C Interview Questions
Questions Answers Views Company eMail

program to find the second largest word in a paragraph amongst all words that repeat more thn twice

iGate, CTS,

4 9662

why i join syntel?

Syntel, ABC, TCS,

23 44480

Write code for initializing one dimentional and two dimentional array in a C Program?

Deshaw, Edutech, GMD,

5 10013

what is the difference between NULL & NUL keywords in C?

3 19441

how many argument we can pas in in a function


25 16890


8 8413

palindrome for strings and numbers----Can anybody do the prog?

CTS, TCS, Vipro Lifescience Pvt,

6 8866

How many types of linked lists what are they? How many types of data structures?

BSNL, Pivotal Software,

18 30822

What are the phases in s/w developed life cycle? wat is the diff b/w stack & queue...where do we use stack

6 4660

What is function pointer and where we will use it

Infosys, NetApp,

2 6434

Who had beaten up hooligan "CHAKULI" in his early college days?

1 2568

write a program to find out number of on bits in a number?

Microsoft, Huawei,

17 20013

post new interiew question and aptitude test papers

1 2857

what information does the header files contain?

GDA Technologies, BSNL, Cisco,

6 14293



7 6326

Post New C Questions

Un-Answered Questions { C }

In cryptography, you could often break the algorithm if you know what was the original (plain) text that was encoded into the current ciphertext. This is called the plain text attack. In this simple problem, we illustrate the plain text attack on a simple substitution cipher encryption, where you know each letter has been substituted with a different letter from the alphabet but you don’t know what that letter is. You are given the cipherText as the input string to the function getwordSets(). You know that a plain text "AMMUNITION" occurs somewhere in this cipher text. Now, you have to find out which sets of characters corresponds to the encrypted form of the "AMMUNITION". You can assume that the encryption follows simple substitution only. [Hint: You could use the pattern in the "AMMUNITION" like MM occurring twice together to identify this]


hello freinds next week my interview in reliance,nybody has an idea about it intervew questions..so tell


what do u mean by Direct access files? then can u explain about Direct Access Files?


To print the pattern 1 2 3 4 5 10 17 18 19 6 15 24 25 20 7 14 23 22 21 8 13 12 11 10 9


why to assign a pointer to null sometimes??how can a pointer we declare get assigned with a garbage value by default???


what are bit fields? What is the use of bit fields in a structure declaration?


please give me a VIRTUSA sample palcement papers.... you will only send TECHNICAL SECTION..... that is help for me Advance Thanks........................


using for loop sum 2 number of any 4 digit number in c language


how to solve "unable to open stdio.h and conio.h header files in windows 7 by using Dos-box software


in iso what are the common technological language?


Hai,I have done with my bachelor of commerce and planing to ms,please suggest me how to convince vo for shifting from commerce to computers. Visa on 8 DEC 2014  Npu university


Q.1 write aprogram to stack using linklist o insert 40 items? Q.2 write a program to implement circular queue with help of linklist?


what are the 10 different models of writing an addition program in C language?


how do you programme Carrier Sense Multiple Access


program to convert a integer to string in c language'