message.
6. Develop an algorithm, implement and execute a C program that reads N integer numbers and arrange them in ascending order using Bubble Sort.
7. Develop, implement and execute a C program that reads two matrices A (m x n ) and B (p x q ) and Compute the product A and B. Read matrix A in row major order and matrix B in column major order. Print both the input matrices and resultant matrix with suitable headings and in matrix format. Program must check the compatibility of orders of the matrices for multiplication. Report appropriate message in case of incompatibility.
8. Develop, implement and execute a C program to search a Name in a list of names using Binary Searching Technique.
9. Write and execute a C program that i. Implements string copy operation STRCOPY(str1,str2) that copies a string str1 to another string str2 without using library function. ii. Reads a sentence and prints frequency of each of the vowels and total count of consonants.
10. i)Design and develop a C function RightShift(x ,n) that takes two integers x and n as input and returns value of the integer x rotated to the right by n positions. Assume the integers are unsigned. Write a C program that invokes this function with different values for x and n and tabulate the results with suitable headings. ii)Design and develop a C function isprime(num) that accepts an integer argument and returns 1 if the argument is prime, a 0 otherwise. Write a C program that invokes this function to generate prime numbers between the given ranges 11. Draw the flowchart and write a recursive C function to find the factorial of a number, n!, defined by fact(n)=1, if n=0. Otherwise fact(n)=n*fact(n-1). Using this function, write a C program to compute the binomial coefficient nr. Tabulate the results for different values of n and r with suitable messages.
12. Given two university information files “studentname.txt” and “usn.txt” that contents students Names and USN respectively. Write a C program to create a new file called “output.txt” and copy the content of files “studentname.txt” and “usn.txt” into output file in the sequence shows below. Display the contents of output file “output.txt” on the screen.
13. Write a C program to maintain a record of “n” student details using an array of structures with four fields (Roll number, Name, Marks, and Grade). Each field is of an appropriate data type. Print the marks of the student given student name as input.
Student USN
ISE Dept., CIT, Gubbi. Page 3 Computer Programming Laboratory 2015-2016
Name Name 1 USN 1 Name 2 USN 2 ……… ……. ……… ……. 14. Write a C program using pointers to compute sum, mean and standard deviation of all elements sorted in an array of n real numbers. Reference Book: Reema Thareja, Computer Fundamentals and Programming in C, Oxford Press, 2012.
PART-A Demonstration of Personal Computer and its Accessories
Laboratory Session-1 Write-up on Functional block diagram of Computer, CPU, Buses, Mother Board, Chip sets, Operating System & types of OS, Basics of Networking & Topology and NIC. Description about Functional block diagram of Computer: A computer is an electronic device, which mainly performs the four functions as reading, processing, displaying and storing on data. These functions of a computer system can be carried out by using the three main units namely input unit, system unit and output unit. The block diagram of a computer system is as follows:
ISE Dept., CIT, Gubbi. Page 4 Computer Programming Laboratory 2015-2016
Fig 1: Block Diagram of a Computer
Notations: Data and Results flow Control instructions to other units from control unit ------Instructions from memory unit to control unit ------
System or Central Processing Unit (CPU): is commonly known as “processor” that executes the instructions of a computer program. It has Control Unit (CU) and Arithmetic & Logical Unit (ALU). These two units perform the basic arithmetic, logical, and input/output operations. a) Input unit: is used to enter data and information into a computer. The devices like keyboard, mouse and scanner are commonly used input devices. A keyboard is used to enter alphanumeric characters and symbols. The mouse is used to pick or select a command from the monitor screen. A scanner is used to scan an image or read a barcode and so on. b) Arithmetic and Logic Unit (ALU): is a digital circuit that perform arithmetic (Add, Sub, Multiplication, Division) and logical (AND, OR, NOT) operations. It helps in fast computation of scientific calculations on floating-point number. c) Control unit (CU): is the circuitry that controls the flow of information through the processor and coordinates the activities of the other units within the processor. Functions of Control unit Accessing data & instructions from memory unit
ISE Dept., CIT, Gubbi. Page 5 Computer Programming Laboratory 2015-2016
Interpreting instructions controlling input and output units Overall supervision of a Computer system d) Memory Unit (MU): is the unit where all the input data and results are stored either temporarily or permanently. The CPU memory is also called as memory register. The memory of a computer has two types: a. Main Memory / Primary Memory units i. Random Access Memory (RAM) ii. Read Only Memory (ROM) b. Secondary Memory / Auxiliary Memory e) Output Unit: It is used to display or print results from a computer. Monitor, printer and plotters are commonly used output devices. f) Bus: A bus is a collection of wires that carries data/Instructions. It connects physical components such as cables, printed circuits, CPU, Memory, Peripherals etc., for sharing of Information and communication with one another. The purpose of buses is to reduce the number of "pathways" needed for communication between the components, by carrying out all communications over a single data channel. Types of Buses: 1. System Buses: The system buses are used to transfer the data and instructions between Main memory (Random Access Memory) and CPU. These are classified into following three types.
Data Bus Address Bus Control Bus
It is used to transfer the data It is used to transfer the It is used to transfer the control between Processor, Memory and addresses of data and signals between CPU, Memory and I/O devices. instructions stored in memory. I/O devices.
Bidirectional in nature Unidirectional in nature Unidirectional or Bidirectional in nature
ISE Dept., CIT, Gubbi. Page 6 Computer Programming Laboratory 2015-2016
Fig 2: Types of Buses
2. I/O Buses: The buses which are used to connect all I/O devices with CPU and Memory are called I/O buses. These are classified into following three types.
PCI Bus ISA Bus USB Bus PCI stands for Peripheral ISA stands for Industry USB stands for Universal Component Interconnect Standard Architecture Serial Bus The motherboard will be This is simple and slowest It helps to connect various having 3 or 4 PCI bus used in IBM PCs I/O devices like keyboard, connectors, so that we can mouse, pen drives, printer, insert various chips. etc. Fastest and presently more Oldest, simplest and Newest and widely used powerful bus slowest bus bus
Main Board or Mother Board: Mother Board is a set of Integrated Chips (ICs) which are designed to work together. It controls the flow of data/instructions within our computer. It is the main board on which other hardware components are connected to enable the computer system to work as an integrated unit. It consists of sockets, slots, power connectors and bus. Chip sets: Chip set is the set of integrated chips that are designed to work together. These set of chips controls the flow of information on computer. The chips may be controllers for memory, cache, hard drive, key board and peripherals. Operating System and its types: An Operating System (OS) is a system software that controls and supervises the hardware components of a computer system and it provides the services to computer users. Also called as Resource Manager that manages the resources such as CPU, Memory, I/O devices, Job/Task/Process etc., a computer cannot run without it. The major functions of OS includes: CPU Management, Memory Management, File Management, Device Management, Process/Task/Job Management and Security Management. The primary goal of an OS is to make the computer system convenient and efficient to use. An OS ensures that the system resources (such as CPU, memory, I/O devices, etc) are utilized efficiently. For example, there may be many programs residingin the main memory. Therefore, the system needs to determine which programs are active and which need to wait for some I/O operation. Some of the examples of Operating Systems: Windows –XP is an O.S. isused for Personal Computers (PCs)
ISE Dept., CIT, Gubbi. Page 7 Computer Programming Laboratory 2015-2016
Unix and XENIX are the OSs used for multi-user computers. Windows 7, Windows 8, Macintosh OS, Fedora, and Android, etc.
Types of Operating Systems:The operating systems are classified into 7 types based on their capability and usage.
Fig 3: Types of OS
Batch Processing Tasking OS: The data is collected into a group called batch and provides only one batch (one after another) of jobs as input to the computer system at a time. The jobs in a batch are processed on first come first serve basis. In this type, the process takes place at specified time intervals i.e. weekly or monthly without user interaction. E.g.Punch cards were using to store the data in batch processing and in payroll preparation in a business batch processing was helpful. Single user and single tasking OS: The OS that allows only one program to execute at a time is called single user single tasking operating system. Using this operating system user can do only one task at a time. E.g. DOS (Disk Operating System). Single user and multi tasking OS: The OS that allows a single use to perform more than one task at a time is called single user multi tasking operating system. While working with the Ms-Word user can perform other work like print a document, listen music.E.g. Windows-XP, Windows Vista, Windows – 7, etc. Multi user and multitasking OS: The O.S. that allows two or more users to use a main computer system to do more than one task is called multiuser and multitasking operating system.E.g. Unix is a multiuser and multitasking operating system. Multiprocessing OS : The OS that allows multiple programs to be executed by multiple CPUs (Processors) is called multiprocessing operating system. Super and main frame computers have more than one CPU and multiprocessing operating system. Real Time Operating System (RTOS): The OS that is used for real time applications and to carry out certain calculations within the specified time constraint. This OS is used in applications such as mobile phones, supporting systems in hospitals, nuclear power plants, oil refining, chemical processing, environmental applications and air-traffic control systems, disaster management etc., Virtual machine OS: Allows several users of a computer system to operate as if each has the only terminal attached to the computer.
Basics of Networking & Topology and Network Interface Card(NIC): Introduction to Computer Network:
ISE Dept., CIT, Gubbi. Page 8 Computer Programming Laboratory 2015-2016
A computer network is a collection of computers and devices interconnected to facilitate sharing of resources among interconnected devices. Advantages of Computer Networks includeFile Sharing, Resource Sharing, Increased Storage Capacity, Load Sharing and Facilitate communications. Computers in a network can be connected by using telephone lines, cables, satellite links, etc., Wireless network will use radio signals to exchange the information.
Basic components of a computer network: The basic components of a network are as follows. 1. Protocol: Set of rules used during the data transmission. 2. Transmission Medium: The media used to connect computer to each other like telephone lines, twisted pair wire, co-axial cable, fiber optics, satellite signals and radio signals, etc. 3. Processors: Modem, Multiplexers, bridges, routers, gateways, hub etc. are the processors used in the network for the flow of data. 4. Channels: Analog/Digital, Synchronous/Asynchronous, Switched/Non switched, Simplex / duplex, etc. 5. Topology: Physical network layout used for networking. For example, bus topology, star topology, ring topology, and mesh topology 6. Software: User interface software like Internet Explorer, Netscape Navigator, FTP (File Transfer Protocol), Telnet (Telecommunication Network), PPP (Point to Point Protocol), and SMTP (Simple Mail Transfer Protocol) etc.
Types of Networks: The computer networks are mainly classified into 3 types LAN MAN WAN Local Area Network Metropolitan Area Network Wide Area Network A group of computers that are A network which covers large A network which covers a large connected in a small area such as area like a city area like a state, country or across building, home, office etc i.e. a continent. within a small campus Distance covered by this Distance covered by this network Distance covered by this network network is less than 1 KM is 5 to 50 KM. is 100 to 1000 KM Used within a single building Used by private organization like Used all over the world. i.e. good like home or office cable television in our city. example is internet Computers are connected A network device called router is It uses fibre optics, cables and through the twisted pair cables used to connect the LANs even satellite signals as a and co axial cables. together transmission media. Transmitting data is cheaper Transmitting data is costlier Transmitting data is more costlier Transmission data is generally Transmission data is generally Transmission data is generally
ISE Dept., CIT, Gubbi. Page 9 Computer Programming Laboratory 2015-2016
error free error prone error free
Network Topologies: Topology refers to the schematic description of the arrangement of a network. It is the actual geometric layout of computers and other devices connected to the network. Types of Network Topologies: These are mainly classified into 4 types. 1. Bus Topology: In this network structure, a single cable runs in a building or campus. All the nodes (terminals / computers)are connected to this single cable. It is suitable for Local Area Network. Advantages: Failure of one node will not affect the whole network. Well suited for quick setup Easy to install and expand High rate of data transmission as compare to star and ring topology Disadvantages: A cable break can disable the entire network Trouble shouting is very difficult Only a single message can travel at a time
2. Ring Topology: In this network structure, all the computers are connected to each other in the form of a ring.i.e. first node is connected to second, second to third and so on. Finally last node is connected to first one. Advantages: All the nodes have equal chance to transfer the data These are easily extensible It can span longer distance than other type of networks
Disadvantages: Difficult to install Expensive Difficult to troubleshoot Adding or removing computer can disturb the entire network
ISE Dept., CIT, Gubbi. Page 10 Computer Programming Laboratory 2015-2016
3. Star Topology: In this network structure, all the computers are connected with a centralized system called server. The central computer is also called a hub. To transmit information from one node to another node, it should be transmitted through a central hub. The central hub manages and controls all the functions of network. Advantages: Easy to install and expand. Addition or deletion of a node is easier. Failure of one node will not affect the entire network. Well suited for quick setup Easier to debug network problems through a hub Disadvantages: Failure of a central system i.e. hub will affect the whole network Cost of hub is expensive.
4. Mesh Topology In this network structure, all the computers and network devices are interconnected with one another like a mesh. Every node has a connection to every other node in the network. This topology is not commonly used for most computer networks because of its installation difficulty and expensive. Advantages: Failure of a single node will not affect the entire network Data transfer rate is very fast because all the nodes are connected to each other. Disadvantages: Installation and re configuration is very difficult Costlier
Hybrid Topology: Each of the topologies has their own advantages and disadvantages. So in the real world, a pure start or pure ring or bus is rarely used. Rather a combination of two or more topologies is used. Hence, hybrid network topology uses a combination of any two or more topologies in such a way that the resulting network does not exhibit one of the standard topologies (e.g., bus, star, ring, etc.). Two very commonly used hybrid network topologies include the star ring network and star bus network.
Network Interface Cards (NICs): This is the important hardware component, which connects the machine to the computer network. This will be fixed into one of the free slot on the mother board. It has one port for the connection of a network cable. These cards typically use an Ethernet connection
ISE Dept., CIT, Gubbi. Page 11 Computer Programming Laboratory 2015-2016 and are available in 10, 100, and 1000 Base-T configurations. A 100 Base-T card can transfer data at 100 Mbps. The cards come in ISA and PCI versions and are made by companies like 3Com and LinkSys.
Laboratory Session-2
Write-up on RAM, SDRAM, FLASH memory, Hard disks, Optical media, CD-ROM/R/RW, DVDs, Flash drives, Keyboard, Mouse, Printers and Plotters. Introduction to flowchart, algorithm and pseudo code. Random Access Memory (RAM): RAM is basically main memory of the computer. RAM is a semiconductor memory made up of small memory chips that form a memory module. These modules are installed in the RAM slots on the motherboard of computer. Every time you open a program, it gets loaded from the hard drive into the RAM. This is because reading data from the RAM is much faster than reading data from the hard drive.
