Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

fun(int x)
{
if(x > 0)
fun(x/2);
printf("%d", x);
}

above function is called as:
fun(10);

what will it print?



}

Answer Posted / megha

5

Is This Answer Correct ?    1 Yes 15 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

What are global variables and how do you declare them?

1102


Write a program to generate a pulse width frequency of your choise,which can be variable by using the digital port of your processor

3544


How can you draw circles in C?

1156


What is the significance of scope resolution operator?

1414


What is a good data structure to use for storing lines of text?

1086


How to write a multi-statement macro?

1048


What extern c means?

1005


What oops means?

1001


Can you return null in c?

1169


Can you please explain the difference between syntax vs logical error?

1190


In cryptography, you could often break the algorithm if you know what was the original (plain) text that was encoded into the current ciphertext. This is called the plain text attack. In this simple problem, we illustrate the plain text attack on a simple substitution cipher encryption, where you know each letter has been substituted with a different letter from the alphabet but you don’t know what that letter is. You are given the cipherText as the input string to the function getwordSets(). You know that a plain text "AMMUNITION" occurs somewhere in this cipher text. Now, you have to find out which sets of characters corresponds to the encrypted form of the "AMMUNITION". You can assume that the encryption follows simple substitution only. [Hint: You could use the pattern in the "AMMUNITION" like MM occurring twice together to identify this]

2480


What functions are used for dynamic memory allocation in c language?

1153


What is the use of pragma in embedded c?

1061


How can I prevent another program from modifying part of a file that I am modifying?

1061


develop algorithms to add polynomials (i) in one variable

2169