C Interview Questions
Questions Answers Views Company eMail

program to find the second largest word in a paragraph amongst all words that repeat more thn twice

iGate, CTS,

4 9662

why i join syntel?

Syntel, ABC, TCS,

23 44480

Write code for initializing one dimentional and two dimentional array in a C Program?

Deshaw, Edutech, GMD,

5 10013




what is the difference between NULL & NUL keywords in C?

3 19441

how many argument we can pas in in a function

CTS,

25 16890

HOW TO HANDLE EXCEPTIONS IN C

8 8413

palindrome for strings and numbers----Can anybody do the prog?

CTS, TCS, Vipro Lifescience Pvt,

6 8866

How many types of linked lists what are they? How many types of data structures?

BSNL, Pivotal Software,

18 30822




What are the phases in s/w developed life cycle? wat is the diff b/w stack & queue...where do we use stack

6 4660

What is function pointer and where we will use it

Infosys, NetApp,

2 6434

Who had beaten up hooligan "CHAKULI" in his early college days?

1 2568

write a program to find out number of on bits in a number?

Microsoft, Huawei,

17 20013

post new interiew question and aptitude test papers

1 2857

what information does the header files contain?

GDA Technologies, BSNL, Cisco,

6 14293

IS STRUCTURES CAN BE USED WITHIN AN ARRAY?

Caritor,

7 6326


Post New C Questions






Un-Answered Questions { C }

In cryptography, you could often break the algorithm if you know what was the original (plain) text that was encoded into the current ciphertext. This is called the plain text attack. In this simple problem, we illustrate the plain text attack on a simple substitution cipher encryption, where you know each letter has been substituted with a different letter from the alphabet but you don’t know what that letter is. You are given the cipherText as the input string to the function getwordSets(). You know that a plain text "AMMUNITION" occurs somewhere in this cipher text. Now, you have to find out which sets of characters corresponds to the encrypted form of the "AMMUNITION". You can assume that the encryption follows simple substitution only. [Hint: You could use the pattern in the "AMMUNITION" like MM occurring twice together to identify this]

1243


hello freinds next week my interview in reliance,nybody has an idea about it intervew questions..so tell

938


what do u mean by Direct access files? then can u explain about Direct Access Files?

990


To print the pattern 1 2 3 4 5 10 17 18 19 6 15 24 25 20 7 14 23 22 21 8 13 12 11 10 9

1455


why to assign a pointer to null sometimes??how can a pointer we declare get assigned with a garbage value by default???

781






what are bit fields? What is the use of bit fields in a structure declaration?

825


please give me a VIRTUSA sample palcement papers.... you will only send TECHNICAL SECTION..... that is help for me Advance Thanks........................

843


using for loop sum 2 number of any 4 digit number in c language

949


how to solve "unable to open stdio.h and conio.h header files in windows 7 by using Dos-box software

2086


in iso what are the common technological language?

987


Hai,I have done with my bachelor of commerce and planing to ms,please suggest me how to convince vo for shifting from commerce to computers. Visa on 8 DEC 2014  Npu university

928


Q.1 write aprogram to stack using linklist o insert 40 items? Q.2 write a program to implement circular queue with help of linklist?

904


what are the 10 different models of writing an addition program in C language?

764


how do you programme Carrier Sense Multiple Access

880


program to convert a integer to string in c language'

1224