Synchronous Dynamic Random Access Memory (SDRAM): It is an improvement to standard DRAM because it retrieves data alternately between two sets of memory. This eliminates the delay caused when one bank of memory addresses is shut down while another is prepared for reading. It is called "Synchronous" DRAM because the memory is synchronized with the clock speed that the computer's CPU bus speed is optimized for. The faster the bus speed, the faster the SDRAM can be. SDRAM speed is measured in Megahertz. FLASH memory: Flash memory is a type of Electrically Erasable Programmable Read-Only Memory (EEPROM). The name comes from how the memory is designed -- a section of memory cells can be erased in a single action or in a "flash.". Flash memory cards used for digital cameras, cellular phones, networking hardware, and PC cards.
Hard disks: Hard disk is prime unit of storage of the computer. Huge amount of data can be stored and accessed in few milliseconds. The hard disk consists of more number of disks arranged in the cylindrical order, one above another on a spindle. The read/write heads are attached to single access mechanism so that they cannot move independently. All read/write heads are moved together to position that heads on the required track. The hard disks available today ranges from 200 GB to 2TB and so on. The present day hard disk ranges from 3600 rpm to more than 10000 rpm and so on. Advantages: High storage capacity, high data accessing rate and permanent storage medium. Disadvantages: It is not portable.
Optical media: An optical storage media is kind of storage, which is coated with thin metal on which bits are stored. The data can be stored in to optical storage media or read form the optical storage media.
ISE Dept., CIT, Gubbi. Page 12 Computer Programming Laboratory 2015-2016
The devices which perform read or write operation on optical storage media are called optical storage media. The laser technology is used to read the data or write the data on optical storage devices.
Examples: CD-ROM, DVD etc. Compact Disc Read-Only-Memory (CD-ROM): It is a type of optical disc that uses laser technology to read and write data on the disc. The information stored on CDROM becomes permanent and cannot be altered. This means that the stored information can only be read for processing. A CD-ROM uses the round shaped optical disk to store data, applications, games and audio files. It can store up to 700 MB of data. It has become integral part of every organization due to its features like reliability, reasonable, storage capacity and easy to use of carry. CD-Drive will be with motor to rotate the disks to perform read and write operations. A CD-drive will consists of the components like Disc drive, disk drive motor, laser pick up assembly tracking drive and tracking motor and so on.
Compact Disk Recordable (CD-R): The CD-R allows you to create your own CD.CD-R drives have the ability to create CDs but they can write data on the disk only once.CD-R technology also called as Write Once-Read much (WORM) technology. Laser technology is used to write the data on the compact disk.CD-R drives come in IDE, SCSI and USB models. Compact Disc Rewritable (CD-RW): CD-RW is an erasable optical disk which is used to write data multiple times on a disk, CD-RW disks are good for data backup, data archiving or data distribution on CDs. The disk normally holds 700MB of data. Technology to write data multiple times on a CD was known as the Phase change Dual (PD) technology. The reflective properties of a CD-RW are different than regular CD-ROM disks. Digital Video Disk or Digital Versatile Disc (DVD-ROM): A DVD is a small optical disk having high density medium and capable of storing a full-length movie on a single disk. The high density is achieved by using both sides of the disk, special data-compression technology, and extremely small tracks to store the data. Advantages: Storage capacity is more compared to CDs. Flash Drives (Pen drives): USB flash drives are removable, rewritable, and physically much smaller drives weighing even less than 30 g. A flash drive consists of a small printed circuit board carrying the circuit elements and a USB connector, insulated electrically and protected inside a plastic, metal, or rubberized case which can be carried in a pocket or on a key chain.
Advantages Data stored on flash drives is impervious to scratches and dust Mechanically very robust Easily portable Have higher data capacity than any other removable media. Compared to hard drives, flash drives use little power Flash drives are small and light-weight devices
ISE Dept., CIT, Gubbi. Page 13 Computer Programming Laboratory 2015-2016
Flash drives can be used without installing device drivers.
Disadvantages Can sustain only a limited number of write and erase cycles before the drive fails. Most flash drives do not have a write-protect mechanism Flash drives are very small devices that can easily be misplaced, left behind, or otherwise lost. The cost per unit of storage in a flash drive is higher than that of hard disks
Keyboard: A keyboard is the primary input deviceused in all computers. Keyboard has a group of switches resembling the keys on an ordinary typewriter machine. Normally keyboard has around 101 keys. The keyboard includes key that allows us to type letters, numbers and various special symbols such as *, /, [ , % etc. Mouse: The mouse is the key input device to be used in a Graphical User Interface (GUI). The users can use mouse to handle the cursor pointer easily on the screen to perform various functions like opening a program or file. With mouse, the users no longer need to memorize commands, which was earlier a necessity when working with text-based command line environment such as MS-DOS. Advantages: Easy to use; Cheap; Can be used to quickly place the cursor anywhere on the screen Helps to quickly and easily draw figures Point and click capabilities makes it unnecessary to remember certain commands
Disadvantages: Needs extra desk space to be placed and moved easily The ball in the mechanical mouse needs to be cleaned very often for smooth movements
Printers: The printer is an output device, which is used to get hard copy of the text displayed on the screen. The printer is an external optional device that is connected to the computer system using cables. The printer driver software is required to make the printer working. The performance of a printer is measured in terms of Dots Per Inch (DPI) and Pages Per Minute (PPM) produced by the printer.
Types of Printers: 1) Impact Printers: Impact printers are those printers in which a physical contact is established between the print head, ribbon (cartridge) and paper. E.g. Dot Matrix Printers 2) Non-Impact Printers: No physical contact is established between the print head, ribbon (cartridge) and paper .E.g. Inkjet Printers and Laser Printer Dot matrix, Inkjet and Laser printers
Sl. Dot Matrix Printer Inkjet Printer Laser Printer N o.
1 Impact Printer Non-impact Printer Non-impact printer
ISE Dept., CIT, Gubbi. Page 14 Computer Programming Laboratory 2015-2016
2 It uses metal pins in its head Its print head does not have metal The laser printer uses a beam of to create text and graphics pins; instead it has several tiny laser for printing. in the form of dots. nozzles that spray ink onto the paper. Each nozzle is thinner than hair.
3 The process of printing The ink cartridges are attached to The printer uses a cylindrical involves striking a pin the printer head that moves drum, a toner and the laser against a ribbon to produce horizontally from left to right. beam. its output.
4 Printing speed is slower Printing speed is slower than laser Printing speed is higher than than laser printer, dot matrix. both.
5 Character by character Line by line printing It is a page printer printing
6 Low quality printing High quality printing High quality printing
7 Less expensive High expensive High expensive
8 Generates much noise while Generates less noise while printing No noise printing
9 Speed is measured in DPI Speed is measured in CPI Speed is measured in PPM (Dots Per Inch) (Characters Per Inch) (Pages Per Minute)
10 Monochrome (Black & Colour printer Monochrome and colour printer White) Printers
11
Plotters: A plotter is similar to printer that produces hard-copy output with high-quality colour graphics. Plotters are generally more expensive than printers, ranging from about $1000 to $75000. Problem Solving Techniques: The process of working through details of a problem to reach a solution. There are three approaches to problem solving:
Algorithm Flowchart Pseudo Code Algorithm: The algorithm is a step-by-step procedure to be followed in solving a problem. It provides a scheme to solve a particular problem in finite number of unambiguous steps. It helps in implementing the solution of a problem using any of the programming languages.
