Differentiate between string constants & character constants, Computer Engineering

Assignment Help:

Computer Concepts & C Programming

1. Write a program to read four floating point numbers and find their sum and average.

2. What is the difference between string constants and character constants and give one example each.

3. Explain the precedence of operators? How expressions are evaluated using precedences?

4. What is formatted input and formatted output? Explain.

5. Describe about the gets () and puts () functions with one example.

6. With an illustration, explain the concept of extern variable.

7. Differentiate between pointer variable and simple variable? What are the advantages of pointer variable?

8. Write the differences between Structures and Unions with one example.

9. Write a program in C to find the root of a quadratic equation.

10.Write a program to use structure within union and display the contents of structure elements.


Related Discussions:- Differentiate between string constants & character constants

Design a model for object oriented development, Design a model for object o...

Design a model for object oriented development The model for object oriented development could be shown as in Figure. It could be classified as dynamic / static and physical /

Function of host to host transport layer in tcp/ip protocol, Illustrate the...

Illustrate the function of host to host transport layer in TCP/IP protocol stack? Function of Host - to-Host Transport Layer: This protocol layer just above inter network

Explain dns, DNS is The horizontal naming system.

DNS is The horizontal naming system.

State the characteristics of object oriented modelling, Characteristics of ...

Characteristics of object oriented Modelling In object oriented modelling objects and their properties are explained. In any system, objects come into reality for playing some

What is random access memory, What is Random access memory (RAM) This i...

What is Random access memory (RAM) This is a volatile memory (i.e. contents are lost when computer is switched off). A user can write or delete data and read the contents. Befo

Hill climbing - artificial intelligence, Hill Climbing - Artificial Intelli...

Hill Climbing - Artificial Intelligence: As we've seen, in some problems, finding the search path from primary to goal state is the point of the exercise. In other problems, t

client will now send ten integers , Change this program so that every clie...

Change this program so that every client will now send ten integers and receives their sum from the server. In Java, for loops can be easily executed as follows: for (int i = 0 ; i

Explain lan topologies, Explain LAN Topologies and its basic topologies. ...

Explain LAN Topologies and its basic topologies. LAN Topologies: Network topology is a physical schematic that shows interconnection of the various users. There are four fund

i use server session pools and connection consumers, When should I use ser...

When should I use server session pools and connection consumers? Ans) WebLogic JMS executes an optional JMS facility for defining a server-managed pool of server sessions. This

What is the file-system security, What is the File-system security Most...

What is the File-system security Most commercial servers use a powerful operating system as base that provides good methods of file-system security. Some servers require additi

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd