Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

Write code for initializing one dimentional and two
dimentional array in a C Program?

Answer Posted / varsha vilas kalebag

one dimensional array :
a={2}
two dimensional array
b={2,3}

Is This Answer Correct ?    5 Yes 18 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

What is hash table in c?

984


Hi can anyone tell what is a start up code?

2013


my project name is adulteration of chille powder.how can i explain it to the hr when he asks me about the project?

1542


Why is sizeof () an operator and not a function?

991


in any language the sound structure of that language depends on its a) character set, input/output function, its control structures b) character set, library functions, input/output functions its control structures c) character set, library functions, control sturctures d) character set, operators, its control structures

1164


Array is an lvalue or not?

1073


what is a constant pointer in C

1100


Which is best book for data structures in c?

1052


What are the properties of union in c?

1009


in programming languages a statement or part of a statement that specifies several different execution sequences a) constructs b) distructs c) executes d) none

1042


What could possibly be the problem if a valid function name such as tolower() is being reported by the C compiler as undefined?

1236


Explain how can type-insensitive macros be created?

961


explain what are pointers?

972


In cryptography, you could often break the algorithm if you know what was the original (plain) text that was encoded into the current ciphertext. This is called the plain text attack. In this simple problem, we illustrate the plain text attack on a simple substitution cipher encryption, where you know each letter has been substituted with a different letter from the alphabet but you don’t know what that letter is. You are given the cipherText as the input string to the function getwordSets(). You know that a plain text "AMMUNITION" occurs somewhere in this cipher text. Now, you have to find out which sets of characters corresponds to the encrypted form of the "AMMUNITION". You can assume that the encryption follows simple substitution only. [Hint: You could use the pattern in the "AMMUNITION" like MM occurring twice together to identify this]

2423


What is %lu in c?

1193