ISE Dept., CIT, Gubbi. Page 15 Computer Programming Laboratory 2015-2016
In order to qualify as an algorithm, a sequence of instructions must possess the following characteristics: Definiteness: Instructions must be precise and unambiguous i.e. each and every instruction should be clear and should have only one meaning. Finiteness: Not even a single instruction must be repeated infinitely. i.e., each instruction should be performed in finite time. Termination: After the algorithm gets executed, the user should get the desired result Key features of an algorithm: Any algorithm has a finite number of steps and some steps may involve decision making, repetition. Broadly speaking, an algorithm exhibits three key features that can be given as: Sequence: Sequence means that each step of the algorithm is executed in the specified order. Decision: Decision statements are used when the outcome of the process depends on some condition. Repetition: Repetition which involves executing one or more steps for a number of times can be implemented using constructs like the while, do-while and for loops. These loops executed one or more steps until some condition is true.
Example: To compute the Area of Rectangle ALGM: AREA_of_RECTANGLE [This algorithm takes length and breadth, the sides of the rectangle as input and computes the area of rectangle using the formula area=length * breadth. Finally it prints the area of rectangle] STEPS: Step 1:[Initialize] Start Step 2: [Input the sides of Rectangle] Read length, breadth Step 3:[Compute the area of rectangle] Arealength*breadth Step 4:[Display the Area] Print Area Step 5: [Finished] Stop Flowcharts: A flowchart is a graphical or symbolic representation of an algorithm. They are basically used to design and develop complex programs to help the users to visualize the logic of the program so that they can gain a better understanding of the program and find flaws, bottlenecks, and other less- obvious features within it. Basically, a flowchart depicts the “flow” of a program. The following table shows the symbols used in flowchart along with its descriptions.
Symbol Name Description
oval Represents the terminal point
Rectangle Represents the process steps defined in algorithm
ISE Dept., CIT, Gubbi. Page 16 Computer Programming Laboratory 2015-2016
Parallelogram Indicate the reading Operation used for input/output or data or information from/to any device
Diamond Indicates the decisions (questions) and consequently the branch points or the paths to be followed based on the result of the question
Arrows Shows the flowchart direction and connects the various flow chart symbols
Small circle Shows the continuation from one point in the process flow to another
Hexagon Represents Looping structures
Predefined Process Indicates Subroutines
Advantages of Flowcharts: A flowchart is a diagrammatic representation that illustrates the sequence of steps that must be performed to solve a problem. They are usually drawn in the early stages of formulating computer solutions to facilitate communication between programmers and business people. Flowcharts help programmers to understand the logic of complicated and lengthy problems. They help to analyse the problem in a more effective manner Flowchart can be used to debug programs that have error(s). E.g.: To compute the Area of Rectangle
Limitations of using Flowcharts: Drawing flowcharts is a laborious and a time consuming activity. Flowchart of a complex program becomes, complex and clumsy. At times, a little bit of alteration in the solution may require complete re-drawing of the flowchart Essentials of what is done may get lost in the technical details of how it is done. There are no well-defined standards that limits the details that must be incorporated in a flowchart
ISE Dept., CIT, Gubbi. Page 17 Computer Programming Laboratory 2015-2016
Pseudocode: It is a form of structured English that describes algorithms. It facilitates the designers to focus on the logic of the algorithm without getting bogged down by the details of language syntax. Pseudocode is a compact and informal high-level description of an algorithm that uses the structural conventions of a programming language. It is meant for human reading rather than machine reading, so it omits the details that are not essential for humans. Such details include keywords, variable declarations, system-specific code and subroutines. There are no standards defined for writing a pseudocode because it is not an executable program. Flowcharts can be considered as a graphical alternative to pseudocode, but are more spacious on paper.
E.g.: To compute the area of Rectangle Begin Input length, breadth Area=length*breadth Print Area End
ISE Dept., CIT, Gubbi. Page 18 Computer Programming Laboratory 2015-2016
PART – B Problem Solving in C - Implementation of the following problems with WINDOWS / LINUX platform using appropriate C compiler. 1.Quadratic Equation
1. Design and develop a flowchart or an algorithm that takes three coefficients (a, b, and c)of a Quadratic equation (ax2+bx+c=0) as input and compute all possible roots. Implement a C program for the developed flowchart/algorithm and execute the same to output the possible roots for a given set of coefficients with appropriate messages
Purpose: This program demonstrates IF, IF-ELSE conditional constructs. Procedure: To read the coefficients a, b, c and check if any of the coefficients value is 0. If any coefficient value is 0, print appropriate messages and re-run the program. Otherwise, calculate discriminate. Based on the discriminate value, classify and calculate all possible roots and print them with suitable messages. Input: Three coefficients of quadratic equationax2+bx+c=0: a, b, c Expected Output: This program computes all possible roots for a given set of coefficients with appropriate messages. The possible roots are: Linear equation and its roots, Real & equal roots ,,Real & distinct roots and Imaginary roots
ALGORITHM : ALGM: Quadratic Equation [This algorithm takes three coefficients as input and computes the roots] Steps: 1. [Initialize] Start 2. [Input coefficients of quadratic equation] read a ,b, c 3. [Check for valid coefficients] If a =0 and b= 0 then print “Roots cannot be determined” [Check for linear equation] else a=0then root1 ← (-c/b) print “Linear equation”,root1 goto step 5 4. [Compute discriminate value] disc ← b*b-4*a*c 5. [Based on discriminate value, classify and calculate all possible roots and print them]
5.1 [If discriminate value is 0, roots are real & equal.] if disc=0 then root1← root2 ← (-b/2*a) ` print “Real & equal roots”, root1, root2 5.2 [ If discriminate value is >0, roots are real & distinct.] else if disc>0then root1← (-b+√disc)/(2*a)
ISE Dept., CIT, Gubbi. Page 19 Computer Programming Laboratory 2015-2016
root2 ← (-b-√disc)/(2*a) print “Real & distinct roots”, root1, root2 5.3 [ If discriminate value is <0, roots are imaginary.] else real ← -b/(2*a) imag ← √(fabs(disc))/(2*a) root1 ← (real) + i (imag) root2 ← (real) - i (imag) print “Imaginary roots”, root1, root2 endif endif 6. [Finished] End
ISE Dept., CIT, Gubbi. Page 20 Computer Programming Laboratory 2015-2016
FLOWCHART:
F T T F
F F T T
PROGRAM : /* Program to calculate all possible roots of a quadratic equation */ #include
getch(); }
disc = b*b - 4*a*c; if(disc == 0) { printf("The roots are real and equal\n"); root1 = root2 = -b/(2*a); printf("Root1 = %.3f \nRoot2 = %.3f", root1,root2); } else if(disc>0) { printf("The roots are Real and Distinct\n"); root1 = (-b+sqrt(disc)) / (2*a); root2 = (-b-sqrt(disc)) / (2*a); printf("Root1 = %.3f \nRoot2 = %.3f",root1,root2); } else { printf("The roots are Real and Imaginary\n"); real = -b / (2*a); imag = sqrt(fabs(disc)) / (2*a);//fabs() returns only numberignoring sign printf("Root1 = %.3f + i %.3f \n",real,imag); printf("Root2 = %.3f - i %.3f",real,imag); }
getch(); }
ISE Dept., CIT, Gubbi. Page 22 Computer Programming Laboratory 2015-2016
OUTPUT: 1. Enter a, b, c values 0 0 1 Invalid coefficients Try Again with valid inputs!!!!
2. Enter a, b, c values 1 2 3 The roots are Real and Imaginary Root1 = -1.000 + I 1.414 Root2 = -1.000 – I 1.414
3. Enter a, b, c values 1 2 1 The roots are real and equal Root1 = -1.000 Root2 = -1.000
4. Enter a, b, c values 1 5 3 The roots are Real and Distinct Root1 = -0.697 Root2 = -4.303
5. Enter a, b, c values 0 1 2 Linear equation Root = -2.000
2.Palindrome
2. Design and develop an algorithm to find the reverse of an integer number NUM and check whether it is PALINDROME or NOT. Implement a C program for the developed algorithm that takes an integer number as input and output the reverse of the same with suitable messages. Ex: Num: 2014, Reverse: 4102, Not a Palindrome.
Purpose: This program demonstrates the WHILE loop.
ISE Dept., CIT, Gubbi. Page 23 Computer Programming Laboratory 2015-2016
Procedure: Input the original number num, reverse it to rev. Check whether original number num is same as its reverse number rev. If it is same, the number is palindrome. Otherwise, the given number is not palindrome. Input: An integer number num. Expected Output: Reversed number rev and checks whether it is palindrome or not.
ALGORITHM :
ALGM: Palindrome [This algorithm takes an integer number as input and output the reverse of the same. Also checks the number is palindrome or not] Steps: 1. [Initialize] Start 2. [Input the original number] read num 3. [Set number num to a variable n] n ← num 4. [Iterate until num is not equal to 0. If num value becomes 0, control comes out of the loop. So num’s original value is lost. So, num value is stored in other variable n in step 3. In step 4, reverse of the number is calculated.] while ( num != 0) do remainder ← num mod 10 num ← num/10 rev ← rev * 10 +remainder 5. [Print reverse number] print rev 6. [Check if original number & reverse number are same. If it is, number is palindrome. Otherwise, not palindrome] if (rev = n) then print palindrome else print not a palindrome endif 7. [Finished] End
FLOWCHART:
False
True
ISE Dept., CIT, Gubbi. Page 24 Computer Programming Laboratory 2015-2016
False True
PROGRAM :
/* Program to calculate whether a given number is palindrome or not */ #include
ISE Dept., CIT, Gubbi. Page 25 Computer Programming Laboratory 2015-2016
num = num/10; rev = rev*10+ remainder; } printf("The reverse number is %d",rev); if(rev == temp) printf("\n%d is a palindrome",temp); else printf("\n%d is not a palindrome", temp); getch(); } OUTPUT: 1. Enter the number 1001 The reverse number is 1001 1001 is a palindrome
2. Enter the number 123 The reverse number is 123 123 is not a palindrome
3.Square Root and Leap Year
3.1 Square Root of a given Number
Design and develop a flowchart to find the square root of a given number N. Implement a C program for the same and execute for all possible inputs with appropriate messages. Note: Don’t use library function sqrt(n). ALGORITHM: ALGORITHM: SQUARE ROOT[this algirithm takes an integer number as an input and prints the square root of the number] Input: the integer number Output: print the square root number Step1: Initialize Step2: Enter the number Step3: if(n>=0) then Print the square root result Else Print it is not a valid number Step4: stop
ISE Dept., CIT, Gubbi. Page 26 Computer Programming Laboratory 2015-2016
FLOWCHART:
True False
False True
False True
PROGRAM : /* Program to calculate square root of the given number without using built in function */ #include
ISE Dept., CIT, Gubbi. Page 27 Computer Programming Laboratory 2015-2016
if((x*x > (double)n)) { x = x - 0.001; break; } } printf("The square root of the given number is %.3lf\n", x); printf("The square root as per built in function sqrt()is %.2lf", sqrt(n)); } else { printf( "No square root to a negative number"); } getch(); } OUTPUT: 1. Enter the number 16 The square root of the given number is 4.000 The square root as per built in function sqrt() is 4.00
2. Enter the number 27 The square root of the given number is 5.196 The square root as per built in function sqrt() is 5.20 3. Enter the number -4 No square root to a negative number 3.2 Leap Year
Design and develop a C program to read a year as an input and find whether it is leap year or not. Also consider end of the centuries. ALGORITHM: ALGM: Leap Year Input An year Output Leap year or not complexity O(1). leapyear(year) Steps Start 1 If (year %4==0 and year%100 !=0) 2 print "it is a leap year"; 3 else 4 if(year%400==0) 5 print "it is a leap year"; 6 else 7 print "it is not a leap year"; End
ISE Dept., CIT, Gubbi. Page 28 Computer Programming Laboratory 2015-2016
ISE Dept., CIT, Gubbi. Page 29 Computer Programming Laboratory 2015-2016
FLOWCHART:
If the number is valid if the number is not valid
PROGRAM : /* Program to find whether given year is leap year or not */ #include
OUTPUT:
ISE Dept., CIT, Gubbi. Page 30 Computer Programming Laboratory 2015-2016
1. Enter valid year 2012 2012 is leap year
2. Enter valid year 1900 1900 is not a leap year
4.Polynomial Equation
Design and develop an algorithm for evaluating the polynomial f(x) = a4x4 + a3x3 + a2x2+ a1x + a0, for a given value of x and its coefficients using Horner’s method. Implement a C program for the developed algorithm and execute for different sets of values of coefficients and x.
Input: An array of different set of values of coefficients a4, a3, a2, a1and constant a0-a[] Indeterminate or variable –x, Number of coefficients Expected Output: Sum of all terms of the polynomial - sum Purpose: This program describes FOR loop. Procedure: To read x, n, a[ ] . Calculate the terms of polynomial and add each term to sum by iterating from n to 0. Then print sum value.
ALGORITHM :
ALGM: EVAL_POLYNOMIAL f(x) = a4x4+ a3x3+ a2x2+ a1x+ a0using Horner’s method Steps: 1. [Initialize] Start 2. [Input the number of coefficients n] read n 3. Set sum to 0 4. [Read all coefficients a1, a2, a3, a4and constanta0] For each value i in array a(i)do read n+1 coefficients endfor 5. [Input variable x] read x 6. [Iterate from n to 0. Calculate each term a4x4, a3x ,a2x2,a1x, a0 . ] For each value iin array a(i) do sum ← sum * x + a[i] endfor
ISE Dept., CIT, Gubbi. Page 31 Computer Programming Laboratory 2015-2016
7. Print sum 8. [Finished] End
FLOWCHART:
false
true
false
true
PROGRAM : /* Evaluating the polynomial f(x) = a4x4+ a3x3+ a2x2+ a1x+ a0 using Horner’s method (n, i, sum, a[], x) */
ISE Dept., CIT, Gubbi. Page 32 Computer Programming Laboratory 2015-2016
#include
OUTPUT: 1. enter the number of co-efficients n>=0 4 enter the n+1 co-efficients Enter a[4] th coefficient : 1 Enter a[3] th coefficient : 2 Enter a[2] th coefficient : 3 Enter a[1] th coefficient : 4 Enter a[0] th coefficient : 5 enter value of x 1 the value of sum is 15
2. enter the number of co-efficients n>=0 0 enter the n+1 co-efficients Enter a[0] th coefficient : 25 enter value of x 25 5. Sine Series Draw the flowchart and Write C Program to compute Sin(x) using Taylor series approximation given by Sin(x)Compare the result with the built- in Library function and print both the results with appropriate message. ALGORITHM:
ISE Dept., CIT, Gubbi. Page 33 Computer Programming Laboratory 2015-2016
ALGORITHM: SINE SERIES[this algorithm takes degree as an input to print the sine function value] Input : Degree Output : Sine function value Step 1: start Step 2: enter the degree Step 3: convert degree into radian X <- degree*(PI/180) Step 4: check the given number is odd/not If(it is a odd number) Then { term = nume/deno; nume = -nume*x*x; deno = deno*i*(i+1); } else { If(term<0.001) { Print thr sine value } else { Check the number } } Step 5: stop
ISE Dept., CIT, Gubbi. Page 34 Computer Programming Laboratory 2015-2016
FLOWCHART:
False true
True false
ISE Dept., CIT, Gubbi. Page 35 Computer Programming Laboratory 2015-2016
PROGRAM: /* Program to calculate sine value of given angle */ #include
OUTPUT: 1. Enter the value of degree 0 The sine of 0 is 0.000 The sine function of 0 is 0.000
2. Enter the value of degree 45 The sine of 45 is 0.707 The sine function of 45 is 0.707
3. Enter the value of degree 90 The sine of 90 is 1.000 The sine function of 90 is 1.000 6. Bubble Sort
Develop an algorithm, implement and execute a C program that reads N integer numbers and arrange them in ascending order using Bubble Sort.
