Programming in C for foundation
This book on C programming language is a comprehensive tutorial and reference to C based on the ANSI C standard for beginners. The C language is demonstrated with numerous examples and extensive exercises that guide readers through each concept. Step-by-step of program code reveal the underlying l...
| Main Authors: | Bakar, Noor Hasrina, Hassan, Noor Azimah, Idris, Mohd Norhaedir, Al-Shawabkeh, Mahmoud |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
IIUM Press
2014
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/36320/ http://irep.iium.edu.my/36320/1/programming.pdf |
Similar Items
Accommodating student's learning experience through personalized learning style adaptation in computer programming course at Centre for Foundation Studies, IIUM
by: Idris, Mohd Norhaedir, et al.
Published: (2012)
by: Idris, Mohd Norhaedir, et al.
Published: (2012)
Multimedia training package on C# programming language / Johriah Norfizlina Ismail
by: Johriah Norfizlina, Ismail
Published: (2002)
by: Johriah Norfizlina, Ismail
Published: (2002)
C programming tutoring simulation with interactive multimedia "cyberc" / Goh Lee Ching
by: Goh , Lee Ching
Published: (2004)
by: Goh , Lee Ching
Published: (2004)
Sistem perpustakaan maya (Pengkhususan kertas-kertas teknikal) / Noor Azimah Talib
by: Noor Azimah, Talib
Published: (2000)
by: Noor Azimah, Talib
Published: (2000)
Big data security
by: Al-Shawabkeh, Mahmoud M. M.
Published: (2014)
by: Al-Shawabkeh, Mahmoud M. M.
Published: (2014)
C++ programming: step by step
Published: (2011)
Published: (2011)
Exploring software practitioners perceptions and experience in requirements reuse : a survey in Malaysia
by: Bakar, Noor Hasrina, et al.
Published: (2014)
by: Bakar, Noor Hasrina, et al.
Published: (2014)
Office collaboration system
by: Ishak, Azimah
Published: (2005)
by: Ishak, Azimah
Published: (2005)
Assessment of cybersecurity awareness program on personal data protection among youngsters in Malaysia / Noor Hayani Abd Rahim
by: Noor Hayani , Abd Rahim
Published: (2017)
by: Noor Hayani , Abd Rahim
Published: (2017)
Practical cryptography: algorithms and implementations using C++
Published: (2014)
Published: (2014)
Feature extraction approaches from natural language requirements for reuse in software product lines: a systematic literature review
by: Bakar, Noor Hasrina, et al.
Published: (2015)
by: Bakar, Noor Hasrina, et al.
Published: (2015)
Intrusion Response Systems: Foundations, Design, and Challenges
by: Zakira, Inayat, et al.
Published: (2016)
by: Zakira, Inayat, et al.
Published: (2016)
Modeling a problem solving approach through computational thinking for teaching programming / Zebel Al Tareq
by: Zebel , Al Tareq
Published: (2021)
by: Zebel , Al Tareq
Published: (2021)
Information Security Management Systems (ISMS) and Computer Security Self-Efficacy (CSSE) model comparison
by: Al-Shawabkeh, Mahmoud M. M., et al.
Published: (2016)
by: Al-Shawabkeh, Mahmoud M. M., et al.
Published: (2016)
10 c’s of social networking, interconnections and
the impact on social networking
by: Shah, Asadullah, et al.
Published: (2013)
by: Shah, Asadullah, et al.
Published: (2013)
Terms extractions: an approach for requirements reuse
by: Bakar, Noor Hasrina, et al.
Published: (2016)
by: Bakar, Noor Hasrina, et al.
Published: (2016)
Interactive learning application for computer programming
by: Chong, Nui Mei
Published: (2018)
by: Chong, Nui Mei
Published: (2018)
Spot IT internal intranet website / Rekha Nair C.Gamgadharan Nair
by: Rekha Nair , C.Gamgadharan Nair
Published: (2002)
by: Rekha Nair , C.Gamgadharan Nair
Published: (2002)
Features Selection in the Proposed Draft Sheet C1 for General Elections in
Indonesia
by: Erin, Efriansyah, et al.
Published: (2023)
by: Erin, Efriansyah, et al.
Published: (2023)
Sistem pemilihan contoh pengaturcaraan C(S2PC) / Mohd Zulkhairi Bahari
by: Mohd Zulkhairi, Bahari
Published: (2003)
by: Mohd Zulkhairi, Bahari
Published: (2003)
Knowledge design in rule-based system architecture for C tutorial / V Thavachelvi Velautham
by: V Thavachelvi, Velautham
Published: (2005)
by: V Thavachelvi, Velautham
Published: (2005)
Utilizing Support Vector Machines to Recognize Pattern Numbers on Sheet C1 Ballots
by: Agustian, David, et al.
