Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...



Programming Languages Interview Questions
Questions Answers Views Company eMail

What are the compilers of JAVA and .NET Programming languages?

HCL, Microsoft,

1 4395

i got a backdoor offer in process global,Bangalore..Can i work with it?

2855

say the following declaration is correct nr not. int b=a,n=0;

Wipro,

4 5721

What will be the output of the following program #include void main() { int i=20; i-=i+++++i++; printf("%d",i); }

5 6787

what is difference between getchar,putchar functions and printf and scanf function? does putchar show output only when input given to it

DIT,

5 29089

can we swap two different string using php for example:-- before swapping:-- 1 string :-hello friend, 2 string :-my dear, after swapping that strings will be: 1.hello dear, 2.my friend.

3550

What is the difference between Boxing and Unboxing in C#

1 4840

program for reversing a selected line word by word when multiple lines are given without using strrev

IBM,

2495

What are the basic steps to store PHP session in to Database?

Rediff,

1 4486

What is the meaning of int *x[]();?

1 3582

Write a program to replace n bits from the position p of the bit representation of an inputted character x with the one's complement. Method invertBit takes 3 parameters x as input character, p as position and n as the number of positions from p. Replace n bits from pth position in 8 bit character x. Then return the characters by inverting the bits.

Infosys,

4225

In cryptography, you could often break the algorithm if you know what was the original (plain) text that was encoded into the current ciphertext. This is called the plain text attack. In this simple problem, we illustrate the plain text attack on a simple substitution cipher encryption, where you know each letter has been substituted with a different letter from the alphabet but you don’t know what that letter is. You are given the cipherText as the input string to the function getwordSets(). You know that a plain text "AMMUNITION" occurs somewhere in this cipher text. Now, you have to find out which sets of characters corresponds to the encrypted form of the "AMMUNITION". You can assume that the encryption follows simple substitution only. [Hint: You could use the pattern in the "AMMUNITION" like MM occurring twice together to identify this]

Infosys,

2493

How many ways there are to fetch the data from the Database?

Tops Technologies,

2 9041

can we make game by using c

SmartData,

1 4166

What is byval and byref? What are differences between them?

HCL, Wipro,

2233


Un-Answered Questions { Programming Languages }

Define encapsulation in python?

898


What are the difference between magento 1 & 2?

3


What does == mean?

825


What does flush do c++?

1078


What are the differences between python 2.x and python 3.x?

1039


How to create database connection and query in php?

1052


How do I revert to an older version of wordpress?

205


Which PHP compatibility is used for Drupal?

114


How can you allocate arrays or structures bigger than 64K?

1170


How is php different from other languages?

903


Explain the role of modules and mixins in ruby?

1


How can I prevent another program from modifying part of a file that I am modifying?

1071


How to send a response early in a web application action?

1759


Explain the array representation of a binary tree in C.

1240


How you can update memcached when you make changes to php?

1088