ISE Dept., CIT, Gubbi. Page 36 Computer Programming Laboratory 2015-2016
Purpose: This program demonstrates NESTED FOR loop. Procedure: To read an array of elements a[ ] . While iterating, compare each pair of adjacent items in every pass. If the former value is greater than the latter one, their positions are swapped. Over a number of passes, at most equal to the number of elements in the list, all of the values drift into their correct positions. Then print sorted array elements. Input: Number of Elements – n An array of unsorted elements – a[ ] Output: An array of sorted elements – a[ ]
ALGORITHM :
ALGM: Bubble Sort [ This algorithm takes a list of unordered numbers and arrange them in ascending order using Bubble Sort method] Steps: 1. [Initialize] Start 2. [Input number of elements] read n 3. [Input unsorted elements in array] read elements in array a[ ] 4. print elements of array a[ ] 5. [Iterate array a[ ] in two loops. Outer loop gives number of passes. Inner loop does swap task.In each pass, compare each pair of adjacent items. If former element is greater than latter one, swap them.] [Iterate array a[ ] with for each value i in array a[i] to n do for each value j in array a[j] to n-1 do [Compare each pair of adjacent elements] if (a[j] > a[j+1])then [Swap these elements using temp variable] temp ← a[j] a[j] ← a[j+1] a[j+1] ← temp endif endfor endfor 6. Print array with sorted elements
7. [Finished] End.
FLOWCHART:
ISE Dept., CIT, Gubbi. Page 37 Computer Programming Laboratory 2015-2016
false true
false true
true false
true
False
ISE Dept., CIT, Gubbi. Page 38 Computer Programming Laboratory 2015-2016
PROGRAM: #include
2. Enter the no. of elements : 6 Enter the array elements 6 5 4 3 2 1 The original elements are 6 5 4 3 2 1 The Sorted elements are 1 2 3 4 5 6
ISE Dept., CIT, Gubbi. Page 39 Computer Programming Laboratory 2015-2016
7. Matrix Multiplication Develop, implement and execute a C program that reads two matrices A(m x n )and B(p x q) and Compute the product A and B. Read matrix A in row major order and matrix B in column major order. Print both the input matrices and resultant matrix with suitable headings and in matrix format. Program must check the compatibility of orders of the matrices for multiplication. Report appropriate message in case of incompatibility. ALGORITHM: ALGM: matrix multiplication Input two matrixes. Output Output matrix C. Complexity O(n^3)
Step 1: GET THE MATRIX SIZE OF a Input the size of matrix a and read the values of m and n.
Step 2: GET THE MATRIX VALUE OF a For i=0 to n-1 For j=0 to n-1 Read a[i][j] End For End For
Step 3: GET THE MATRIX SIZE OF b Input the size of matrix b and read the values of p and q.
Step 4: GET THE MATRIX VALUE OF b For i=0 to p-1 For j=0 to q-1 Read b[i][j] End For End For
STEP :5 MULTIPLICATION OF MATRICES NOT POSSIBLE If(n!=p) Print(“multiplication is not possible”) Stop End if
STEP 6: MULTIPLICATION OF MATRICES IS POSSIBLE For i=0 to m-1 For j=0 to q-1 Sum=0 For k=0 to n-1 Sum=Sum+a[i][k]*b[k][j] End for End for
Step 7: DISPLAY RESULT For i=0 to m-1 For j=0 to q-1 Print c[i][j] End for End for
ISE Dept., CIT, Gubbi. Page 40 Computer Programming Laboratory 2015-2016
Step 8: STOP stop
ISE Dept., CIT, Gubbi. Page 41 Computer Programming Laboratory 2015-2016
FLOWCHART:
NO
YES
NO
YES NO YES
NO
YES NO YES
NO
YES NO YES
NO
YES
NO YES NO YES
NO
YES NO YES
ISE Dept., CIT, Gubbi. Page 42 Computer Programming Laboratory 2015-2016
NO
YES NO
YES
PROGRAM : #include
ISE Dept., CIT, Gubbi. Page 43 Computer Programming Laboratory 2015-2016
#include ISE Dept., CIT, Gubbi. Page 44 Computer Programming Laboratory 2015-2016 } getch(); } OUTPUT: 1. Enter the size of first matrix 2 3 Enter the size of second matrix 3 2 Enter the elements of first matrix 1 2 3 4 5 6 Enter the elements of the second matrix 1 2 3 4 5 6 A- matrix is 1 2 3 4 5 6 B- matrix is 1 2 3 4 5 6 The product of two matrix is 22 28 49 64 2. Enter the size of first matrix 1 2 Enter the size of second matrix 3 1 Matrix multiplication is not possible ISE Dept., CIT, Gubbi. Page 45 Computer Programming Laboratory 2015-2016 8. Binary Searching Technique Develop, implement and execute a c program to search a name in list of names using Binary Searching Technique ALGORITHM: ALGM: Binary search Input : The probabilities p1, ..., pn and q0, ..., qn and the size n, and it returns the tables e and root. Output : It returns the tables e and root. Complexity : O(n^3). OPTIMAL-BST(p, q, n) 1 for i = 1 to n + 1 2 do e[i, i - 1] = qi-1 3 w[i, i - 1] = qi-1 4 for l =1 to n 5 do for i = 1 to n - l + 1 6 do j = i + l - 1 7 e[i, j] = ∞ 8 w[i, j] = w[i, j - 1] + pj + qj 9 for r = i to j 10 do t = e[i, r - 1] + e[r + 1, j] + w[i, j] 11 if t < e[i, j] 12 then e[i, j] = t 13 root[i, j] = r 14 return e and root FLOWCHART: False true ISE Dept., CIT, Gubbi. Page 46 Computer Programming Laboratory 2015-2016 ISE Dept., CIT, Gubbi. Page 47 Computer Programming Laboratory 2015-2016 PROGRAM : /* progrm to search an name using binary search */ #include ISE Dept., CIT, Gubbi. Page 48 Computer Programming Laboratory 2015-2016 OUTPUT: 1. Enter the number of names to read, n= 5 Enter the names in ascending order Amar Chethan Girish Manoj Yadu Enter the name to be search: Chethan Name found in position :2 2. Enter the number of names to read, n= 5 Enter the names in ascending order Girish Manoj Yadu Amar Chethan Enter the name to be search: Kiran Name not found 9. String Copy and Frequency of Vowels 9. Write and execute a C program that i. Implements string copy operation STRCOPY(str1,str2) that copies a string str1 to another string str2 without using library function. ii. Reads a sentence and prints frequency of each of the vowels and total count of consonants. 9.1 String Copy without using library function Implements string copy operation STRCOPY(str1,str2) that copies a string str1 to another string Dept. of ISE, CIT, Gubbi. Page 49 str2 without using library function. This program supposed to be implemented using functions. ALGORITHM: ALGM: EVAL_POLYNOMIAL [To copy string i/p to its o/p, replacing each string of one or more blanks by a single blank]. Inputs: str1 and str2. Output: str1 -> str2. 1.Start 2. Read the text in Array c 3. FOR i← 0 to c [i] <> '\0' in steps of 1 IF c [i] = ' ' Print ' ' End If Until c [i] = ‘\0' Increment i End Until Print the character End For 4. Stop FLOWCHART: String matched string not matched Dept. of ISE, CIT, Gubbi. Page 50 Computer Programming Laboratory 2015-2016 Program : /* program to copy a string without using library function */ #include 2. Enter the source string 1234 Destination string is 1234 Dept. of ISE, CIT, Gubbi. Page 51 9.2 Vowels and Consonants Count ii. Reads a sentence and prints frequency of each of the vowels and total count of consonants. ALGORITHM: ALGM: VOWELS AND CONSONANTS COUNT[To read a sentence and prints frequency of each of the vowels and total count of consonants.] Input: Sentence. Output: Print vowels(a,e,i,o,u) ,consonants(other than vowels) and print their count. STEP 1.Set countCo:=0[C is the counter variable for consonants] STEP 2.Set countVo:=0[counter for vowels ] STEP 3.[find length of STR] Set L:=LENGTH(STR). STEP 4:TOLOWER(STR,L) [change all characters in string to lower case] STEP 5. Repeat for K:=0 to L-1: If STR[K]='a' OR STR[K]='e' OR STR[K]='i' OR STR[K]='o' OR STR[K]='u'.Then: Set countVo:=countVo+1 Else Set countCo:=countCo+1 [End of If-Else] [End of for loop] STEP 6.PRINT countVo,countCo [display results] STEP 7.EXIT/END Dept. of ISE, CIT, Gubbi. Page 52 Computer Programming Laboratory 2015-2016 FLOWCHART: If it consists vowels otherwise Dept. of ISE, CIT, Gubbi. Page 53 PROGRAM : /* program to prints frequency of vowels and total count of consonants */ #include 2. Enter the sentence qwerty@#$ No of vowels=1 Dept. of ISE, CIT, Gubbi. Page 54 Computer Programming Laboratory 2015-2016 No of consonants=5 10. Right Rotate and isprime or not 10. i)Design and develop a C function RightShift(x ,n) that takes two integers x and n as input and returns value of the integer x rotated to the right by n positions. Assume the integers are unsigned. Write a C program that invokes this function with different values for x and n and tabulate the results with suitable headings. ii) Design and develop a C function isprime(num) that accepts an integer argument and returns 1 if the argument isprime, a 0 otherwise. Write a C program that invokes this function to generate prime numbers between the given ranges 10.1 Right Rotate by n Positions Design and develop a C function Right Shift(x ,n) that takes two integers x and n as input and returns value of the integer X rotated to the right by n positions. Algorithm: ALGM: RIGHT ROTATE BY N POSITIONS [A ‘C’ function Right Shift(x ,n) that takes two integers x and n as input and returns value of the integer X rotated to the right by n positions.] Input: Integers x and n. Output: Integer X rotated to the right by n positions. 1.Start 2.Read xa ndn 3.Callfunction RR(x,n) 6.Printthe result 7.Stop Algorithm to rotate value by bits 1.IFn==0 Return x ELSE Return((x>>n)|(x<<(32-n))) 2. Return Dept. of ISE, CIT, Gubbi. Page 55 Flowchart: True false Program : /* program to rotate right */ #include Dept. of ISE, CIT, Gubbi. Page 56 Computer Programming Laboratory 2015-2016 else { x=x>>1; x=x+32768; } } return(x); } void main() { unsigned int x,y,n,i,value; char input; clrscr(); do { printf("\nEnter the number and the no of bits to be” “rotated\n"); scanf("%u %u",&x,&n); y=x; value=RightShift(x,n); printf("\nCALULATED VALUE rightrot of %u,%u=%u",y,n,value); printf("\nTocontinue press 'y' else press 'n'\n"); input=getche(); }while(input!='n'); getch(); } Output: 1. Enter the number and the no of bits to be rotated 4 1 CALULATED VALUE rightrot of 4,1=2 To continue press 'y' else press 'n' y Enter the number and the no of bits to be rotated 5 2 CALULATED VALUE rightrot of 5,2=16385 To continue press 'y' else press 'n' 10.2 To Check Prime or Not 10 ii). Design and develop a function isprime (x) that accepts an integer argument and returns 1 if the argument is prime and 0 otherwise. The function must use plain division checking approach to determine if a given number isprime. Invoke this function from the main with different values obtained from the user and print appropriate messages Algorithm: Dept. of ISE, CIT, Gubbi. Page 57 ALGM: CHECK PRIME OR NOT [A function isprime (x) that accepts an integer argument and returns 1 if the argument is prime and 0 otherwise.] Input : Any integer number (up to 32767) Output: Is it a prime number or Not Complexity O(n) Prime(num) 1 Set i=2 2 while i<=num/2 3 if num mod i = 0 4 print "Not a Prime number" and exit; 5 i=i+1 6 if (i==(num/2)+1) 7Print "Prime number" Flowchart: True false Dept. of ISE, CIT, Gubbi. Page 58 Computer Programming Laboratory 2015-2016 Program: //Function to check the given number is prime or not #include int isprime(int num) Dept. of ISE, CIT, Gubbi. Page 59 { int i; for(i=2;i<= m/2;i++) { if(m%i==0) { return 0; } } return 1; } Output: 1. Enter value of n 3 3 is prime number 2. Enter value of n 4 4 is not a prime number 11. Factorial of number using Recursive function Draw the flow chart and write a Recursive C function to find the factorial of number n! defined by fact(n)=1, if n=0, otherwise fact(n)=n*fact(n-1),using this function write a c program to compute the binomial co-efficient nCr. Tabulate the results for different values of n and r using suitable messages. Algorithm: ALGM: Factorial of number [A recursive C function to find the factorial of number n! defined by fact(n)=1, if n=0, otherwise fact(n)=n*fact(n-1)] FUNCTION FACTORIAL (N: INTEGER): INTEGER (* RECURSIVE COMPUTATION OF N FACTORIAL *) BEGIN (* TEST FOR STOPPING STATE *) IF N <= 0 THEN FACTORIAL := 1 ELSE FACTORIAL := N * FACTORIAL(N - 1) END; (* FACTORIAL *) Dept. of ISE, CIT, Gubbi. Page 60 Computer Programming Laboratory 2015-2016 Flowchart T F Program : #include Dept. of ISE, CIT, Gubbi. Page 61 int fact(int n) { if(n==0) { return 1; } return (n*fact(n-1)); } int main() { int n,r,res; clrscr(); printf("Enter the value of n and r\n"); scanf("%d%d",&n,&r); res=fact(n)/(fact(n-r)*fact(r)); printf("The NCR is = %d",res); getch(); } Output: 1. Enter the value of n and r 4 2 The NCR is =6 2. Enter the value of n and 7 3 The NCR is =6 12. Copy the Contents of File Given two university information files "studentname.txt" and "usn.txt" that contains students names and USN respectively. Write a C program to a new file called "output.txt" and copy the content of files "studentname.txt" and "usn.txt" into output file in the sequence shows below. Display the content of output file "output.txt" on to the screen. Note : Students are required to create two files “Studname.txt” and “Studusn.txt” with the