Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
QUESTION
(a) Write a program to swap two names between two variables for examples:
N1 = "Mary Anne"
N2 = "Queen Mary".
The program should make use of an appropriate Function (for e.g. SwapFunc() ) and pointers to do this.
Your program should have three blocks namely the function declaration , the main and finally the function definition.
The Function SwapFunc() should be called from main.
The program should display the names in each variable before and after calling the function SwapFunc() in main.
(b) Write a piece of code (C or C++) to declare a pointer that is pointing to an array of characters named mychar for e.g.
mychar may contain the following five characters z, y, x, w, v
Your program should include codes to declare the array and the pointer to the array. It should also include codes to display the address of the first element in the array using pointers.
Using a loop for the pointers the subsequent codes should display the addresses of the four remaining characters.
Define Levels of Abstraction in a DBMS, explain briefly, Conceptual Schema, Physical Schema, External Schema
Department (DeptNo, DeptName, Office, Phone) Employee (EmpNo, FirstName, LastName, JobTitle, HireDate, Salary, MgrNo, Deptno) Customer (CustNo, CompanyName, Street, City, State, Zi
Types of Printers 1. Impact printers The impact printers produce the image through a mechanism of striking on the stationary. 2. Line Printer This type of printer
A car battery is of 12 V. Eight dry cells of 1.5 V each connected in series can give 12 V. But such cells are not used in starting a car. Why?
In a certain word game a player can buy vowels and consonants. The first vowel is free; each additional vowel cost $1. The first two consonants are free; each additional constant c
QUESTION (a) Can SSL be used to encrypt email data? Justify your answer (b) What are the three basic security provided by SSL? (c) State the port number used by applicati
code in c program
Perverse software: Perverse software is a program which causes hindrances in other programs execution in such a way resulting in modification or complete destruction of data w
fully detailed of cpu modes of operation
While pipelining can cruelly cut the time taken to execute a program, there are troubles that cause it to not work as well as it possibly shall. The three stages of the instruction
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd