Example of arrays pointers, Computer Engineering

Assignment Help:

Q. Example of arrays pointers?

General form of declaration of array in Fortran 90 is

type, DIMENSION(bound) [,attr] :: name

E.g. the declaration 

        INTEGER, DIMENSION(5): A

Declare an array A of size 5.

General representation of declaration of array in C is 

type array_name [size]

E.g. declaration A

   int A[10]

Declares an array of size 10.

Fortran 90 allows using particular sections of an array. To access a part of an array you require name of the array followed by two integer values splitted by colon enclosed in parentheses. The integer values symbolize indices of section needed. E.g. a (3:5) denotes to elements 3, 4, 5 of array, a(1:5:2) denotes to elements 1, 3, 5 of the array and b(1:3, 2:4) denotes to elements from rows 1 to 3 and columns 2 to 4.  In C there is just one type of array whose size is determined statically although there are provisions for dynamic allocation of storage by dynamic memory allocation functions such as malloc and calloc functions and pointers. In Fortran 90 there are 3 probable kinds of arrays depending on binding of an array to some amount of storage: Static arrays with fixed size at the time of declaration and can't be changed at the time of execution, Automatic arrays or Semi-dynamic arrays: the size is decided after entering a subroutine and arrays can be created to match the exact size needed however local to a subroutine and Allocatable arrays or Dynamic arrays: the size can be changed at the time of execution.


Related Discussions:- Example of arrays pointers

Era of first generation computers, Q. Era of first generation computers? ...

Q. Era of first generation computers? The trends that were encountered at the time of the era of first generation computers were: Centralized control in a single CPU (al

Explain asymmetric cryptographyand its components, Explain Asymmetric crypt...

Explain Asymmetric cryptographyand its components. Asymmetric or public-key cryptography be different from conventional cryptography in which key material is bound to a single

Explain about hexadecimal numbers system, Q. Explain about Hexadecimal Numb...

Q. Explain about Hexadecimal Numbers system? Hexadecimal system has 16 digits that are represented as 0,1,2,3,4,5,6,7,8,9,A,B,C,D,E,F. A number (F2) H is equivalent to

Call the masm procedure, Assignment:  write a C program and a MASM procedur...

Assignment:  write a C program and a MASM procedure.  The C program calls the MASM procedure to perform letter case conversion. Text sections covered:  12.1 to 12.3.1 Write a

How to add cell padding, Q. How to Add Cell Padding? As you can see, te...

Q. How to Add Cell Padding? As you can see, text is too close to the edges of the cells. You will add padding to the cells to leave room between text and cells. 1.  Click in

What is an activex interface, An ActiveX interface is a group of linked fun...

An ActiveX interface is a group of linked functions that are grouped together

.., consider an open circuit pn junction.sketch curves as a function of dis...

consider an open circuit pn junction.sketch curves as a function of distance across the junction of space charge ,electric field and potential

Advantage or disadvantage of using INADDR_ANY, What is the advantage or dis...

What is the advantage or disadvantage of using INADDR_ANY instead of the IP address of the computer running on the server? The format of TCP/IP, structure sockaddr_in defines u

Acting rationally - artificial intelligence, Acting Rationally: "Al" C...

Acting Rationally: "Al" Capone was finally convicted for tax evasion. Were the police reacting on rationally?? To solve this puzzle, we must first look at how the performance

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd