C Interview Questions
Questions Answers Views Company eMail

What are the different pointer models in c?

4 3147

What is sparse file?

1 2758

How to set a variable in the environment list?

1 3044

How to reverse a string using a recursive function, without swapping or using an extra memory?

Wipro, TCS, Sony, Cisco, Motorola, Mind Tree, Ophio,

31 82137

What is the Difference between Class and Struct?


10 7086

What is the Difference between Macro and ordinary definition?

Motorola, Cognizant, Bosch, College School Exams Tests,

3 14347

what are brk, sbrk?


1 5538

Why the use of alloca() is discouraged?


2 5635

Will Macros support multiple arguments ?


7 6701

what about "char *(*(*a[])())();"


3 3240

Go through the following code sinippet char a[20]; a="Hello Orcale Test"; will this compile?


4 5075

#include #define sqr(x) (x*x) int main() { int x=2; printf("value of x=%d",sqr(x+1)); } What is the value of x?

Oracle, Accel Frontline, Opera,

16 16842

1 232 34543 4567654 can anyone tell me how to slove this c question

6 12346

Determine the code below, tell me exactly how many times is the operation sum++ performed ? for ( i = 0; i < 100; i++ ) for ( j = 100; j > 100 - i; j--) sum++;

Wipro, ITCO,

5 5155

int main() { int *p=new int; *p=10; del p; cout<<*p; *p= 60; cout<<*p; } what will be the output & why?


4 8263

Post New C Questions

Un-Answered Questions { C }

In cryptography, you could often break the algorithm if you know what was the original (plain) text that was encoded into the current ciphertext. This is called the plain text attack. In this simple problem, we illustrate the plain text attack on a simple substitution cipher encryption, where you know each letter has been substituted with a different letter from the alphabet but you don’t know what that letter is. You are given the cipherText as the input string to the function getwordSets(). You know that a plain text "AMMUNITION" occurs somewhere in this cipher text. Now, you have to find out which sets of characters corresponds to the encrypted form of the "AMMUNITION". You can assume that the encryption follows simple substitution only. [Hint: You could use the pattern in the "AMMUNITION" like MM occurring twice together to identify this]


what is uses of .net


void main(int n) { if(n==0) return; main(--n); printf("%d ",n); getch(); } how it work and what will be its output...............it any one know ans plz reply


write a programe to accept any two number and check the following condition using goto state ment.if a>b,print a & find whether it is even or odd and then print.and a


what is associativity explain what is the precidence for * and & , * and ++ how the folloing declaration work 1) *&p; 2) *p++;


how do you programme Carrier Sense Multiple Access


4-Take two sets of 5 numbers from user in two arrays. Sort array 1 in ascending and array 2 in descending order. Perform sorting by passing array to a function mySort(array, sortingOrder). Then multiply both the arrays returned from function, using metric multiplication technique in main. Print result in metric format.


How to check whether string is a palindrome, WITHOUT USING STRING FUNCTIONS?


how to execute a program using if else condition and the output should enter number and the number is odd only...


write an interactive C program that will encode or decode a line of text.To encode a line of text,proceed as follows. 1.convert each character,including blank spaces,to its ASCII equivalent. 2.Generate a positive random integer.add this integer to the ASCII equivalent of each character.The same random integer will be used for the entire line of text. 3.Suppose that N1 represents the lowest permissible value in the ASCII code,and N2 represents the highest permissible value.If the number obtained in step 2 above(i.e.,the original ASCII equivalent plus the random integer)exceeds N2,then subtract the largest possible multiple of N2 from this number,and add the remainder to N1.Hence the encoded number will always fall between N1 and N2,and will therefore always represent some ASCII character. 4.Dislay the characters that correspond to the encoded ASCII values.  The procedure is reversed when decoding a line of text.Be certain,however,that the same random number is used in decodingas was used in encoding.


I need a help with a program: Write a C program that uses data input in determining the whole of points A and a whole of circles B. Find two points in A so that the line which passes through them, cut through the maximum number of circles.


hi any body pls give me company name interview conduct "c" language only


what is the different bitween abap and abap-hr?


I completed my B.tech (IT). Actually I want to develop virtual object that which will change software technology in the future. To develop virtual object what course I have to take. can I any professor to help me.


what do u mean by Direct access files? then can u explain about Direct Access Files?