f(char *p) { p=(char *)malloc(sizeof(6)); strcpy(p,"HELLO"); } main() { char *p="BYE"; f(p) printf("%s",p); } what is the output?
9 21547How do you declare a host variable (in COBOL) for an attribute named emp-name of type VARCHAR(25) ?
2 12241What are the different methods of accessing db2 from tso? How is the connection established between TSO & DB2?
3 14479what's the equivalent Cobol Data type for Decimal(x,y) in DB2? what does the current SQLID register contain?
3 18486Post New Tech Mahindra Interview Questions
Why we use pl sql?
how can see the ac indoor or out door ac which Tr
How to know about the rating(voltage and other) of induction motor if its name plate is missing at the manufacturing site.
question related to table havi colspan and row span
I have an exchange 2003 server on a member server that I promoted to a dc, what happened to my oma, it no longer works?
What is cmap and oTD. What is the use of OTD?
how can we do the frame work in qtp
what is meant by CT`s saturation ? Can we use Metering CT`s with Protetection CT`s ?
Name two methods you could use to rename a file?
What is jumbotron?
Is the br tag deprecated?
What is the bidirectional search algorithm?
Tell me a business scenario where I can achieve the data through MINUS only not through subquery.
Assuming one link of the Trojan horse copy-and-observe-later chain is broken. There are two other possible angles of attack by Alice: Alice logging on and attempting to read the string directly, and alice assigning a security level of sensitive to the back-pocket file. Does the reference monitor prevent these attacks?
What applications use python?