Answer Posted / achal
C is a general purpose programming language. It is a middle
level language, mostly used to program hardware devices. It
is used in procedural programming; not object oriented. One
important thing is that it is capable of manipulating
individual bits of data; small language ; small standard
library; compact executable code. There are many other
things what make C suitable for HW programming
| Is This Answer Correct ? | 4 Yes | 2 No |
Post New Answer View All Answers
What is the function of this pointer?
Is main is a keyword in c?
what is the c source code for the below output? 10 10 10 10 10 10 10 10 10 10 9 9 7 6 6 6 6 6 6 9 7 5 9 7 3 2 2 5 9 7 3 1 5 9 7 3 5 9 7 4 4 4 4 5 9 7 8 8 8 8 8 8 8 8 9
In a switch statement, what will happen if a break statement is omitted?
What is the best style for code layout in c?
How will you write a code for accessing the length of an array without assigning it to another variable?
Differentiate between new and malloc(), delete and free() ?
Explain low-order bytes.
What is #include cctype?
how can i write a program that prints out a box such that whenever i press any key8(coordinate number) on the keyboard, the box moves.
where are auto variables stored? What are the characteristics of an auto variable?
Why enum is used in c?
What does sizeof return c?
what is uses of .net
In cryptography, you could often break the algorithm if you know what was the original (plain) text that was encoded into the current ciphertext. This is called the plain text attack. In this simple problem, we illustrate the plain text attack on a simple substitution cipher encryption, where you know each letter has been substituted with a different letter from the alphabet but you don’t know what that letter is. You are given the cipherText as the input string to the function getwordSets(). You know that a plain text "AMMUNITION" occurs somewhere in this cipher text. Now, you have to find out which sets of characters corresponds to the encrypted form of the "AMMUNITION". You can assume that the encryption follows simple substitution only. [Hint: You could use the pattern in the "AMMUNITION" like MM occurring twice together to identify this]