f(char *p) { p=(char *)malloc(sizeof(6)); strcpy(p,"HELLO"); } main() { char *p="BYE"; f(p) printf("%s",p); } what is the output?
9 21033How do you declare a host variable (in COBOL) for an attribute named emp-name of type VARCHAR(25) ?
2 12031What are the different methods of accessing db2 from tso? How is the connection established between TSO & DB2?
3 14204what's the equivalent Cobol Data type for Decimal(x,y) in DB2? what does the current SQLID register contain?
3 18212Post New Tech Mahindra Interview Questions
If your project is support project ? when is your implementation has completed ?
What is meant by a "baseline data" in sap ar and ap?
Where is objective c used?
Explain a simple Map/Reduce problem.
How to rename a table using sql queries?
Define what is the difference between page-validate and property-validate methods?
What are the various steps involved in an analytics project?
how do we write scripts in unix how to execute scripts in real time anybody please needfull or give me number i will cal u
Which animal live in hot region?
How to retrieve warnings in jdbc?
Information-gathering techniques used in the Risk Identification process include all of the following except: A. Brainstorming B. Delphi technique C. Interviewing D. Kaizen technique
What are some of the other erp applications available in the market?
Which type of hypervisors are supported in openstack?
why digestion require in icpms?
What is whitenoise django?