Contents studname.txt studusn.txt Amar 1RN10CS005 Suresh 1RN10CS012 Dept. of ISE, CIT, Gubbi. Page 62 Computer Programming Laboratory 2015-2016 Kiran 1RN10CS036 Shashi 1RN10CS072 ALGORITHM: Input : Create the file fp1,fp2,fp3 Output : Print whether the files are found or not step1:start Step2: create the files (fp1,fp2, & fp3) Step3: while(!feof((fp1)&&!feof(fp2)) Step4:Both files the not created the print the file not found a). if only one file is created then print files not found. b).if both files are created the print files are found. Step5: stop FLOWCHART: Both the files are not Both files only one file is Created are created created Dept. of ISE, CIT, Gubbi. Page 63 Program /* Program on merge two files */ #include } fclose(fp3); getch(); } Output: Name USN Amar 1RN10CS005 Suresh 1RN10CS012 Kiran 1RN10CS036 Shashi 1RN10CS072 Dept. of ISE, CIT, Gubbi. Page 64 Computer Programming Laboratory 2015-2016 13. Student Record using Array of Structures Write a C program to maintain a record of "n" student details using an array of structures with four fields (Roll number, Name, marks, and Grade). Each field is of an appropriate data type. Print the marks of the student given name as input. ALGORITHM: Input: Enter the number of students Output: print the marks of the student. Step1: start Step2: enter the num of students Step3: if(strcmp(s[i].name, sname==0) Then { Print the marks of students name & USN } Else { Print the given date is invaid } Step4:stop FLOWCHART: Dept. of ISE, CIT, Gubbi. Page 65 N=3 N=2 N=3 Program: /* program to maintain a record of student using structrue */ #include Dept. of ISE, CIT, Gubbi. Page 66 Computer Programming Laboratory 2015-2016 scanf("%s", s[i].name); printf("enter the marks : "); scanf("%d", &s[i].marks); printf("enter the grade : "); fflush(stdin); scanf("%c",&s[i].grade); } printf("\nStudent details are \n"); printf("\nRollno\tName\t\t\tMarks\tGrade\n"); for(i=0;i Output: Enter the number of student details n=3 enter the 1 student details enter the roll number: 100 enter the student name without white spaces:vishwa enter the marks : 90 enter the grade : A enter the 2 student details enter the roll number: 101 enter the student name without white spaces:madhu enter the marks : 50 enter the grade : B enter the 3 student details enter the roll number: 102 enter the student name without white spaces:kiran enter the marks : 45 enter the grade : C Roll Name Marks Grad 100 vishwa 90 A 101 madhu 50 B 102 kiran 45 C Enter the student name to print the marks: madhu Dept. of ISE, CIT, Gubbi. Page 67 Marks of the student is : 50 14. Use of Pointers Write a C program using pointers to compute the sum, mean and standard deviation of all elements stored in an array of n real numbers. Mean : is the average of the numbers. i.e the sum of a collection of numbers divided by the number of numbers in the collection Standard deviation (SD): measures the amount of variation or dispersion from the average. For a finite set of numbers, the standard deviation is found by taking the square root of the average of the squared differences of the values from their average value. ALGORITHM: ALGM: COMPUTATION OF SUM, MEAN AND STANDARD DEVIATION [to compute the sum, mean and standard deviation of all elements stored in an array of n real numbers.] Input: Enter the n values Output: print the result for sum, mean, standard deviation Step 1:start Step2: Enter the value of n it may be integer or float Step3: for(i=0; i Dept. of ISE, CIT, Gubbi. Page 68 Computer Programming Laboratory 2015-2016 Step4:print the result for sum,mean,&stddev Step5:stop FLOWCHART: Enter the values Enter the values in integers in floating point Dept. of ISE, CIT, Gubbi. Page 69 Program: #include Output: Enter the no of elements 5 Enter the array elements 5 3 9 8 7 Dept. of ISE, CIT, Gubbi. Page 70 Computer Programming Laboratory 2015-2016 Sum=32.000 Mean=6.400 Standard deviation=2.154 Output: Dept. of ISE, CIT, Gubbi. Page 71 Output: Dept. of ISE, CIT, Gubbi. Page 72 Computer Programming Laboratory 2015-2016 Output: Dept. of ISE, CIT, Gubbi. Page 73 Output: Dept. of ISE, CIT, Gubbi. Page 74 Computer Programming Laboratory 2015-2016 Output: Dept. of ISE, CIT, Gubbi. Page 75 Output: Dept. of ISE, CIT, Gubbi. Page 76 Computer Programming Laboratory 2015-2016 Output: Dept. of ISE, CIT, Gubbi. Page 77 Output: Dept. of ISE, CIT, Gubbi. Page 78 Computer Programming Laboratory 2015-2016 Output: Dept. of ISE, CIT, Gubbi. Page 79 Output: Dept. of ISE, CIT, Gubbi. Page 80 Computer Programming Laboratory 2015-2016 Output: Dept. of ISE, CIT, Gubbi. Page 81 Output: Dept. of ISE, CIT, Gubbi. Page 82 Computer Programming Laboratory 2015-2016 Output: Dept. of ISE, CIT, Gubbi. Page 83 Output: Dept. of ISE, CIT, Gubbi. Page 84 Computer Programming Laboratory 2015-2016 Output: Dept. of ISE, CIT, Gubbi. Page 85 Output: Dept. of ISE, CIT, Gubbi. Page 86 Computer Programming Laboratory 2015-2016 Output: Dept. of ISE, CIT, Gubbi. Page 87 Output: Dept. of ISE, CIT, Gubbi. Page 88 Computer Programming Laboratory 2015-2016 Output: Dept. of ISE, CIT, Gubbi. Page 89 Output: Dept. of ISE, CIT, Gubbi. Page 90 Computer Programming Laboratory 2015-2016 Output: Dept. of ISE, CIT, Gubbi. Page 91 Output: Dept. of ISE, CIT, Gubbi. Page 92 Computer Programming Laboratory 2015-2016 Output: Dept. of ISE, CIT, Gubbi. Page 93 Output: Dept. of ISE, CIT, Gubbi. Page 94 Computer Programming Laboratory 2015-2016 Output: Dept. of ISE, CIT, Gubbi. Page 95 Output: Dept. of ISE, CIT, Gubbi. Page 96 Computer Programming Laboratory 2015-2016 Output: Dept. of ISE, CIT, Gubbi. Page 97 Output: Dept. of ISE, CIT, Gubbi. Page 98 Computer Programming Laboratory 2015-2016 Output: Dept. of ISE, CIT, Gubbi. Page 99 Output: Dept. of ISE, CIT, Gubbi. Page 100 Computer Programming Laboratory 2015-2016 Output: Dept. of ISE, CIT, Gubbi. Page 101 Output: Dept. of ISE, CIT, Gubbi. Page 102 Computer Programming Laboratory 2015-2016 Output: Dept. of ISE, CIT, Gubbi. Page 103 Output: Dept. of ISE, CIT, Gubbi. Page 104 Computer Programming Laboratory 2015-2016 Output: Dept. of ISE, CIT, Gubbi. Page 105 Output: Dept. of ISE, CIT, Gubbi. Page 106 Computer Programming Laboratory 2015-2016 Output: Dept. of ISE, CIT, Gubbi. Page 107 Output: Dept. of ISE, CIT, Gubbi. Page 108 Computer Programming Laboratory 2015-2016 Output: Dept. of ISE, CIT, Gubbi. Page 109 Output: } Dept. of ISE, CIT, Gubbi. Page 110