Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

O,T,T,F,F,S,S,E,N,?,?,?,T,F,F,S,S,E,N

Answer Posted / gallanticscorp

by seeing we can understand that .....N O T fit as the
correct possible

Is This Answer Correct ?    1 Yes 3 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

What is the advantage of using #define to declare a constant?

1156


Device an algorithm for weiler-atherton polygon clipping, where the clipping window can be any specified polygon

6024


why arguments can generally be passed to functions a) sending the values of the arguments b) sending the addresses of the arguments c) a & b d) none of the above

1193


Should I learn c before c++?

1298


Is that possible to add pointers to each other?

1429


What are the Advantages of using macro

1221


When should a far pointer be used?

1189


What is the general form of function in c?

1072


What is a void pointer? When is a void pointer used?

1108


In cryptography, you could often break the algorithm if you know what was the original (plain) text that was encoded into the current ciphertext. This is called the plain text attack. In this simple problem, we illustrate the plain text attack on a simple substitution cipher encryption, where you know each letter has been substituted with a different letter from the alphabet but you don’t know what that letter is. You are given the cipherText as the input string to the function getwordSets(). You know that a plain text "AMMUNITION" occurs somewhere in this cipher text. Now, you have to find out which sets of characters corresponds to the encrypted form of the "AMMUNITION". You can assume that the encryption follows simple substitution only. [Hint: You could use the pattern in the "AMMUNITION" like MM occurring twice together to identify this]

2535


Can we declare variables anywhere in c?

1056


Is it better to bitshift a value than to multiply by 2?

1145


What is size of union in c?

1081


Differentiate fundamental data types and derived data types in C.

1091


What is the use of function in c?

1251