Đang chuẩn bị nút TẢI XUỐNG, xin hãy chờ
Tải xuống
Kernighan, B., and Ritchie, D. 1978, The C Programming Language (Englewood Cliffs, NJ: Prentice-Hall). [2] [Reference for K&R “traditional” C. Later editions of this book conform to the ANSI C standard.] Meeus, J. 1982, Astronomical Formulae for Calculators, 2nd ed., revised and enlarged (Richmond, VA: Willmann-Bell). [3] | 1.1 Program Organization and Control Structures 5 Kernighan B. and Ritchie D. 1978 The C Programming Language Englewood Cliffs NJ Prentice-Hall . 2 Reference for K R traditional C. Later editions of this book conform to the ANSI C standard. Meeus J. 1982 Astronomical Formulae for Calculators 2nd ed. revised and enlarged Richmond VA Willmann-Bell . 3 Sample page from NUMERICAL RECIPES IN C THE ART OF SCIENTIFIC COMPUTING ISBN 0-521-43108-5 g 2. Q Z CO 1.1 Program Organization and Control f .f Structures fH i I 5 co o b - i M We sometimes like to point out the close analogies between computer programs i a on the one hand and written poetry or written musical scores on the other. All three present themselves as visual media symbols on a two-dimensional page or f i computer screen. Yet in all three cases the visual two-dimensional frozen-in-time 7- representation communicates or is supposed to communicate something rather i 3 different namely a process that unfolds in time. A poem is meant to be read music played a program executed as a sequential series of computer instructions. 3 In all three cases the target of the communication in its visual form is a human 5- S being. The goal is to transfer to him her as efficiently as can be accomplished the greatest degree of understanding in advance of how the process will unfold in g-.-g time. In poetry this human target is the reader. In music it is the performer. In programming it is the program user. Now you may object that the target of communication of a program is not o a human but a computer that the program user is only an irrelevant intermediary s P- s a lackey who feeds the machine. This is perhaps the case in the situation where 9 the business executive pops a diskette into a desktop computer and feeds that computer a black-box program in binary executable form. The computer in this case doesn t much care whether that program was written with good programming j practice or not. I t z We envision however that you .