Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

Can we write a program without main() function?

Answer Posted / vaibhav

no because every c prog. can compile from main function.
but when we write a code for creating a header file, we
cant use main function.

Is This Answer Correct ?    2 Yes 4 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

What is the difference between class and object in c?

1168


Why does notstrcat(string, "!");Work?

1132


Explain what is #line used for?

1061


Write a program to print fibonacci series using recursion?

1057


5 Write an Algorithm to find the maximum and minimum items in a set of ‘n’ element.

2100


What are pointers in C? Give an example where to illustrate their significance.

1223


Explain null pointer.

1105


What is a rvalue?

1201


In cryptography, you could often break the algorithm if you know what was the original (plain) text that was encoded into the current ciphertext. This is called the plain text attack. In this simple problem, we illustrate the plain text attack on a simple substitution cipher encryption, where you know each letter has been substituted with a different letter from the alphabet but you don’t know what that letter is. You are given the cipherText as the input string to the function getwordSets(). You know that a plain text "AMMUNITION" occurs somewhere in this cipher text. Now, you have to find out which sets of characters corresponds to the encrypted form of the "AMMUNITION". You can assume that the encryption follows simple substitution only. [Hint: You could use the pattern in the "AMMUNITION" like MM occurring twice together to identify this]

2466


What are header files in c programming?

1127


Explain low-order bytes.

1028


What is infinite loop?

1080


What is I ++ in c programming?

1109


What is meant by preprocessor in c?

1006


Describe wild pointers in c?

1108