Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

what is c?

Answer Posted / ratnesh rai

c is a high level programing language

Is This Answer Correct ?    3 Yes 3 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

Why array is used in c?

1016


What is a 'null pointer assignment' error? Explain what are bus errors, memory faults, and core dumps?

1246


What is binary tree in c?

1105


what is diffrence between linear and binary search in array respect to operators?what kind of operator can be used in both seach methods?

1859


List a few unconditional control statement in c.

988


What is the difference between int main and void main?

1051


What is #ifdef ? What is its application?

1112


Explain the red-black trees?

1132


What is c value paradox explain?

1101


Explain low-order bytes.

1039


In cryptography, you could often break the algorithm if you know what was the original (plain) text that was encoded into the current ciphertext. This is called the plain text attack. In this simple problem, we illustrate the plain text attack on a simple substitution cipher encryption, where you know each letter has been substituted with a different letter from the alphabet but you don’t know what that letter is. You are given the cipherText as the input string to the function getwordSets(). You know that a plain text "AMMUNITION" occurs somewhere in this cipher text. Now, you have to find out which sets of characters corresponds to the encrypted form of the "AMMUNITION". You can assume that the encryption follows simple substitution only. [Hint: You could use the pattern in the "AMMUNITION" like MM occurring twice together to identify this]

2483


How can you find the exact size of a data type in c?

1005


What is a scope resolution operator in c?

1277


Explain the process of converting a Tree into a Binary Tree.

2669


Why is c so powerful?

1118