Skip to main content

Python = vs ==

Hello everyone, in this tutorial you’ll see what’s the difference between = and == in python. Most of new programmers get confused with them.

Python = vs ==

= (assignment operator)

Well, in simple words, ‘=’ is an assignment operator which is used to assign a value (on right side) to a variable (on left side).

Example:

var_name = 10

here var_name is a variable name and 10 is the value to be assigned, we’re using ‘=’ to assign it.

Example Programs:

#example 1
n = 10
print("n = ", n)

Output:

n = 10

#example  2
n1 = 10
n2 = 20
sum = n1 + n2
print("sum = ", sum)

Output:

sum = 30

As in above program, we can also write an expression on the right side of  ‘=’ . the result of that expression will be assigned to the variable on left side.

#example  3
n1,n2 = 10,20
print("n1 = " , n1)
print("n2 = " , n2)

Output:

n1 = 10

n2 = 20

In python, we can also assign more than one value at once using commas.

#example 4
n = input("please enter your name:")
print("name = " + n)

Output:

please enter  your name :  crazy programmer

name =  crazy programmer

The value received by input() function will be assigned to variable ‘n’.

==  (equal to operator)

“==” equal to operator is a relational operator just like “!=”, “<=”. It is used to compare the operands on both of its side. It returns a boolean value (true or false), when both operands are equal then it returns ‘true’ otherwise ‘false’. Mostly it is used in conditional statements.

Example Programs:

#example 1
n = 10
print(n == 12)

Output:

False

In above program, the operands on both side of ‘==’ will be compared with each other. If they are equal then program will print “True”, if not then it will print “False”. The output of above program will be ‘False’ because ‘n’ is not equal to ‘12’.

#example 2
name = input("enter your name:")
if(name == "xyz"):
  print("login successful")
else:
  print("login unsuccessful")

Output: 

enter your name: xyz

login successful

In this program first user will enter a name then interpreter will check the condition. Inside the if statement we wrote ‘name == “xyz”’. If the name entered by user is ‘xyz’ then it will return ‘True’ otherwise ‘False’. In output window we’re entering ‘xyz’ as name then the ‘if’ will be true and will print “login successful”.

I hope your doubt has been cleared. If you have any problem related with this article then please comment below, we’ll reply as soon as possible.

The post Python = vs == appeared first on The Crazy Programmer.



from The Crazy Programmer https://www.thecrazyprogrammer.com/2018/02/python-equal-vs-double-equal.html

Comments

Popular posts from this blog

Rail Fence Cipher Program in C and C++[Encryption & Decryption]

Here you will get rail fence cipher program in C and C++ for encryption and decryption. It is a kind of transposition cipher which is also known as zigzag cipher. Below is an example. Here Key = 3. For encryption we write the message diagonally in zigzag form in a matrix having total rows = key and total columns = message length. Then read the matrix row wise horizontally to get encrypted message. Rail Fence Cipher Program in C #include<stdio.h> #include<string.h> void encryptMsg(char msg[], int key){ int msgLen = strlen(msg), i, j, k = -1, row = 0, col = 0; char railMatrix[key][msgLen]; for(i = 0; i < key; ++i) for(j = 0; j < msgLen; ++j) railMatrix[i][j] = '\n'; for(i = 0; i < msgLen; ++i){ railMatrix[row][col++] = msg[i]; if(row == 0 || row == key-1) k= k * (-1); row = row + k; } printf("\nEncrypted Message: "); for(i = 0; i < key; ++i) f...

Data Encryption Standard (DES) Algorithm

Data Encryption Standard is a symmetric-key algorithm for the encrypting the data. It comes under block cipher algorithm which follows Feistel structure. Here is the block diagram of Data Encryption Standard. Fig1: DES Algorithm Block Diagram [Image Source: Cryptography and Network Security Principles and Practices 4 th Ed by William Stallings] Explanation for above diagram: Each character of plain text converted into binary format. Every time we take 64 bits from that and give as input to DES algorithm, then it processed through 16 rounds and then converted to cipher text. Initial Permutation: 64 bit plain text goes under initial permutation and then given to round 1. Since initial permutation step receiving 64 bits, it contains an 1×64 matrix which contains numbers from 1 to 64 but in shuffled order. After that, we arrange our original 64 bit text in the order mentioned in that matrix. [You can see the matrix in below code] After initial permutation, 64 bit text passed throug...

Experimental: Reducing the size of .NET Core applications with Mono's Linker

The .NET team has built a linker to reduce the size of .NET Core applications. It is built on top of the excellent and battle-tested mono linker . The Xamarin tools also use this linker so it makes sense to try it out and perhaps use it everywhere! "In trivial cases, the linker can reduce the size of applications by 50%. The size wins may be more favorable or more moderate for larger applications. The linker removes code in your application and dependent libraries that are not reached by any code paths. It is effectively an application-specific dead code analysis ." - Using the .NET IL Linker I recently updated a 15 year old .NET 1.1 application to cross-platform .NET Core 2.0 so I thought I'd try this experimental linker on it and see the results. The linker is a tool one can use to only ship the minimal possible IL code and metadata that a set of programs might require to run as opposed to the full libraries. It is used by the various Xamarin products to extract...