Follow Our FB Page << CircleMedia.in >> for Daily Laughter. We Post Funny, Viral, Comedy Videos, Memes, Vines...

Company Name Starts with ...
#  A  B  C  D  E   F  G  H  I  J   K  L  M  N  O   P  Q  R  S  T   U  V  W  X  Y  Z

Infosys C Interview Questions

Write a program to replace n bits from the position p of the bit representation of an inputted character x with the one's complement. Method invertBit takes 3 parameters x as input character, p as position and n as the number of positions from p. Replace n bits from pth position in 8 bit character x. Then return the characters by inverting the bits.

3246

In cryptography, you could often break the algorithm if you know what was the original (plain) text that was encoded into the current ciphertext. This is called the plain text attack. In this simple problem, we illustrate the plain text attack on a simple substitution cipher encryption, where you know each letter has been substituted with a different letter from the alphabet but you don’t know what that letter is. You are given the cipherText as the input string to the function getwordSets(). You know that a plain text "AMMUNITION" occurs somewhere in this cipher text. Now, you have to find out which sets of characters corresponds to the encrypted form of the "AMMUNITION". You can assume that the encryption follows simple substitution only. [Hint: You could use the pattern in the "AMMUNITION" like MM occurring twice together to identify this]

1565

1333

c program to compute AREA under integral

1359

1415

to write a program, that finds the minimum total number of shelves, including the initial one, required for this loading process. The packets are named A, B, C, D, E …….. Any numbers of packets with these names could be kept in the shelf, as in this example: [ZZLLAAJKRDFDDUUGGYFYYKK]. All packets are to be loaded on cars. The cars are lined in order, so that the packets could be loaded on them. The cars are also named [A, B, C, D, E,………….].

4909

i got 75% in all semester am i eligible for your company

1369

Write a C program that defines a 2-dimentional integer array called A [50][50]. Then the elements of this array should randomly be initialized either to 1 or 0. The program should then print out all the elements in the diagonal (i.e. a[0][0], a[1][1],a[2][2], a[3][3], ……..a[49][49]). Finally, print out how many zeros and ones in the diagonal.

2684

difference between Low, Middle, High Level languages in c ?

1275

Function which gives a pointer to a binary trees const an integer value at each code, return function of all the nodes in binary tree.?

249

What is NULL pointer?

251

Write a program to swap two numbers without using a temporary variable?

250

Given an array of 1s and 0s arrange the 1s together and 0s together in a single scan of the array. Optimize the boundary conditions?

353

How do you fix a value error?

76

In the instruction FADD, What does F stands for

310

How can one increase replication factor to a desired value in Hadoop?

582

What is contextual routing in flume?

253

221

What are different types of media object?

1

What is the difference between ojdbc6 and ojdbc7?

162

What is multi-provider in sap bi? What are the features of multiproviders?

8

Define the list of pre-configured queues?

190

What are the types of bitmap effects?

40

What is meant by payscale structure? How did you configure payscale structure? (I said I created various payroll areas and defaulted them using the feature abkrs. Seemed he was expecting more than this from me.)

236

How do I implement an accelerator key for a text box?

725

Why compliance is required in openstack?

1

what are the qualities u have which are totally different form others and we havent judge before?

1100

Systematic random samp ling is to be used to select 5 addresses from an ordered list containing 500 addresses. A 1- in-100 systematic sample is used to select the 5 addresses. What is the chance that any specific address will be chosen.

192