Data Type Conversion, Basic Computer Science

Assignment Help:
Sometimes you may drop to perform conversions among the built-in types. To translate between types you just use the type name as a function.
There are quite a few built-in functions to carry out conversion from one data type to another. These functions return a new object representing the changed value.
Function Description
Converts x to an integer. Base states the base if x is a string.
long(x [,base] ) Converts x to a long integer. Base identifies the base if x is a string.
float(x) Changes x to a floating-point number.
complex(real [,imag]) Generates a complex number.
str(x) Changes object x to a string representation.
repr(x) Changes object x to an expression string.
eval(str) Estimates a string and returns an object.
tuple(s) Changes s to a tuple.
list(s) Changes to a list.
set(s) Translates s to a set.
dict(d) Generates a dictionary. d must be a sequence of (key, value) tuples.
frozenset(s) Translates s to a frozen set.
chr(x) Translates an integer to a character.
unichr(x) Translates an integer to a Unicode character.
ord(x) Translates a single character to its integer value.
hex(x) Translates an integer to a hexadecimal string.
oct(x) Translates an integer to an octal string.

Related Discussions:- Data Type Conversion

Social networking, SOCIAL NETWORKING:  A social network is a network o...

SOCIAL NETWORKING:  A social network is a network of individuals which have some sort of interdependence on each other. This interdependence may be in the form of friendship,

Vector processing, what are the chrateristics of vector processing

what are the chrateristics of vector processing

The gigo principle, The GIGO Principle : This is a simple principle with a...

The GIGO Principle : This is a simple principle with a clear message and universal application - Garbage In - Garbage out! Always try and enter any data in the form you want to

Functions, each of the following functions has the form f(x ) = (ax+b) mod ...

each of the following functions has the form f(x ) = (ax+b) mod n. assume that each function has type N base n arrow N base n, so that we can think of f as a cipher for an alphabet

Explain the components of it infrastructure, Question 1 Explain in detail ...

Question 1 Explain in detail the different modes of Transportation Question 2 State the meaning of Distribution Strategies. Discuss the different Distribution Strategies

Computer processing, Computer Processing: Most of the earliest compute...

Computer Processing: Most of the earliest computer memories have been based on physical elements which can exist in just one of the two states (on or off): such an element cor

Provide a goms description of the procedure, Question : (a) You want to...

Question : (a) You want to perform the task of sending an e-mail message to three of your friends. You can assume that the email addresses, of the people you want to send the e

What help with this Assembly language Subroutine, Write an ARM subroutine w...

Write an ARM subroutine which will extract a substring from a string. You will need to use the library routine malloc to allocate memory for the new string. The subroutine signatu

Security threats on internet, Security threats on internet:  The Inter...

Security threats on internet:  The Internet has many advantages; however, it also opens up security threat. In this section we just want to highlight some of the threats that

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd