Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

What's the difference between a linked list and an array?

Answer Posted / santosh

in array we are having limted memory size(by intializing the
array size).but in the linked list we dont want to intialize
the size because it is the list of elements.there will many
tyes of linked list,by our requirements we can use any one
of the linkedlist.

Is This Answer Correct ?    12 Yes 4 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

Why is it usually a bad idea to use gets()? Suggest a workaround.

1689


What does main () mean in c?

1058


What is self-referential structure in c programming?

1142


FILE PROGRAMMING

2179


What is volatile c?

959


What is strcmp in c?

1018


What is a pointer value and address in c?

1057


Which programming language is best for getting job 2020?

985


In cryptography, you could often break the algorithm if you know what was the original (plain) text that was encoded into the current ciphertext. This is called the plain text attack. In this simple problem, we illustrate the plain text attack on a simple substitution cipher encryption, where you know each letter has been substituted with a different letter from the alphabet but you don’t know what that letter is. You are given the cipherText as the input string to the function getwordSets(). You know that a plain text "AMMUNITION" occurs somewhere in this cipher text. Now, you have to find out which sets of characters corresponds to the encrypted form of the "AMMUNITION". You can assume that the encryption follows simple substitution only. [Hint: You could use the pattern in the "AMMUNITION" like MM occurring twice together to identify this]

2413


Is c a great language, or what?

1050


How can I write data files which can be read on other machines with different word size, byte order, or floating point formats?

977


Are bit fields portable?

1108


What are external variables in c?

1037


What is the use of sizeof () in c?

993


What is double pointer in c?

984