Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
#include stdio.h>
#include conio.h>
#include ctype.h>
#include string.h>
void main()
{
int i=0,j=0,length;
char a[30];
clrscr();
for(i=0;i<30;i++)
a[i]=0;
}
i=0;
printf("ENTER THE STRING: ");
do{
a[i++]=getchar();
}while(a[i-1]!='\n');
a[i]='\0';
length=strlen(a);
for(i=0;i<=length;i++)
a[i]=tolower(a[i]);
a[0]=a[0]-32;
for(i=0;a[i]!='\0';i++)
if(a[i]==' ')
a[i+1]=a[i+1]-32;
printf("THE OUTPUT OF STRING IS %s",a);
getch();
OUTPUT :
ENTER THE STRING: KAMLESH D MENGAR
THE OUTPUT OF STRING IS Kamlesh D Mengar
Structures A structure is a user-defined data type, which may have different data types as its members. Creating a structure is a two-part process. First, a structure template
For this program you will add and test 2 new member functions to the IntSLList class posted on the website. The two member functions are: insertByPosn(int el, int pos) Assuming t
I want VLC Pitch Changing Addon Project Description: Required: Plugin to modify the pitch of running tracks in VLC without changing the speed. Skills required are C Progra
Reusability Reusability means reusing code written earlier, may be from some earlier project or from the library. Reusing old code not only saves development time, but also sa
# c pragram TO count the number of occurances of the string in nth padovan''s string program in java // aakash , suraj , prem sasi kumar kamaraj college program 1 : pa
Why PHP is sometimes called as embedded scripting language? PHP is a high level language that is used to allow users to write and understand it in human readable form and also
Objective: Construct a C program that controls the UART, and is capable of displaying strings. Echo characters received on the UART to the LCD screen Outcome: A mess
1. Jewels can only be removed for polishing from either end of the necklace (i.e. head or tail) 2. Once a jewel type is removed from the necklace, all other instances of the same j
smugglers transfer the messages from one to another by using the mobile
what is the difference between call by reference and call by pointer method?
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd