C Interview Questions
Questions Answers Views Company eMail

how to find the kth smallest element in the given list of array elemnts.

Silicon,

8 22232

how to sort two array of characters and make a new array of characters.

Accenture,

1 4901

what is difference between ++(*p) and (*p)++

Accenture, HCL, IBM,

17 24325

what is difference between array of characters and string

Accenture, Nest,

18 43177

char ch=10;printf("%d",ch);what is the output

Accenture,

14 22129

char ch="{'H','I',0};printf("%s",ch);what is output

Accenture,

9 10804

which one is not preprocessor directive a)#if b)#elif c)#undef d)#pragma

Accenture, Infosys, TCS, Wipro,

16 20384

what will be the output: main(){char ch;int a=10;printf("%d",ch);}

Accenture, TCS, Wipro,

36 26987

value = 0xabcd; for (loop = 1; (value >> 1) & 1 | loop & 1; loop++) { foo(); if (loop & 1) value >>= 1; } how many times is foo() executed?

Google,

6 11038

class foo { public: static int func(const char*& p) const; }; This is illegal, why?

Google,

8 14481

how to estimate the disk access time? e.g. the time between read one byte and another byte in the disk.

Google,

3 11098

what is the hexidecimal number of 4100?

Google,

16 19929

give one ip, find out which contry

Google,

4 11288

What is C language Terminator?

TCS,

15 28871

program to find a smallest number in an array

Microsoft, Sony,

15 36008


Post New C Questions

Un-Answered Questions { C }

What is indirection?

637


develop algorithms to add polynomials (i) in one variable

1722


What is c language in simple words?

579


In cryptography, you could often break the algorithm if you know what was the original (plain) text that was encoded into the current ciphertext. This is called the plain text attack. In this simple problem, we illustrate the plain text attack on a simple substitution cipher encryption, where you know each letter has been substituted with a different letter from the alphabet but you don’t know what that letter is. You are given the cipherText as the input string to the function getwordSets(). You know that a plain text "AMMUNITION" occurs somewhere in this cipher text. Now, you have to find out which sets of characters corresponds to the encrypted form of the "AMMUNITION". You can assume that the encryption follows simple substitution only. [Hint: You could use the pattern in the "AMMUNITION" like MM occurring twice together to identify this]

1944


a linearly ordered set of data elements that have the same structure and whose order is preserved in storage by using sequential allocation a) circular b) ordinary c) array d) linear list

621






Can math operations be performed on a void pointer?

574


Explain enumerated types in c language?

592


Explain the binary height balanced tree?

708


How many header files are in c?

537


Is c easy to learn?

550


Why can arithmetic operations not be performed on void pointers?

581


What is the size of structure in c?

686


What are the types of unary operators?

645


Can we add pointers together?

604


What is the value of uninitialized variable in c?

560