C Interview Questions
Questions Answers Views Company eMail

sir, i cannot find the way how to write aprogram by using array on queue

IISIT,

1 1796

WHAT IS MAXIMUM SIZE OF AN ARRAY IN C LANGUAGE?

IBM, SAS, Carphone Warehouse,

8 13110

How can I make a program in c to print 'Hello' without using semicolon in the code?

C DAC, Practical Viva Questions,

9 9543




write a function to find whether a string is palindrome or not and how many palindrome this string contain?

Aptech,

2 9573

compute the nth mumber in the fibonacci sequence?

HPL, Satyam, Canon, TCS,

10 11629

What are the commands should be given before weiting C Program i.e, Cd.. like

IBM, Satyam, Infonet, Tech Mahindra,

4 3639

can i know the source code for reversing a linked list with out using a temporary variable?

Honeywell,

6 5515

hello friends what do u mean by BUS ERROR i got this error while i am doing my program in DATA STRUCTURES

Wipro,

2 3816




how to exchnage bits in a byte b7<-->b0 b6<-->b1 b5<-->b2 b4<-->b3 please mail me the code if any one know to rajeshmb4u@gmail.com

Honeywell, Huawei,

3 4302

difference between i++* and *++i

IBM,

6 8320

hai iam working in sap sd module for one year and working in lumax ind ltd in desp department but my problem is i have done m.b.a in hr/marketing and working sap sd there is any combination it. can you give right solution of my problem. and what can i do?

HCL,

929

write a code for large nos multilication (upto 200 digits)

Persistent,

2 6544

can u give me the good and very optimised code for a car racing game?

674

What is meant by global static? why we have to use static variable instead of Global variable

L&T,

4 4670

In how much time you will write this c program? Prime nos from 1 to 1000

TCS,

2 2057


Post New C Questions






Un-Answered Questions { C }

If jack lies on Mon, Tue Wed and jill lies on Thursday, Friday and Saturday. If both together tell they lied yesterday. So c the given options and then c cos in the given dates one will be saying the truth and one will be lying. I got Thursday as option because jack is saying the truth he lied yest but jill is lying again as he lies on that day.

1040


write a programming in c to find the sum of all elements in an array through function.

943


c program to compute AREA under integral

948


You are to write your own versions of strcpy() and strlen (). Call them mystrcpy() and mystrlen(). Write them first as code within main(), not as functions, then, convert them to functions. You will pass two arrays to the function in the case of mystrcpy(), the source and target array.

998


I completed my B.tech (IT). Actually I want to develop virtual object that which will change software technology in the future. To develop virtual object what course I have to take. can I any professor to help me.

966






Explain the process of converting a Tree into a Binary Tree.

1115


What is the difference between specifying a constant variable like with constant keyword and #define it? i.e what is the difference between CONSTANT FLOAT A=1.25 and #define A 1.25

709


GIVEN A FLOATING POINT NUMBER HOW IS IT ACTUALLY STORED IN MEMORY ? CAN ANYONE EXPLAIN?? THE 32 BIT REPRESENTATION OF A FLOATING POINT NUMBER ALLOTS: 1 BIT-SIGN 8 BITS-EXPONENT 23 BITS-MANTISSA

672


Write a Program to accept different goods with the number, price and date of purchase and display them

3367


The postoder traversal is 7,14,3,55,22,5,17 Then ur Inorder traversal is??? please help me on this

1796


can we change the default calling convention in c if yes than how.........?

1251


In cryptography, you could often break the algorithm if you know what was the original (plain) text that was encoded into the current ciphertext. This is called the plain text attack. In this simple problem, we illustrate the plain text attack on a simple substitution cipher encryption, where you know each letter has been substituted with a different letter from the alphabet but you don’t know what that letter is. You are given the cipherText as the input string to the function getwordSets(). You know that a plain text "AMMUNITION" occurs somewhere in this cipher text. Now, you have to find out which sets of characters corresponds to the encrypted form of the "AMMUNITION". You can assume that the encryption follows simple substitution only. [Hint: You could use the pattern in the "AMMUNITION" like MM occurring twice together to identify this]

1159


why return type of main is not necessary in linux

927


develop algorithms to add polynomials (i) in one variable

916


c program for searching a student details among 10 student details

927