Group of characters , digits , and symbols enclosed
within quotation marks are called as strings.
String is always declared as character array.
Strings are normally used to manipulate the text such
as words and sentences.
Every string i
Swapping 2 Array elements
printf("Enter First array->");
printf("\nEnter Second array->");
printf("Arrays before swapping");
Pointers in C
The computer's memory is made up of bytes. Each byte has a
number, an address, associated with it.
The picture below represents several bytes of a computer's memory.
In the picture, addresses 924 through 940 are shown.
In C language it is po
Divide and conquer
Construct a program from smaller pieces or
These smaller pieces are called modules
Each piece is more manageable than the original
Modules in C
Benefits of functions
Divide and conquer
Ordinary variables are capable of storing one
value at a time.
But in many applications the variables must
be assigned to more than one value .
You Want Lots Of Music, Appz, Anything?, Try Dex Hunting
So what's this Dex Hunting, anyway?
See: lots of people post files of any kind on their websites to share them with friends. Those files are "protected" by not mentioning them. There's no visible li
Top Five Myths About Safe Surfing
November 19, 2003
Recently PC Magazine conducted a survey that asked participants to rate their broadband ISP services. We found out that many users don't completely understand the seriousness of potential t
Hackers and Browser Hijacking is one area of the Net that affects everyone at some stage.
In addition to having third party utilities such as SpyBot, Anti Virus scanners and firewalls installed there are some changes that can be made to Windows 2000/XP.
As you know Google.com is the most popular search engine in the world.
Here are some tips to helps you find eBooks with Google:
Find Apache's (default) Index page
Try this query:
+("index of") +("/ebooks"|"/book") +(chm|pdf|zip|rar) +apache
Find a particu
Once you have created regular user accounts, the default Administrator account vanishes from the Welcome screen, which you see when the computer starts up. Press Ctrl-Alt-Delete twice at the Welcome screen to retrieve the standard logon dialog. You can lo
open up notepad n type (or copy n paste) this:
FILE "NAME.BIN" BINARY
TRACK 01 MODE1/2352
INDEX 01 00:00:00
change the word NAME.BIN inside the quotation marks to whatever the name of your BIN file is.
when you go to 'save as'
in the 'files of type' .cli
Eliminate Ie's Autocomplete Reminder
AutoComplete: Some people like it, some don't. Those who don't like it turn it off. Those of us who turned it off are now constantly being prompted to turn it on. By now, we despise it! How do we turn it off completely
ets us say you have just download a new album or game
but all the files are .xxx and you need them to be
zip's, rar's, mp3's etc.
then do the following
-create a new folder
-put all the files needing editing in the new folder
-then goto "run" in the start
/ * M \
\ * Bell Hell Volume #2 METAL! E /
/ * KICKS! T \
\ * By: The Dutchman A C /
/ Neon*Knights -Wired L O \
\ * M /
/ * Thanx to: Baby Demon & The Metallian M \
\ * U /
/ * Call These Genocidal Systems. N \
\ * I /
Beep Code Manual, Better Than Gold Techies, American Megatrends Int. & Phoenix
(I'm IT, I use these codes to trouble shoot hardware issues at my job. Enjoy) cold.gif
BIOS Beep Codes
When a computer is first turned on, or rebooted, its BIOS performs a powe
7:30 EST-10:46Est - A File By Sk8 The SkinHead-
Well, many people have asked me "how do i use Telenet"."how do i use an outdial". Well i have decided to write a very basic file on telenet and how to get around on the netw
Structure and Union
In real life we need to have different data types.
Dissimilar data types are required to maintain
students/employees data base.
To maintain Student DB : Name and branch of study
age, average marks etc.
All these data types
Risk Assessment Checklist
Information security is a critical issue for state agencies. Increased access to government
information and services has been realized as the state increasingly moves its core
activities to the I