Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

Method Overloading exist in c ?

Answer Posted / nagulmmera

Not exit in c,method overloading supported in oop

Is This Answer Correct ?    11 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

What is array of structure in c?

1186


Explain what does the format %10.2 mean when included in a printf statement?

1367


What math functions are available for integers? For floating point?

1138


What is the difference between volatile and const volatile?

990


what do the 'c' and 'v' in argc and argv stand for?

1176


What are external variables in c?

1107


How can I convert a number to a string?

1199


Write a program on swapping (100, 50)

1131


What is bss in c?

1106


What is restrict keyword in c?

1116


In cryptography, you could often break the algorithm if you know what was the original (plain) text that was encoded into the current ciphertext. This is called the plain text attack. In this simple problem, we illustrate the plain text attack on a simple substitution cipher encryption, where you know each letter has been substituted with a different letter from the alphabet but you don’t know what that letter is. You are given the cipherText as the input string to the function getwordSets(). You know that a plain text "AMMUNITION" occurs somewhere in this cipher text. Now, you have to find out which sets of characters corresponds to the encrypted form of the "AMMUNITION". You can assume that the encryption follows simple substitution only. [Hint: You could use the pattern in the "AMMUNITION" like MM occurring twice together to identify this]

2485


Can you assign a different address to an array tag?

1177


Why we use int main and void main?

1084


Difference between exit() and _exit() function?

1143


Explain the process of converting a Tree into a Binary Tree.

2671