How can I find the modification date of a file?
No Answer is Posted For this Question
Be the First to Post Answer
what about "char *(*(*a[])())();"
In cryptography, you could often break the algorithm if you know what was the original (plain) text that was encoded into the current ciphertext. This is called the plain text attack. In this simple problem, we illustrate the plain text attack on a simple substitution cipher encryption, where you know each letter has been substituted with a different letter from the alphabet but you don’t know what that letter is. You are given the cipherText as the input string to the function getwordSets(). You know that a plain text "AMMUNITION" occurs somewhere in this cipher text. Now, you have to find out which sets of characters corresponds to the encrypted form of the "AMMUNITION". You can assume that the encryption follows simple substitution only. [Hint: You could use the pattern in the "AMMUNITION" like MM occurring twice together to identify this]
which will return integer? a) int*s ( ) b) ( int* ) s( ) c) int ( *s ) ( )
Why c++ is called c++ and not c+?
Tell us the difference between these two : #include"stdio.h" #include<stdio.h> define in detial.
What is a volatile keyword in c?
Is there any restriction in how many arguments printf or scanf function can take? in which file in my c++ compiler i can see the code for implementation of these two functions??
Why is not a pointer null after calling free? How unsafe is it to use (assign, compare) a pointer value after it is been freed?
write a C program: To search a file any word which starts with ?a?. If the word following this ?a? starts with a vowel.Then replace this ?a? with ?a? with ?an?. redirect with the output onto an output file.The source file and destination file are specified by the user int the command line.
What is property type c?
What should malloc(0) do? Return a null pointer or a pointer to 0 bytes?
Can anyone tell what is stack overflow? what precaution we should take?