Follow Our FB Page << CircleMedia.in >> for Daily Laughter. We Post Funny, Viral, Comedy Videos, Memes, Vines...

C Interview Questions
Questions Answers Views Company eMail

What is extern storage class in c?

117

What is variables in c?

127

What is null pointer constant?

119

What does volatile do?

135

What is the difference between volatile and const volatile?

124

What is the use of volatile?

125

When should volatile modifier be used?

118

Can a variable be both constant and volatile?

117

What is volatile variable how do you declare it?

119

Where is volatile variable stored?

119

What are lookup tables in c?

116

What is a lookup table in c?

121

What is table lookup in c?

139

Can we increase size of array in c?

121

What is a dynamic array in c?

124


Post New C Questions






Un-Answered Questions { C }

Define Array of pointers.

175


What do you mean by dynamic memory allocation in c?

169


Explain what are the standard predefined macros?

178


How can I recover the file name given an open stream or file descriptor?

170


What is c value paradox explain?

141






Create a registration form application by taking the details like username, address, phone number, email with password and confirm password (should be same as password).Ensure that the password is of 8 characters with only numbers and alphabets. Take such details for 3 users and display the details. While taking input password must appear as “****”.

1572


When is the “void” keyword used in a function?

212


What does return 1 means in c?

125


What is bubble sort technique in c?

148


In cryptography, you could often break the algorithm if you know what was the original (plain) text that was encoded into the current ciphertext. This is called the plain text attack. In this simple problem, we illustrate the plain text attack on a simple substitution cipher encryption, where you know each letter has been substituted with a different letter from the alphabet but you don’t know what that letter is. You are given the cipherText as the input string to the function getwordSets(). You know that a plain text "AMMUNITION" occurs somewhere in this cipher text. Now, you have to find out which sets of characters corresponds to the encrypted form of the "AMMUNITION". You can assume that the encryption follows simple substitution only. [Hint: You could use the pattern in the "AMMUNITION" like MM occurring twice together to identify this]

1498


How will you divide two numbers in a MACRO?

194


What are type modifiers in c?

140


What is the use of c language in real life?

133


How does normalization of huge pointer works?

167


Can we initialize extern variable in c?

123