wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

INTRODUCTION TO C#

profile
Sohrab Vakharia
Jul 07, 2017
0 Likes
0 Discussions
418 Reads
  • The C# programming language was originally created by Microsoft in 1999. The development team was led by Anders Hejlsberg.
  • The name "C sharp" was inspired by musical notation where a sharp indicates that the written note should be made a semitone  higher in pitch.
  • This is similar to the language name of C++ , where "++" indicates that a variable should be incremented by 1.
  Who was Anders Hejlsberg ?
  • Anders Hejlsberg  was a programmer in Microsoft corporation.
  • Studied engineering at the Technical University of Denmark, but did not graduate.
  • Anders Hejlsberg, a primary architect of Borland's Turbo Pascal and Delphi systems. Moving to Microsoft in 1996.
  • With C # he focus on taking what was right about existing languages and adding improvements to make something better.
Characteristics C #?
  • Simple
  • Modern
  • Object Oriented Language
  • Powerful & flexible
  • Language of few words
  • Versionable
  • Part of .Net Framework
APPLICATIONS OF C# C# is used for variety of application that are supported by the .Net  platforms, such as
  • It is used for developing Console applications, Windows applications and Web application.
  • It is used for developing Windows controls.
  • It is used for developing ASP.NET projects.
  • It is used for developing web controls.
  • It is used for providing web services.
  • It is used for developing .NET component library.
Major Highlights of C#
  • It is the First Compound Oriented Programming(COP) Language.
  • It Simplifies & modernizes the C++.
  • It is the only COP language available today.
  • It is the only language designed for the .Net frame work.
   

Comments ()


Sign in

Read Next

How to write a cover letter

Blog banner

Random Forests

Blog banner

Deadlock

Blog banner

PROCESS STATE:

Blog banner

Swiggi

Blog banner

Google App Engine

Blog banner

Decoding Confusion Matrix

Blog banner

Blockchain in IoT Applications

Blog banner

The Sunny Side of Instagram

Blog banner

The Role of Teachers in Building a Child’s Confidence

Blog banner

Virtual memory

Blog banner

Affiliate Marketing V/S Influencer Marketing

Blog banner

Virtual memory

Blog banner

A buffer overflow

Blog banner

CONCURRENCY: MUTUAL EXCLUSION AND SYNCHRONIZATION-het karia

Blog banner

Zero Trust Security Model: Revolutionizing Cybersecurity in the Digital Age

Blog banner

Save Environment

Blog banner

Security and E-mail

Blog banner

Student Grade Calculator in LISP

Blog banner

Processing Crime and Incident Scenes

Blog banner

Ola

Blog banner

Principles of Concurrency

Blog banner

objectives and functions of operating system

Blog banner

Telegram and it's features

Blog banner

Why Data Privacy Is Changing Online Advertising

Blog banner

E-security systems | CCTV

Blog banner

5 People who claimed to have Time Traveled

Blog banner

E-learning in today's world

Blog banner

"Mahakali cave"

Blog banner

PHISHING

Blog banner

I/O Buffering

Blog banner

Latest Email Marketing Techniques

Blog banner

VIRTUAL MACHINES

Blog banner

Business Engineering

Blog banner

Software

Blog banner

38_Network Sniffing Techniques_SBC

Blog banner

Critical success factors

Blog banner

What is Network Security?

Blog banner

How to Encrypt and Decrypt Using GNU PGP

Blog banner

Deming’s Process

Blog banner

Advanced Persistent Threats (APTs)

Blog banner

Crypto tax evasion

Blog banner