Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

write a programme that inputs a number by user and gives
its multiplication table.

Answer Posted / vignesh1988i

#include<stdio.h>
#include<conio.h>
void main()
{
int n,m;
printf("enter the table number you want :");
scanf("%d",&n);
printf("enter the steps upto which you want :");
scanf("%d",&m);
for(int i=1;i<=m;i++)
{
printf("%d * %d =%d",i,n,i*n);
}
getch();
}

Is This Answer Correct ?    3 Yes 2 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

What is derived datatype in c?

1099


Should I use symbolic names like true and false for boolean constants, or plain 1 and 0?

1071


Explain what are the different file extensions involved when programming in c?

1114


In cryptography, you could often break the algorithm if you know what was the original (plain) text that was encoded into the current ciphertext. This is called the plain text attack. In this simple problem, we illustrate the plain text attack on a simple substitution cipher encryption, where you know each letter has been substituted with a different letter from the alphabet but you don’t know what that letter is. You are given the cipherText as the input string to the function getwordSets(). You know that a plain text "AMMUNITION" occurs somewhere in this cipher text. Now, you have to find out which sets of characters corresponds to the encrypted form of the "AMMUNITION". You can assume that the encryption follows simple substitution only. [Hint: You could use the pattern in the "AMMUNITION" like MM occurring twice together to identify this]

2485


When the macros gets expanded?

1428


What do you mean by keywords in c?

1154


What is bash c?

1014


In c programming write a program that will print 10 multiples of 3 except 15,18,21 using looping

1517


Explain modulus operator.

1064


How do you construct an increment statement or decrement statement in C?

1238


How many identifiers are there in c?

1025


What is the use of define in c?

1064


GIVEN A FLOATING POINT NUMBER HOW IS IT ACTUALLY STORED IN MEMORY ? CAN ANYONE EXPLAIN?? THE 32 BIT REPRESENTATION OF A FLOATING POINT NUMBER ALLOTS: 1 BIT-SIGN 8 BITS-EXPONENT 23 BITS-MANTISSA

1880


Write a program to print factorial of given number without using recursion?

996


What is the purpose of realloc()?

1148