Published: (2022)
by: Agustian, David, et al.
Published: (2022)
Hybrid agent-based and social force simulation for modelling human evacuation egress
by: Noor Akma, Abu Bakar
Published: (2021)
by: Noor Akma, Abu Bakar
Published: (2021)
A connectionist system approach for learning logic programs
by: Shamsuddin, Siti Mariam, et al.
Published: (2008)
by: Shamsuddin, Siti Mariam, et al.
Published: (2008)
Feature extraction from natural language to aid requirements reuse in software product lines engineering / Noor Hasrina Bakar
by: Noor Hasrina, Bakar
Published: (2016)
by: Noor Hasrina, Bakar
Published: (2016)
Online Programming Group Network (OPGN) / Kok Chun Jye
by: Kok , Chun Jye
Published: (2005)
by: Kok , Chun Jye
Published: (2005)
A Review on Detection of COVID-19 Cases from Medical Images Using Machine Learning-Based Approach
by: Noor, Al-dieef, et al.
Published: (2021)
by: Noor, Al-dieef, et al.
Published: (2021)
CPM252 – Foundations and Programming for Data Analytics (Asas dan Pengaturcaraan untuk Analitik Data)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2021)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2021)
Computer security factors effects towards online usage of internet banking system
by: Al-Shawabkeh, Mahmoud, et al.
Published: (2015)
by: Al-Shawabkeh, Mahmoud, et al.
Published: (2015)
Web Phishing Classification Model using Artificial Neural Network and Deep Learning Neural Network
by: Noor Hazirah, Hassan, et al.
Published: (2023)
by: Noor Hazirah, Hassan, et al.
Published: (2023)
Learning Computer Programming Using A Board Game - Case Study On C-Jump
by: Ranjit Singh, Jaspaljeet Singh
Published: (2007)
by: Ranjit Singh, Jaspaljeet Singh
Published: (2007)
Tracking of dynamic arm motion estimation and interaction with fuzzy control
by: Badi, Haitham, et al.
Published: (2016)
by: Badi, Haitham, et al.
Published: (2016)
Human evacuation movement simulation model: Concepts and techniques
by: Noor Akma, Abu Bakar, et al.
Published: (2022)
by: Noor Akma, Abu Bakar, et al.
Published: (2022)
Software process for integrated pattern oriented analysis and design (POAD) and component oriented programming (COP) on embedded real-time systems
by: Bau, Simba
Published: (2008)
by: Bau, Simba
Published: (2008)
CPC152/CPM252 – Foundations And Programming For Data Analytics
(Asas Dan Pengaturcaraan Untuk Analitik Data)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2023)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2023)
CPM252 – Foundations and Programming for Data Analytics (Asas dan Pengaturcaraan untuk Analitik Data) - February 2022
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2022)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2022)
CSE241 – Foundations of Software Engineering
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2021)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2021)
Adaptive differential evolution algorithm with fitness based selection of parameters and mutation strategies / Rawaa Dawoud Hassan Al-Dabbagh
by: Rawaa Dawoud Hassan, Al-Dabbagh
Published: (2015)
by: Rawaa Dawoud Hassan, Al-Dabbagh
Published: (2015)
Sistem penempahan buku atas talian / Noor Sabariah Salleh
by: Noor Sabariah, Salleh
Published: (2003)
by: Noor Sabariah, Salleh
Published: (2003)
Map interactive guide using palm Kuala Lumpur (MIGuP-KL) / Noor Azly Mohamed
by: Noor Azly, Mohamed
Published: (2003)
by: Noor Azly, Mohamed
Published: (2003)
Similar Items
-
Accommodating student's learning experience through personalized learning style adaptation in computer programming course at Centre for Foundation Studies, IIUM
by: Idris, Mohd Norhaedir, et al.
Published: (2012) -
Multimedia training package on C# programming language / Johriah Norfizlina Ismail
by: Johriah Norfizlina, Ismail
Published: (2002) -
C programming tutoring simulation with interactive multimedia "cyberc" / Goh Lee Ching
by: Goh , Lee Ching
Published: (2004) -
Sistem perpustakaan maya (Pengkhususan kertas-kertas teknikal) / Noor Azimah Talib
by: Noor Azimah, Talib
Published: (2000) -
Big data security
by: Al-Shawabkeh, Mahmoud M. M.
Published: (2014)