Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
void main()
{
char n[100],n1[100];
int i,j;
clrscr();
printf("ENTER THE FIRST STRING: ");
scanf("%s",n);
printf("ENTER THE SECOND STRING: ");
scanf("%s",n1);
for(i=0,j=0;n[i]!='\0';i++)
if(n[i]!=n1[i])
j=1;
}
if(j==0)
printf("THE TWO STRING ARE EQUAL");
else
printf("THE TWO STRING ARE NOT EQUAL");
getch();
OUTPUT :
ENTER THE 1 STRING: KAMLESH
ENTER THE 2 STRING: KAMLESH
THE TWO STRING ARE EQUAL
Define the Bitwise Operators in c language? C has distinction of supporting special operators that known as bit wise operators for manipulation of data at bit level. These oper
Additional keywords in C++ Class friend virtual inline private public protected const this new delete operator The actual use and expl
Logical Operators We say any expression that evaluates to zero is a FALSE logic condition and that evaluating to non-zero value is a TRUE condition. Logical operators are usefu
What is the use of PEAR in php? PEAR is termed as PHP Extension and Application Repository. It provides structured library to PHP users and also gives provision for package mai
create algorithm for doubly link list using c data structure
Write a program that reads a line of characters from the user and displays that entire line after converting any uppercase characters to lowercase also change any lowercase charact
Question 1 Consider you have to find out average marks of 100 students in a class. Write simple program(s) using different iteration statements to accomplish it Question 2 Expla
You must write a program that can both decrypt and encrypt a single word that is entered by the user. The initial choice of encryption and decryption is left up to the user. Addi
Project Description: We refurbish older computer and send them back into the market with windows 7 operating system. We are presently using windows deployment services through P
Imagine that the server program is a setuid program owned by the root, then after you penetrate the program with a shell running, you become the ROOT and you can remove the whole f
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +1-415-670-9521
Phone: +1-415-670-9521
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd