:: Home Page
 Advertise your Business Here     
Browse  |   Placement Papers  |   Company  |   Code Snippets  |   Certifications  |   Visa Questions
Post Question  |   Post Answer  |   My Panel  |   Search  |   Articles  |   Topics  |   Errors
   Testimonials Refer this Site  Refer This Site to Your Friends  Site Map  Contact Us      
Categories >> Software >> Programming Languages >> C


Question Sir i want e-notes of C languge of BAlaguruswami book i.e
scanned or pdf file of balaguruswamy book on c
language.PLEASE SEND ME on my mail id
 Question Asked In Companies ::     < I also faced this Question! >
 Question Submitted By :: ajit kolhe
  Answer Posted By  
i just want to know that sir which book i must get for c++
if you can send me e-notes for help my mail id is

Is This Answer Correct ?    7 Yes 8 No

View All Answers
Please Help Members By Posting Answers For Below Questions
 Question Views   Select
plz let me know how to become a telecom protocol tester. thank you. 591
what is the c source code for the below output? 5555555555 4444 4444 333 333 22 22 1 1 22 22 333 333 4444 4444 5555555555 1002
What is the relationship between pointers and data structure? 93
write a program that declares an array of 30 elements named "income" in the main functions. then cal and pass the array to a programmer-defined function named "getIncome" within the "getIncome" function, ask the user for annual income of 30 employees. then calculate and print total income on the screen using the following function: "void getIncome ( ai []); 482
In cryptography, you could often break the algorithm if you know what was the original (plain) text that was encoded into the current ciphertext. This is called the plain text attack. In this simple problem, we illustrate the plain text attack on a simple substitution cipher encryption, where you know each letter has been substituted with a different letter from the alphabet but you don’t know what that letter is. You are given the cipherText as the input string to the function getwordSets(). You know that a plain text "AMMUNITION" occurs somewhere in this cipher text. Now, you have to find out which sets of characters corresponds to the encrypted form of the "AMMUNITION". You can assume that the encryption follows simple substitution only. [Hint: You could use the pattern in the "AMMUNITION" like MM occurring twice together to identify this] 721
how logic is used 301
hello freinds next week my interview in reliance,nybody has an idea about it intervew tell 368
regarding pointers concept 402
program for reversing a selected line word by word when multiple lines are given without using strrev 748
Device an algorithm for weiler-atherton polygon clipping, where the clipping window can be any specified polygon 3330
pgm to find any error in linklist(in single linklist check whether any node points any of previous nodes instead of next node) 960
Linked list is a Linear or non linear explain if linear how it working as a non linear data structures 609
write a program to find the given number is prime or not 1341
At a shop of marbles, packs of marbles are prepared. Packets are named A, B, C, D, E …….. All packets are kept in a VERTICAL SHELF in random order. Any numbers of packets with these names could be kept in that shelf as in this example: bottom of shelf ---> [AAAJKRDFDEWAAYFYYKK]-----Top of shelf. All these packets are to be loaded on cars. The cars are lined in order, so that the packet could be loaded on them. The cars are also named [A, B, C, D, E,………….]. Each Car will load the packet with the same alphabet. So, for example, car ‘A’ will load all the packets with name ‘A’. Each particular car will come at the loading point only once. The cars will come at the loading point in alphabetical order. So, car ‘B’ will come and take all the packets with name ‘B’ from the shelf, then car ‘C’ will come. No matter how deep in the shelf any packet ‘B’ is, all of the ‘B’ packets will be displaced before the ‘C’ car arrives. For that purpose, some additional shelves are provided. The packets which are after the packet B, are kept in those shelves. Any one of these shelves contains only packets, having the same name. For example, if any particular shelf is used and if a packet with name X is in it, then only the packets having names X will be kept in it. That shelf will look like [XXXXXXX]. If any shelf is used once, then it could be used again only if it is vacant. Packets from the initial shelf could be unloaded from top only. Write a program that finds the minimum total number of shelves, including the initial one required for this loading process. 443
what type of questions arrive in interview over c programming? 370
E-Mail New Answers        Answer Selected Questions