When is an interface "good"?
Answer / abalonesoft
When it provides a simplified view of a chunk of software,
and it is expressed in the vocabulary of a user (where a
"chunk" is normally a class or a tight group of classes, and
a "user" is another developer rather than the ultimate
customer).
The "simplified view" means unnecessary details are
intentionally hidden. This reduces the user's defect-rate.
The "vocabulary of users" means users don't need to learn a
new set of words and concepts. This reduces the user's
learning curve.
| Is This Answer Correct ? | 0 Yes | 0 No |
Write a program that takes three variables(a,b,c) in as separate parameters and rotates the values stored so that value a goes to b,b,to c and c to a
in multiple branching construct "default" case is a) optional b) compulsarily c) it is not include in this construct d) none of the above
How to write a code for random pick from 1-1000 numbers? The output should contain the 10 numbers from the range 1-1000 which should pick randomly, ie ,for each time we run the code we should get different outputs.
Explain what is the purpose of "extern" keyword in a function declaration?
what is data structure?
main() { intx=2,y=6,z=6; x=y=z; printf(%d",x) }
5 Answers Amazon, HCL, Thought Works,
A program is required to print your biographic information including: Names, gender, student Number, Cell Number, line of study and your residential address.
what are the advanced features of functions a) function declaration and prototypes b) calling functions by value or by reference c) recursion d) all the above
In cryptography, you could often break the algorithm if you know what was the original (plain) text that was encoded into the current ciphertext. This is called the plain text attack. In this simple problem, we illustrate the plain text attack on a simple substitution cipher encryption, where you know each letter has been substituted with a different letter from the alphabet but you don’t know what that letter is. You are given the cipherText as the input string to the function getwordSets(). You know that a plain text "AMMUNITION" occurs somewhere in this cipher text. Now, you have to find out which sets of characters corresponds to the encrypted form of the "AMMUNITION". You can assume that the encryption follows simple substitution only. [Hint: You could use the pattern in the "AMMUNITION" like MM occurring twice together to identify this]
How to draw the flowchart for structure programs?
write a c code "if you give a any decimal number then print that number in english alphabet"? ex: i/p: 552 o/p: five hundred fifty two ...
Write a program in C to reverse a number by recursive function?