This is a sample chapter from Brad Stone s training e-rpg Powertools Stone on CGIDEV2 Get your copy of this important training now.

Size: px
Start display at page:

Download "This is a sample chapter from Brad Stone s training e-rpg Powertools Stone on CGIDEV2 Get your copy of this important training now."

Transcription

1 Stone on CGIDEV2 This is a sample chapter from Brad Stone s training e-rpg Powertools Stone on CGIDEV2 Get your copy of this important training now. With Stone on CGIDEV2 RPG programmers quickly learn how to develop web applications using IBM's CGIDEV2 development tools with RPG. CGIDEV2, which is provided free of charge from IBM, is a powerful toolkit developed by Mel Rothman of the IBM eserver Custom Technology Center (ectc). It allows RPG programmers to easily create web applications with RPG. This course provides tools that make it a snap to write, test, debug, and maintain ILE-RPG IV CGI programs. Get your copy today. You will learn to: Download, install and configure the CGIDEV2 toolkit Create dynamic web output with RPG programs Store dynamic output in the Integrated File System (IFS) Easily read input from a web browser using an RPG program Use the built-in error handling, reporting and debugging features included in CGIDEV2 Write and read cookies in CGI applications using RPG Find resources, forums and discussion groups related to CGIDEV2 Avoid hard-coding of HTML, JavaScript and Style Sheets in your CGI applications Eliminate data replication to non-as/400 machines used for serving your AS/400 data Avoid programming with complicated CGI APIs Build fully functional interactive online applications Debug CGI applications easily with CGIDEV2's built in functionality Create your own e-store with shopping cart Develop dynamic RPG web apps with IBM's free toolkit and e-rpg Powertools Stone on CGIDEV2! Get your copy now!

2 Chapter 4. Data Manipulation When dealing with web data, you are governed by factors that are uncontrollable. For example, all data read from a web browser, whether is it part of the HTTP data stream, environment variables or input variables from a form, is initially in character form. Trying to use data such as the value of the CONTENT_LENGTH environment variable (used to obtain the length of data after a POST method of an HTML form) can lead to cumbersome or difficult to use code. You may need to use functions or APIs to convert the value into the required data type, in this case, numeric. You also may need to convert data from character to hexadecimal format, or vice versa. Both conversions can be tedious, especially if you re not familiar with or even aware of APIs that are available to perform the conversions. The CGIDEV2 toolkit provides several subprocedures that help you perform simple data translation, as well as check data for valid information. You will probably never use most of the subprocedures described in this chapter. The descriptions are included mainly because the subprocedures are used by other subprocedures included in the CGIDEV2 toolkit to perform easy translations and data validation. But because the data manipulation subprocedures are available for your use, I thought it would be a good idea to cover them, even if this information is brief. Stone on CGIDEV2 4-1

3 4.1. Char2Hex The Char2Hex subprocedure is used to convert character data into its hexadecimal representation. This subprocedure is handy if you ever need to encode data into hex strings. For example, when you re building URLs that contain a query string variable, it is required that you convert special characters (non alphabetic) into a hex encoded representation preceded by the percent (%) sign. Char2Hex parameters The parameters for the Char2Hex subprocedure are shown in Table 4-1. Table 4-1: Char2Hex parameters. Input String Char(16000) The character input string This parameter contains the character string that you want to convert to the hexadecimal format. The Char2Hex subprocedure returns a string with a maximum length of 32,000 bytes. The string contains the hexadecimal representation of the character string passed in as an input variable. For example, if passed the character string ABC, the returned result is C1C2C Stone on CGIDEV2

4 4.2. Hex2Char The Hex2Char subprocedure does exactly the opposite of the previously described Char2Hex subprocedure. It accepts a string representing a hexadecimal value and converts it to its character string equivalent. Hex2Char parameters The parameters for the Hex2Char subprocedure are shown in Table 4-2. Table 4-2: Hex2Char parameters. Input String Char(32000) The hexadecimal input string The input string is a hexadecimal string that you want to convert to a character string. The value returned by the Hex2Char subprocedure is a character string. For example, if the value C1C2C3 is passed to the Hex2Char subprocedure, the value returned is ABC. Stone on CGIDEV2 4-3

5 4.3. C2N The C2N subprocedure converts a character string to a floating-point representation. This can be useful in situations that require a result in floating-point format. C2N parameters The parameters used by the C2N subprocedure are shown in Table 4-3. Table 4-3: C2N parameters. Input String Char(32) The character input string This parameter contains a character representation of a numeric value. For example, the character string literal is a valid input string that will be converted. The C2N subprocedure returns a floating-point (data type f) numeric value representing the character string passed in. If an error occurs during processing, the value returned is zero. 4-4 Stone on CGIDEV2

6 4.4. C2N2 Data Manipulation The C2N2 subprocedure is similar to the C2N subprocedure in that it accepts a character string and returns the numeric value. However, instead of returning a floating point data type, a packed decimal (length 30,9) is returned to the caller. Because RPG programmers are more accustomed to working with packed numeric data instead of floating point values, this subprocedure is more likely to be useful in your applications. This subprocedure is not only useful for CGI development, but there may be cases in your every day applications where this subprocedure will come in handy. C2N2 parameters The parameters for the C2N2 subprocedure are shown in Table 4-4. Table 4-4: C2N2 parameters. Input String Char(32) The character input string This parameter contains a character representation of a numeric value. For example, the character string literal is a valid input string that will be converted. The C2N2 subprocedure returns a packed decimal numeric value representing the character string passed in. The size of the returned data is 30 digits with 9 decimal places. Stone on CGIDEV2 4-5

