C/C++ What is the Precedence of Mathematical Operators in C++?

  • Thread starter Thread starter needOfHelpCMath
  • Start date Start date
  • Tags Tags
    C++
AI Thread Summary
In C++, the order of operations dictates that multiplication (*) and division (/) have the same precedence and are evaluated from left to right, taking priority over addition (+) and subtraction (-), which also share the same precedence and are evaluated left to right. For the expression 7+3*4/2-5-3+4, the evaluation proceeds as follows: first, the multiplication and division are calculated, resulting in 7+6-5-3+4, which is then simplified step by step to arrive at the final result. This follows the standard mathematical conventions for operator precedence.
needOfHelpCMath
Messages
70
Reaction score
0
Which has precedence over each other * / - + because i am working on this problem for c++ but without coding it but instead writing it out on paper. For example:
HTML:
7+3*4/2-5-3+4

Which will have precedence - or /?
 
Technology news on Phys.org
needOfHelpCMath said:
Which has precedence over each other * / - + because i am working on this problem for c++ but without coding it but instead writing it out on paper. For example:
HTML:
7+3*4/2-5-3+4

Which will have precedence - or /?

Hey needOfHelpCMath! (Wave)

The operators [M]*[/M] and [M]/[/M] have the same priority and are evaluated from left to right.
They have higher priority than [M]+[/M] and [M]-[/M], so are evaluated first.
After that the operators [M]+[/M] and [M]-[/M] have equal priority, and are also evaluated left to right.

This is exactly the same as the generally accepted order in 'real life'.

It means that the expression is evaluated as:
Code:
7+3*4/2-5-3+4 = 7+((3*4)/2)-5-3+4 = 7+6-5-3+4 = ((((7+6)-5)-3)+4)
 
Thank you very much!
 
Thread 'Is this public key encryption?'
I've tried to intuit public key encryption but never quite managed. But this seems to wrap it up in a bow. This seems to be a very elegant way of transmitting a message publicly that only the sender and receiver can decipher. Is this how PKE works? No, it cant be. In the above case, the requester knows the target's "secret" key - because they have his ID, and therefore knows his birthdate.
Thread 'Project Documentation'
Trying to package up a small bank account manager project that I have been tempering on for a while. One that is certainly worth something to me. Although I have created methods to whip up quick documents with all fields and properties. I would like something better to reference in order to express the mechanical functions. It is unclear to me about any standardized format for code documentation that exists. I have tried object orientated diagrams with shapes to try and express the...
Back
Top