Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

Company Name Starts with ...
#  A  B  C  D  E   F  G  H  I  J   K  L  M  N  O   P  Q  R  S  T   U  V  W  X  Y  Z

Amazon C Interview Questions
Questions Answers Views Company eMail

How would you print out the data in a binary tree, level by level, starting at the top?

6 25174

Write an interactive c program that will encode or decode a line of text. To encode a line of text, proceed as follows: Convert each character, including blank spaces, to its ASCII equivalent. Generate a positive random integer. Add this integer to the ASCII equivalent of each character. The same random integer will be used for the entire line of text. Suppose that N1 represents the lowest permissible value in the ASCII code, and N2 represents the highest permissible value. If the number obtained in step 2 above exceeds N2, then subtract the largest possible multiple of N2 from this number, and add the remainder to N1. Hence the encoded number will always fall between N1 and N2, and will therefore always represent some ASCII character. Display the characters that correspond to the encoded ASCII values. The procedure is reversed when decoding a line of text. Be certain, however, that the same random number is used in decoding as was used in encoding.

1 12894

if the address of a[1,1] and a[2,1] are 1000 and 1010 respectively and each occupies 2 bytes then the array has been stored in what order?

4 26313

What is the output of following program ? int main() { int x = 5; printf("%d %d %d\n", x, x << 2, x >> 2); }

5 22812

write a C program:There is a mobile keypad with numbers 0-9 and alphabets on it. Take input 0f 7 keys and then form a word from the alphabets present on the keys.

1 15962

main() { intx=2,y=6,z=6; x=y=z; printf(%d",x) }

5 22398

Find the second largest element in an array with minimum no of comparisons and give the minimum no of comparisons needed on an array of size N to do the same.

1241

How do you convert a decimal number to its hexa-decimal equivalent.Give a C code to do the same

1071

What is a C array and illustrate the how is it different from a list.

1 1670

What is the time and space complexities of merge sort and when is it preferred over quick sort?

1040

Write a function which takes as parameters one regular expression(only ? and * are the special characters) and a string and returns whether the string matched the regular expression.

1047

What are the differences between new and malloc in C?

1098

Post New Amazon C Interview Questions


Amazon C Interview Questions


Un-Answered Questions

Is primary key indexed by default?

767


Scenario: “In a switch two hosts are connected to port number 1 and 2 respectively; both the ports are configured with same VLAN id. When data is sent from one host to another, in switch VLAN tagging will happen or not? Why?”

1898


What is the use of radar?

1228


how can you check the level of fragmentation on a table? : Sql server administration

942


What is Automatic Reference Counting (ARC) in iOS operating system?

787


What is fxflex in angular?

803


Explain the oracle real application clusters architecture?

1


Sensitive field have been defined and customized for vendor master data. For which of the following sensitive fields will an update trigger dual control?(any 1 answer) Currency Account group IBAN VENDOR ACCOUNT NUMBER

2241


Can we use wpf in web application?

171


How do you write a subtraction formula in excel?

594


Tell us your 2 strengths and weakness. Give examples.

1089


How to provision a virtual machine in specific availability zone and compute host?

203


What are the Minimal Media Recipes for Fed-Batch Cultures of EColi ?

2427


How would you implement inheritance in python?

883


How LINQ is beneficial than Stored Procedures?

94