7 4.5. ChkNbr There may be times when you may want to check a character string to see if it contains only valid numbers before trying to convert the character string into its numeric representation. The ChkNbr subprocedure accepts a string and verifies that it contains only the following characters: Digits from 0 9 Decimal point character Sign character ChkNbr returns an array of seven indicators, each meaning something different if turned on. ChkNbr parameters The parameters used with the ChkNbr subprocedure are shown in Table 4-5. Input String Char(32) The character input string Maximum Digits Integer(10) The maximum number of digits to the left of the decimal point. This parameter is optional. Add Messages Logical A flag to indicate if messages should be written to the message list if errors are found. This parameter is optional. Field Description Negative is Error Table 4-5: ChkNbr parameters. Char(32) Logical The field description that should be used for errors written to the message list. A flag to indicate if negative numbers should be considered an error. The single input parameter should be a character representation of a numeric value. For example, would be a valid input string. Maximum digits An integer value that represents the maximum number of digits the number can have to the left of the decimal point. This parameter is optional. If not passed, the value of zero is assumed, which means that this check should be ignored. Add messages This parameter should contain a logical value (*ON or *OFF) that will tell the system to write messages to the message list if errors are found. The message list is a list of messages used by the CGIDEV2 package and is described in a later chapter. This parameter is optional. If omitted the value of *OFF will be used to indicate that messages are not written to the message list. Field description If the Add messages parameter is set to *ON, this parameter should specify the field description to use if an error is encountered and that error is written to the message list. This parameter is optional. A value of blank is used if it is omitted. 4-6 Stone on CGIDEV2

8 Negative is error This logical parameter (*ON or *OFF) is used to tell the ChkNbr subprocedure if it should consider negative numbers an error. This parameter is optional. If omitted, negative numbers will not be considered in error. The ChkNbr subprocedure returns an array of indicators, or logical values, that represent certain checks that were made during execution. The indicators and their descriptions (in order) are as follows: Indicator 1 If *ON, one or more errors exist. If *OFF, then the string passed in is a valid number. Indicator 2 If *ON, the value passed in is not a valid numeric representation. This may also indicate a negative sign in an incorrect position, for example, in the middle of the string. Indicator 3 If *ON, the input string contains more than one decimal place. Indicator 4 If *ON, the input string contains multiple signs, both leading and trailing. Indicator 5 If *ON, the input string contains invalid numeric characters or a length of zero. Indicator 6 If *ON, the input string contains too many digits to the left of the decimal place. Indicator 7 If *ON, there are no errors but the value is less than zero. Stone on CGIDEV2 4-7

9 4.6. XlatwCCSIDs The XlatwCCSIDs subprocedure is used to convert data from one Coded Character Set Identifier (CCSID) to another. This procedure can also be used to convert data to or from the EBCDIC representation. XlatwCCSIDs parameters The parameters for the XlatwCCSIDs subprocedure are shown in Table 4-6. To EBCDIC Logical A flag to indicate if the data should be converted to or from EBCDIC Input String Char(32767) The input string that is to be converted From CCSID Unsigned Integer(10) The original CCSID. This parameter is optional. To CCSID Unsigned Integer(1) The target CCSID. This parameter is optional. Table 4-6: XlatwCCSIDs parameters. To EBCDIC This parameter is used to indicate if the input data should be converted to or from EBCDIC. If this value is *ON, the conversion to EBCDIC is performed. Otherwise, the conversion will be from EBCDIC. The input string parameter contains the data that you want to convert. From CCSID Specify the original CCSID that the data is currently represented by. This parameter is optional. If omitted, the CCSID value specified in either the CGI_EBCDIC_CCSID or CGI_ASCII_CCSID environment variable is used, depending on if the To EBCDIC parameter is *ON or *OFF. To CCSID Specify the target CCSID that the data will be converted into. This parameter is optional. If omitted, the CCSID value specified in either the CGI_EBCDIC_CCSID or CGI_ASCII_CCSID environment variable is used, depending on if the To EBCDIC parameter is *ON or *OFF. The XlatwCCSIDs subprocedure returns the converted string to the calling program. 4-8 Stone on CGIDEV2

10 4.7. Uppify Data Manipulation The Uppify subprocedure performs the simple task of translating any lower case characters in a string to upper case. This is another example of a subprocedure that may come in very handy outside of your CGI applications. Uppify parameters The parameters for the Uppify subprocedure are shown in Table 4-7. Table 4-7: Uppify parameters. Input String Char(32767) The string to be converted to upper case This parameter contains the string that you want to covert to upper case. The Uppify subprocedure returns the input string in all upper case to the calling program. Stone on CGIDEV2 4-9

11 4.8. FixMixed The FixMixed subprocedure is used mainly by the GetInput subprocedure described in Chapter 3. It is used to fix data represented in a mixed format. FixMixed parameters The parameters for the FixMixed subprocedure are shown in Table 4-8. String Char(32767) Input/Output The input string containing the data to be converted from mixed to EBCDIC. This field will also contain the fixed string after the call. Table 4-8: FixMixed parameters. String String Length Integer(10) The length of the input or output string. The string parameter in the FixMixed subprocedure plays two roles: It is used as an input parameter to pass the string containing the mixed data into the subprocedure. After the call has completed, this variable will contain the fixed string. String length The string length parameter also plays a dual role: When calling the FixMixed subprocedure, the parameter contains the length of the input string. After the call has completed, the parameter contains the length of the new string returned in the first parameter Stone on CGIDEV2

12 Stone on CGIDEV2 This is a sample chapter from Brad Stone s training e-rpg Powertools Stone on CGIDEV2 Get your copy of this important training now. With Stone on CGIDEV2 RPG programmers quickly learn how to develop web applications using IBM's CGIDEV2 development tools with RPG. CGIDEV2, which is provided free of charge from IBM, is a powerful toolkit developed by Mel Rothman of the IBM eserver Custom Technology Center (ectc). It allows RPG programmers to easily create web applications with RPG. This course provides tools that make it a snap to write, test, debug, and maintain ILE-RPG IV CGI programs. Get your copy today. You will learn to: Download, install and configure the CGIDEV2 toolkit Create dynamic web output with RPG programs Store dynamic output in the Integrated File System (IFS) Easily read input from a web browser using an RPG program Use the built-in error handling, reporting and debugging features included in CGIDEV2 Write and read cookies in CGI applications using RPG Find resources, forums and discussion groups related to CGIDEV2 Avoid hard-coding of HTML, JavaScript and Style Sheets in your CGI applications Eliminate data replication to non-as/400 machines used for serving your AS/400 data Avoid programming with complicated CGI APIs Build fully functional interactive online applications Debug CGI applications easily with CGIDEV2's built in functionality Create your own e-store with shopping cart Develop dynamic RPG web apps with IBM's free toolkit and e-rpg Powertools Stone on CGIDEV2! Get your copy now!

System i CGI Toolkits

System i CGI Toolkits System i CGI Toolkits Bradley V. Stone Topics Where to Start What You Need to Know Toolkit Concepts How Does a Toolkit Help Me? Toolkit Functionality The Template and Substitution Variables The Toolkit

More information

Number Systems Prof. Indranil Sen Gupta Dept. of Computer Science & Engg. Indian Institute of Technology Kharagpur Number Representation

Number Systems Prof. Indranil Sen Gupta Dept. of Computer Science & Engg. Indian Institute of Technology Kharagpur Number Representation Number Systems Prof. Indranil Sen Gupta Dept. of Computer Science & Engg. Indian Institute of Technology Kharagpur 1 Number Representation 2 1 Topics to be Discussed How are numeric data items actually

More information

UNIT 7A Data Representation: Numbers and Text. Digital Data

UNIT 7A Data Representation: Numbers and Text. Digital Data UNIT 7A Data Representation: Numbers and Text 1 Digital Data 10010101011110101010110101001110 What does this binary sequence represent? It could be: an integer a floating point number text encoded with

More information

ITC213: STRUCTURED PROGRAMMING. Bhaskar Shrestha National College of Computer Studies Tribhuvan University

ITC213: STRUCTURED PROGRAMMING. Bhaskar Shrestha National College of Computer Studies Tribhuvan University ITC213: STRUCTURED PROGRAMMING Bhaskar Shrestha National College of Computer Studies Tribhuvan University Lecture 07: Data Input and Output Readings: Chapter 4 Input /Output Operations A program needs

More information

Chapter 2. Data Representation in Computer Systems

Chapter 2. Data Representation in Computer Systems Chapter 2 Data Representation in Computer Systems Chapter 2 Objectives Understand the fundamentals of numerical data representation and manipulation in digital computers. Master the skill of converting

More information

Memory Addressing, Binary, and Hexadecimal Review

Memory Addressing, Binary, and Hexadecimal Review C++ By A EXAMPLE Memory Addressing, Binary, and Hexadecimal Review You do not have to understand the concepts in this appendix to become well-versed in C++. You can master C++, however, only if you spend

More information

C How to Program, 6/e by Pearson Education, Inc. All Rights Reserved.

C How to Program, 6/e by Pearson Education, Inc. All Rights Reserved. C How to Program, 6/e 1992-2010 by Pearson Education, Inc. An important part of the solution to any problem is the presentation of the results. In this chapter, we discuss in depth the formatting features

More information

Chapter 4: Computer Codes. In this chapter you will learn about:

Chapter 4: Computer Codes. In this chapter you will learn about: Ref. Page Slide 1/30 Learning Objectives In this chapter you will learn about: Computer data Computer codes: representation of data in binary Most commonly used computer codes Collating sequence Ref. Page

More information

Externally Described SQL -- An SQL iquery API

Externally Described SQL -- An SQL iquery API Externally Described SQL -- An SQL iquery API Introduced as a beta test API in SQL iquery v4r7, Externally Described SQL is a simple set of APIs that provide the ability for RPG programmers to leverage

More information

CS 101: Computer Programming and Utilization

CS 101: Computer Programming and Utilization CS 101: Computer Programming and Utilization Jul-Nov 2017 Umesh Bellur (cs101@cse.iitb.ac.in) Lecture 3: Number Representa.ons Representing Numbers Digital Circuits can store and manipulate 0 s and 1 s.

More information

9/3/2015. Data Representation II. 2.4 Signed Integer Representation. 2.4 Signed Integer Representation

9/3/2015. Data Representation II. 2.4 Signed Integer Representation. 2.4 Signed Integer Representation Data Representation II CMSC 313 Sections 01, 02 The conversions we have so far presented have involved only unsigned numbers. To represent signed integers, computer systems allocate the high-order bit

More information

Features of C. Portable Procedural / Modular Structured Language Statically typed Middle level language

Features of C. Portable Procedural / Modular Structured Language Statically typed Middle level language 1 History C is a general-purpose, high-level language that was originally developed by Dennis M. Ritchie to develop the UNIX operating system at Bell Labs. C was originally first implemented on the DEC

More information

Number Systems. Binary Numbers. Appendix. Decimal notation represents numbers as powers of 10, for example

Number Systems. Binary Numbers. Appendix. Decimal notation represents numbers as powers of 10, for example Appendix F Number Systems Binary Numbers Decimal notation represents numbers as powers of 10, for example 1729 1 103 7 102 2 101 9 100 decimal = + + + There is no particular reason for the choice of 10,

More information

Variables and Data Representation

Variables and Data Representation You will recall that a computer program is a set of instructions that tell a computer how to transform a given set of input into a specific output. Any program, procedural, event driven or object oriented

More information

Advanced C Programming Topics

Advanced C Programming Topics Introductory Medical Device Prototyping Advanced C Programming Topics, http://saliterman.umn.edu/ Department of Biomedical Engineering, University of Minnesota Operations on Bits 1. Recall there are 8

More information

Externally Described SQL -- An SQL iquery API

Externally Described SQL -- An SQL iquery API Externally Described SQL -- An SQL iquery API Introduced as a beta test API in SQL iquery v4r7, Externally Described SQL is a simple set of APIs that provide the ability for RPG programmers to leverage

More information

Programming in C++ 4. The lexical basis of C++

Programming in C++ 4. The lexical basis of C++ Programming in C++ 4. The lexical basis of C++! Characters and tokens! Permissible characters! Comments & white spaces! Identifiers! Keywords! Constants! Operators! Summary 1 Characters and tokens A C++

More information

Intro to Computer Programming (ICP) Rab Nawaz Jadoon

Intro to Computer Programming (ICP) Rab Nawaz Jadoon Intro to Computer Programming (ICP) Rab Nawaz Jadoon DCS COMSATS Institute of Information Technology Assistant Professor COMSATS IIT, Abbottabad Pakistan Introduction to Computer Programming (ICP) What

More information

Signed umbers. Sign/Magnitude otation

Signed umbers. Sign/Magnitude otation Signed umbers So far we have discussed unsigned number representations. In particular, we have looked at the binary number system and shorthand methods in representing binary codes. With m binary digits,

More information

DIGITAL SYSTEM FUNDAMENTALS (ECE 421) DIGITAL ELECTRONICS FUNDAMENTAL (ECE 422) COURSE / CODE NUMBER SYSTEM

DIGITAL SYSTEM FUNDAMENTALS (ECE 421) DIGITAL ELECTRONICS FUNDAMENTAL (ECE 422) COURSE / CODE NUMBER SYSTEM COURSE / CODE DIGITAL SYSTEM FUNDAMENTALS (ECE 421) DIGITAL ELECTRONICS FUNDAMENTAL (ECE 422) NUMBER SYSTEM A considerable subset of digital systems deals with arithmetic operations. To understand the

More information

CSc 10200! Introduction to Computing. Lecture 2-3 Edgardo Molina Fall 2013 City College of New York

CSc 10200! Introduction to Computing. Lecture 2-3 Edgardo Molina Fall 2013 City College of New York CSc 10200! Introduction to Computing Lecture 2-3 Edgardo Molina Fall 2013 City College of New York 1 C++ for Engineers and Scientists Third Edition Chapter 2 Problem Solving Using C++ 2 Objectives In this

More information

Computer Organization

Computer Organization Computer Organization Register Transfer Logic Number System Department of Computer Science Missouri University of Science & Technology hurson@mst.edu 1 Decimal Numbers: Base 10 Digits: 0, 1, 2, 3, 4, 5,

More information

C++ Basics. Lecture 2 COP 3014 Spring January 8, 2018

C++ Basics. Lecture 2 COP 3014 Spring January 8, 2018 C++ Basics Lecture 2 COP 3014 Spring 2018 January 8, 2018 Structure of a C++ Program Sequence of statements, typically grouped into functions. function: a subprogram. a section of a program performing

More information

CNIT 129S: Securing Web Applications. Ch 12: Attacking Users: Cross-Site Scripting (XSS) Part 2

CNIT 129S: Securing Web Applications. Ch 12: Attacking Users: Cross-Site Scripting (XSS) Part 2 CNIT 129S: Securing Web Applications Ch 12: Attacking Users: Cross-Site Scripting (XSS) Part 2 Finding and Exploiting XSS Vunerabilities Basic Approach Inject this string into every parameter on every

More information

Number Systems. Both numbers are positive

Number Systems. Both numbers are positive Number Systems Range of Numbers and Overflow When arithmetic operation such as Addition, Subtraction, Multiplication and Division are performed on numbers the results generated may exceed the range of

More information

Language Basics. /* The NUMBER GAME - User tries to guess a number between 1 and 10 */ /* Generate a random number between 1 and 10 */

Language Basics. /* The NUMBER GAME - User tries to guess a number between 1 and 10 */ /* Generate a random number between 1 and 10 */ Overview Language Basics This chapter describes the basic elements of Rexx. It discusses the simple components that make up the language. These include script structure, elements of the language, operators,

More information

MACHINE LEVEL REPRESENTATION OF DATA

MACHINE LEVEL REPRESENTATION OF DATA MACHINE LEVEL REPRESENTATION OF DATA CHAPTER 2 1 Objectives Understand how integers and fractional numbers are represented in binary Explore the relationship between decimal number system and number systems

More information

Basic data types. Building blocks of computation

Basic data types. Building blocks of computation Basic data types Building blocks of computation Goals By the end of this lesson you will be able to: Understand the commonly used basic data types of C++ including Characters Integers Floating-point values

More information

Reserved Words and Identifiers

Reserved Words and Identifiers 1 Programming in C Reserved Words and Identifiers Reserved word Word that has a specific meaning in C Ex: int, return Identifier Word used to name and refer to a data element or object manipulated by the

More information

Chapter 1 INTRODUCTION

Chapter 1 INTRODUCTION Chapter 1 INTRODUCTION A digital computer system consists of hardware and software: The hardware consists of the physical components of the system. The software is the collection of programs that a computer

More information

Time: 8:30-10:00 pm (Arrive at 8:15 pm) Location What to bring:

Time: 8:30-10:00 pm (Arrive at 8:15 pm) Location What to bring: ECE 120 Midterm 1 HKN Review Session Time: 8:30-10:00 pm (Arrive at 8:15 pm) Location: Your Room on Compass What to bring: icard, pens/pencils, Cheat sheet (Handwritten) Overview of Review Binary IEEE

More information

OBJECTIVES After reading this chapter, the student should be able to:

OBJECTIVES After reading this chapter, the student should be able to: Data Representation OBJECTIVES After reading this chapter, the student should be able to: Define data types. Visualize how data are stored inside a computer. Understand the differences between text, numbers,

More information

CNIT 129S: Securing Web Applications. Ch 3: Web Application Technologies

CNIT 129S: Securing Web Applications. Ch 3: Web Application Technologies CNIT 129S: Securing Web Applications Ch 3: Web Application Technologies HTTP Hypertext Transfer Protocol (HTTP) Connectionless protocol Client sends an HTTP request to a Web server Gets an HTTP response

More information

Number Systems CHAPTER Positional Number Systems

Number Systems CHAPTER Positional Number Systems CHAPTER 2 Number Systems Inside computers, information is encoded as patterns of bits because it is easy to construct electronic circuits that exhibit the two alternative states, 0 and 1. The meaning of

More information

Lecture 2 Tao Wang 1

Lecture 2 Tao Wang 1 Lecture 2 Tao Wang 1 Objectives In this chapter, you will learn about: Modular programs Programming style Data types Arithmetic operations Variables and declaration statements Common programming errors

More information

Updates that apply to IBM DB2 Analytics Accelerator Loader for z/os V2R1 User's Guide (SC )

Updates that apply to IBM DB2 Analytics Accelerator Loader for z/os V2R1 User's Guide (SC ) Updates that apply to IBM DB2 Analytics Accelerator Loader for z/os V2R1 User's Guide (SC27-6777-00) Date of change: June 2017 Topic: Multiple Change description: Documentation changes made in support

More information

IBM 370 Basic Data Types

IBM 370 Basic Data Types IBM 370 Basic Data Types This lecture discusses the basic data types used on the IBM 370, 1. Two s complement binary numbers 2. EBCDIC (Extended Binary Coded Decimal Interchange Code) 3. Zoned Decimal

More information

3. Except for strings, double quotes, identifiers, and keywords, C++ ignores all white space.

3. Except for strings, double quotes, identifiers, and keywords, C++ ignores all white space. Chapter 2: Problem Solving Using C++ TRUE/FALSE 1. Modular programs are easier to develop, correct, and modify than programs constructed in some other manner. ANS: T PTS: 1 REF: 45 2. One important requirement

More information

Number representations

Number representations Number representations Number bases Three number bases are of interest: Binary, Octal and Hexadecimal. We look briefly at conversions among them and between each of them and decimal. Binary Base-two, or

More information

Informats. Informats in the CMS Environment. Considerations for Using Informats under CMS. EBCDIC and Character Data CHAPTER 15

Informats. Informats in the CMS Environment. Considerations for Using Informats under CMS. EBCDIC and Character Data CHAPTER 15 163 CHAPTER 15 Informats Informats in the CMS Environment 163 Considerations for Using Informats under CMS 163 EBCDIC and Character Data 163 Floating-Point Number Format and Portability 164 Reading Binary

More information

Data Representation COE 301. Computer Organization Prof. Muhamed Mudawar

Data Representation COE 301. Computer Organization Prof. Muhamed Mudawar Data Representation COE 30 Computer Organization Prof. Muhamed Mudawar College of Computer Sciences and Engineering King Fahd University of Petroleum and Minerals Presentation Outline Positional Number

More information

MODBUS TESTER SOFTWARE U S E R M A N U A L

MODBUS TESTER SOFTWARE U S E R M A N U A L MODBUS TESTER SOFTWARE U S E R M A N U A L TABLE OF CONTENTS 1. General information 3 2. Starting the program 3 3. Main window 3 3.1. Setting communication 4 3.2. Read and write registers 6 3.3. Setting

More information

The type of all data used in a C++ program must be specified

The type of all data used in a C++ program must be specified The type of all data used in a C++ program must be specified A data type is a description of the data being represented That is, a set of possible values and a set of operations on those values There are

More information

CS 265. Computer Architecture. Wei Lu, Ph.D., P.Eng.

CS 265. Computer Architecture. Wei Lu, Ph.D., P.Eng. CS 265 Computer Architecture Wei Lu, Ph.D., P.Eng. 1 Part 1: Data Representation Our goal: revisit and re-establish fundamental of mathematics for the computer architecture course Overview: what are bits

More information

LING 388: Computers and Language. Lecture 5

LING 388: Computers and Language. Lecture 5 LING 388: Computers and Language Lecture 5 Administrivia Homework 3 graded Quick Homework 4 out today I'll be away next two weeks (my apologies) Colton Flowers, a HLT student, will take you through Python

More information

EE292: Fundamentals of ECE

EE292: Fundamentals of ECE EE292: Fundamentals of ECE Fall 2012 TTh 10:00-11:15 SEB 1242 Lecture 22 121115 http://www.ee.unlv.edu/~b1morris/ee292/ 2 Outline Review Binary Number Representation Binary Arithmetic Combinatorial Logic

More information

Appendix. Numbering Systems. In This Appendix...

Appendix. Numbering Systems. In This Appendix... Numbering Systems ppendix In This ppendix... Introduction... inary Numbering System... exadecimal Numbering System... Octal Numbering System... inary oded ecimal () Numbering System... 5 Real (Floating

More information

Computer Organization and Assembly Language. Lab Session 4

Computer Organization and Assembly Language. Lab Session 4 Lab Session 4 Objective: Learn how Data is represented in Assembly Language Introduction to Data Types and using different Data Types in Assembly language programs Theory: The basic machine data types

More information

Preface to the Second Edition... xi A Note About Source Entry... xi

Preface to the Second Edition... xi A Note About Source Entry... xi Contents Preface to the Second Edition... xi A Note About Source Entry... xi Chapter 1: Pre Free-Format RPG IV... 1 RPG IV... 1 Extended Factor 2... 2 Built-in Functions... 2 Subprocedures... 3 Other Changes...

More information

Wirecard CEE Integration Documentation

Wirecard CEE Integration Documentation Created on: 20171225 08:33 by Wirecard CEE Integration Documentation () Created: 20171225 08:33 Online Guides Integration documentation 1/6 Created on: 20171225 08:33 by Initialization of Wirecard Data

More information

CERTIFICATE IN WEB PROGRAMMING

CERTIFICATE IN WEB PROGRAMMING COURSE DURATION: 6 MONTHS CONTENTS : CERTIFICATE IN WEB PROGRAMMING 1. PROGRAMMING IN C and C++ Language 2. HTML/CSS and JavaScript 3. PHP and MySQL 4. Project on Development of Web Application 1. PROGRAMMING

More information

Introduction to Numbering Systems

Introduction to Numbering Systems NUMBER SYSTEM Introduction to Numbering Systems We are all familiar with the decimal number system (Base 10). Some other number systems that we will work with are Binary Base 2 Octal Base 8 Hexadecimal

More information

CSCI 2212: Intermediate Programming / C Chapter 15

CSCI 2212: Intermediate Programming / C Chapter 15 ... /34 CSCI 222: Intermediate Programming / C Chapter 5 Alice E. Fischer October 9 and 2, 25 ... 2/34 Outline Integer Representations Binary Integers Integer Types Bit Operations Applying Bit Operations

More information

Switching Circuits and Logic Design Prof. Indranil Sengupta Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

Switching Circuits and Logic Design Prof. Indranil Sengupta Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Switching Circuits and Logic Design Prof. Indranil Sengupta Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture - 02 Octal and Hexadecimal Number Systems Welcome

More information

Chapter 2: Number Systems

Chapter 2: Number Systems Chapter 2: Number Systems Logic circuits are used to generate and transmit 1s and 0s to compute and convey information. This two-valued number system is called binary. As presented earlier, there are many

More information

Appendix. Numbering Systems. In this Appendix

Appendix. Numbering Systems. In this Appendix Numbering Systems ppendix n this ppendix ntroduction... inary Numbering System... exadecimal Numbering System... Octal Numbering System... inary oded ecimal () Numbering System... 5 Real (Floating Point)

More information

Differentiate Between Keywords and Identifiers

Differentiate Between Keywords and Identifiers History of C? Why we use C programming language Martin Richards developed a high-level computer language called BCPL in the year 1967. The intention was to develop a language for writing an operating system(os)

More information

CHAPTER 3 Expressions, Functions, Output

CHAPTER 3 Expressions, Functions, Output CHAPTER 3 Expressions, Functions, Output More Data Types: Integral Number Types short, long, int (all represent integer values with no fractional part). Computer Representation of integer numbers - Number

More information

(Refer Slide Time: 00:23)

(Refer Slide Time: 00:23) In this session, we will learn about one more fundamental data type in C. So, far we have seen ints and floats. Ints are supposed to represent integers and floats are supposed to represent real numbers.

More information

LAB A Translating Data to Binary

LAB A Translating Data to Binary LAB A Translating Data to Binary Create a directory for this lab and perform in it the following groups of tasks: LabA1.java 1. Write the Java app LabA1 that takes an int via a command-line argument args[0]

More information

CPE 323 REVIEW DATA TYPES AND NUMBER REPRESENTATIONS IN MODERN COMPUTERS

CPE 323 REVIEW DATA TYPES AND NUMBER REPRESENTATIONS IN MODERN COMPUTERS CPE 323 REVIEW DATA TYPES AND NUMBER REPRESENTATIONS IN MODERN COMPUTERS Aleksandar Milenković The LaCASA Laboratory, ECE Department, The University of Alabama in Huntsville Email: milenka@uah.edu Web:

More information

CPE 323 REVIEW DATA TYPES AND NUMBER REPRESENTATIONS IN MODERN COMPUTERS

CPE 323 REVIEW DATA TYPES AND NUMBER REPRESENTATIONS IN MODERN COMPUTERS CPE 323 REVIEW DATA TYPES AND NUMBER REPRESENTATIONS IN MODERN COMPUTERS Aleksandar Milenković The LaCASA Laboratory, ECE Department, The University of Alabama in Huntsville Email: milenka@uah.edu Web:

More information

Assembler Language "Boot Camp" Part 2 - Instructions and Addressing. SHARE 118 in Atlanta Session March 12, 2012

Assembler Language Boot Camp Part 2 - Instructions and Addressing. SHARE 118 in Atlanta Session March 12, 2012 Assembler Language "Boot Camp" Part 2 - Instructions and Addressing SHARE 118 in Atlanta Session 10345 March 12, 2012 1 Introduction Who are we? John Ehrman, IBM Software Group Dan Greiner, IBM Systems

More information

CS102: Standard I/O. %<flag(s)><width><precision><size>conversion-code

CS102: Standard I/O. %<flag(s)><width><precision><size>conversion-code CS102: Standard I/O Our next topic is standard input and standard output in C. The adjective "standard" when applied to "input" or "output" could be interpreted to mean "default". Typically, standard output

More information

Goals of C "" The Goals of C (cont.) "" Goals of this Lecture"" The Design of C: A Rational Reconstruction"

Goals of C  The Goals of C (cont.)  Goals of this Lecture The Design of C: A Rational Reconstruction Goals of this Lecture The Design of C: A Rational Reconstruction Help you learn about: The decisions that were available to the designers of C The decisions that were made by the designers of C Why? Learning

More information

Module 1: Information Representation I -- Number Systems

Module 1: Information Representation I -- Number Systems Unit 1: Computer Systems, pages 1 of 7 - Department of Computer and Mathematical Sciences CS 1305 Intro to Computer Technology 1 Module 1: Information Representation I -- Number Systems Objectives: Learn

More information

LESSON 4. The DATA TYPE char

LESSON 4. The DATA TYPE char LESSON 4 This lesson introduces some of the basic ideas involved in character processing. The lesson discusses how characters are stored and manipulated by the C language, how characters can be treated

More information

Exercise: Using Numbers

Exercise: Using Numbers Exercise: Using Numbers Problem: You are a spy going into an evil party to find the super-secret code phrase (made up of letters and spaces), which you will immediately send via text message to your team

More information

Assembler Language "Boot Camp" Part 2 - Instructions and Addressing SHARE 116 in Anaheim February 28, 2011

Assembler Language Boot Camp Part 2 - Instructions and Addressing SHARE 116 in Anaheim February 28, 2011 Assembler Language "Boot Camp" Part 2 - Instructions and Addressing SHARE 116 in Anaheim February 28, 2011 Introduction Who are we? John Ehrman, IBM Software Group John Dravnieks, IBM Software Group Dan

More information

Formats. Formats Under UNIX. HEXw. format. $HEXw. format. Details CHAPTER 11

Formats. Formats Under UNIX. HEXw. format. $HEXw. format. Details CHAPTER 11 193 CHAPTER 11 Formats Formats Under UNIX 193 Formats Under UNIX This chapter describes SAS formats that have behavior or syntax that is specific to UNIX environments. Each format description includes

More information

MTB-433. Multics Technical Bulletin. Distribution. Date: 12/27/79 Recent Improvements to PL/I

MTB-433. Multics Technical Bulletin. Distribution. Date: 12/27/79 Recent Improvements to PL/I To: From: Distribution Paul.Green Date: 12/27/79 Subject: Recent Improvements to PL/I INTRODUCTION The Multics PL/I compiler has recently been modified to improve the performance of some old constructs,

More information

Thus needs to be a consistent method of representing negative numbers in binary computer arithmetic operations.

Thus needs to be a consistent method of representing negative numbers in binary computer arithmetic operations. Signed Binary Arithmetic In the real world of mathematics, computers must represent both positive and negative binary numbers. For example, even when dealing with positive arguments, mathematical operations

More information

Binary Representations and Arithmetic

Binary Representations and Arithmetic Binary Representations and Arithmetic 9--26 Common number systems. Base : decimal Base 2: binary Base 6: hexadecimal (memory addresses) Base 8: octal (obsolete computer systems) Base 64 (email attachments,

More information

Chapter 2, Part I Introduction to C Programming

Chapter 2, Part I Introduction to C Programming Chapter 2, Part I Introduction to C Programming C How to Program, 8/e, GE 2016 Pearson Education, Ltd. All rights reserved. 1 2016 Pearson Education, Ltd. All rights reserved. 2 2016 Pearson Education,

More information

Chapter 3: Operators, Expressions and Type Conversion

Chapter 3: Operators, Expressions and Type Conversion 101 Chapter 3 Operators, Expressions and Type Conversion Chapter 3: Operators, Expressions and Type Conversion Objectives To use basic arithmetic operators. To use increment and decrement operators. To

More information

INTRODUCTION. a Data File

INTRODUCTION.  a Data File INTRODUCTION E-mail Utilities is a product that will perform various E-mail and E-commerce functions. It s main features are: E-mail data, spool, or IFS files to Internet users Write data or spool files

More information

CS & IT Conversions. Magnitude 10,000 1,

CS & IT Conversions. Magnitude 10,000 1, CS & IT Conversions There are several number systems that you will use when working with computers. These include decimal, binary, octal, and hexadecimal. Knowing how to convert between these number systems

More information

In the old days, our beloved server was, in many cases, the only one used by the company to perform its business. That s no longer true.

In the old days, our beloved server was, in many cases, the only one used by the company to perform its business. That s no longer true. Introduction In the old days, our beloved server was, in many cases, the only one used by the company to perform its business. That s no longer true. IBM i is no longer an island. This book is about building

More information

Procedures and Parameters

Procedures and Parameters Procedures and Parameters The Inside Story with Bob Cozzi What are Procedures SubProcedure can be a function or a procedure They can accept parameters and returns values Functions Subprocedures that return

More information

With Dreamweaver CS4, Adobe has radically

With Dreamweaver CS4, Adobe has radically Introduction to the Dreamweaver Interface With Dreamweaver CS4, Adobe has radically reengineered the Dreamweaver interface to provide a more unified experience across all of the Creative Suite applications.

More information

How Does RPG Talk to a Browser? Paul Tuohy. Copyright ComCon, ComCon. 5, Oakton Court Ballybrack Co. Dublin Ireland

How Does RPG Talk to a Browser? Paul Tuohy. Copyright ComCon, ComCon. 5, Oakton Court Ballybrack Co. Dublin Ireland How Does RPG Talk to a Browser? ComCon 5, Oakton Court Ballybrack Co. Dublin Ireland Phone: +353 1 282 6230 e-mail: tuohyp@comconadvisor.com Web: www.comconadvisor.com Paul Tuohy Copyright ComCon, 2004.

More information

CHAPTER 2 Data Representation in Computer Systems

CHAPTER 2 Data Representation in Computer Systems CHAPTER 2 Data Representation in Computer Systems 2.1 Introduction 37 2.2 Positional Numbering Systems 38 2.3 Decimal to Binary Conversions 38 2.3.1 Converting Unsigned Whole Numbers 39 2.3.2 Converting

More information

CHAPTER 2 Data Representation in Computer Systems

CHAPTER 2 Data Representation in Computer Systems CHAPTER 2 Data Representation in Computer Systems 2.1 Introduction 37 2.2 Positional Numbering Systems 38 2.3 Decimal to Binary Conversions 38 2.3.1 Converting Unsigned Whole Numbers 39 2.3.2 Converting

More information

Programming in C++ 6. Floating point data types

Programming in C++ 6. Floating point data types Programming in C++ 6. Floating point data types! Introduction! Type double! Type float! Changing types! Type promotion & conversion! Casts! Initialization! Assignment operators! Summary 1 Introduction

More information

ECE2049: Embedded Computing in Engineering Design C Term Spring Lecture #3: Of Integers and Endians (pt. 2)

ECE2049: Embedded Computing in Engineering Design C Term Spring Lecture #3: Of Integers and Endians (pt. 2) ECE2049: Embedded Computing in Engineering Design C Term Spring 2018 Lecture #3: Of Integers and Endians (pt. 2) Reading for Today: Davies Ch 2, MSP430 User's Guide Ch 6.1, 6.3 Reading for Next Class:

More information

Final Labs and Tutors

Final Labs and Tutors ICT106 Fundamentals of Computer Systems - Topic 2 REPRESENTATION AND STORAGE OF INFORMATION Reading: Linux Assembly Programming Language, Ch 2.4-2.9 and 3.6-3.8 Final Labs and Tutors Venue and time South

More information

SQL iquery Built-in Functions

SQL iquery Built-in Functions SQL iquery Built-in Functions SQL IQUERY DOCUMENTATION BOB COZZI This manual contains documentation for the SQL iquery for IBM i scripting language built-in functions. These built-in functions may be used

More information

Casabac Unicode Support

Casabac Unicode Support Unicode Support Unicode Support Full Unicode support was added into the GUI Server with build 25_20040105. Before ISO 8859-1 was used for encoding and decoding HTML pages and your system's default encoding

More information

Zheng-Liang Lu Java Programming 45 / 79

Zheng-Liang Lu Java Programming 45 / 79 1 class Lecture2 { 2 3 "Elementray Programming" 4 5 } 6 7 / References 8 [1] Ch. 2 in YDL 9 [2] Ch. 2 and 3 in Sharan 10 [3] Ch. 2 in HS 11 / Zheng-Liang Lu Java Programming 45 / 79 Example Given a radius

More information

Inf2C - Computer Systems Lecture 2 Data Representation

Inf2C - Computer Systems Lecture 2 Data Representation Inf2C - Computer Systems Lecture 2 Data Representation Boris Grot School of Informatics University of Edinburgh Last lecture Moore s law Types of computer systems Computer components Computer system stack

More information

Java How to Program, 10/e. Copyright by Pearson Education, Inc. All Rights Reserved.

Java How to Program, 10/e. Copyright by Pearson Education, Inc. All Rights Reserved. Java How to Program, 10/e Education, Inc. All Rights Reserved. Each class you create becomes a new type that can be used to declare variables and create objects. You can declare new classes as needed;

More information

CSE COMPUTER USE: Fundamentals Test 1 Version D

CSE COMPUTER USE: Fundamentals Test 1 Version D Name:, (Last name) (First name) Student ID#: Registered Section: Instructor: Lew Lowther Solutions York University Faculty of Pure and Applied Science Department of Computer Science CSE 1520.03 COMPUTER

More information

Computer Organization and Assembly Language. Lab Session 01

Computer Organization and Assembly Language. Lab Session 01 Objective: Lab Session 01 Introduction to Assembly Language Tools and Familiarization with Emu8086 environment To be able to understand Data Representation and perform conversions from one system to another

More information

LESSON 5 FUNDAMENTAL DATA TYPES. char short int long unsigned char unsigned short unsigned unsigned long

LESSON 5 FUNDAMENTAL DATA TYPES. char short int long unsigned char unsigned short unsigned unsigned long LESSON 5 ARITHMETIC DATA PROCESSING The arithmetic data types are the fundamental data types of the C language. They are called "arithmetic" because operations such as addition and multiplication can be

More information

VARIABLES AND CONSTANTS

VARIABLES AND CONSTANTS UNIT 3 Structure VARIABLES AND CONSTANTS Variables and Constants 3.0 Introduction 3.1 Objectives 3.2 Character Set 3.3 Identifiers and Keywords 3.3.1 Rules for Forming Identifiers 3.3.2 Keywords 3.4 Data

More information

Request for Comments: 851 Obsoletes RFC: 802. The ARPANET 1822L Host Access Protocol RFC 851. Andrew G. Malis ARPANET Mail:

Request for Comments: 851 Obsoletes RFC: 802. The ARPANET 1822L Host Access Protocol RFC 851. Andrew G. Malis ARPANET Mail: Request for Comments: 851 Obsoletes RFC: 802 The ARPANET 1822L Host Access Protocol Andrew G. Malis ARPANET Mail: malis@bbn-unix Bolt Beranek and Newman Inc. 50 Moulton St. Cambridge, MA 02238 April 1983

More information

3. Simple Types, Variables, and Constants

3. Simple Types, Variables, and Constants 3. Simple Types, Variables, and Constants This section of the lectures will look at simple containers in which you can storing single values in the programming language C++. You might find it interesting

More information

Declaration. Fundamental Data Types. Modifying the Basic Types. Basic Data Types. All variables must be declared before being used.

Declaration. Fundamental Data Types. Modifying the Basic Types. Basic Data Types. All variables must be declared before being used. Declaration Fundamental Data Types All variables must be declared before being used. Tells compiler to set aside an appropriate amount of space in memory to hold a value. Enables the compiler to perform

More information

LECTURE 3 C++ Basics Part 2

LECTURE 3 C++ Basics Part 2 LECTURE 3 C++ Basics Part 2 OVERVIEW Operators Type Conversions OPERATORS Operators are special built-in symbols that have functionality, and work on operands. Operators are actually functions that use

More information

1. NUMBER SYSTEMS USED IN COMPUTING: THE BINARY NUMBER SYSTEM

1. NUMBER SYSTEMS USED IN COMPUTING: THE BINARY NUMBER SYSTEM 1. NUMBER SYSTEMS USED IN COMPUTING: THE BINARY NUMBER SYSTEM 1.1 Introduction Given that digital logic and memory devices are based on two electrical states (on and off), it is natural to use a number

More information