Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

enum day = { jan = 1 ,feb=4, april, may}
what is the value of may?
a)4 b)5 c)6 d)11
e)none of the above

Answer Posted / vijoeyz

enum day = { jan = 1 ,feb=4, april, may}

- should have been -

enum day { jan = 1 ,feb=4, april, may};

However, the answer is 6, i.e., the option C.

Best,
Vijay Zanvar,
Home Page - http://geocities.com/vijoeyz/

Is This Answer Correct ?    74 Yes 15 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

How can I check whether a file exists? I want to warn the user if a requested input file is missing.

1128


State two uses of pointers in C?

1043


What is difference between main and void main?

1186


In cryptography, you could often break the algorithm if you know what was the original (plain) text that was encoded into the current ciphertext. This is called the plain text attack. In this simple problem, we illustrate the plain text attack on a simple substitution cipher encryption, where you know each letter has been substituted with a different letter from the alphabet but you don’t know what that letter is. You are given the cipherText as the input string to the function getwordSets(). You know that a plain text "AMMUNITION" occurs somewhere in this cipher text. Now, you have to find out which sets of characters corresponds to the encrypted form of the "AMMUNITION". You can assume that the encryption follows simple substitution only. [Hint: You could use the pattern in the "AMMUNITION" like MM occurring twice together to identify this]

2458


What is the difference between a string copy (strcpy) and a memory copy (memcpy)? When should each be used?

1101


Is it cc or c in a letter?

1009


What is the use of header?

1077


Differentiate Source Codes from Object Codes

1543


What are the disadvantages of c language?

1173


What does c mean before a date?

1160


What is extern storage class in c?

986


Write a program of prime number using recursion.

1066


What is string function in c?

968


Describe the difference between = and == symbols in c programming?

1350


write a program to generate address labels using structures?

4561