Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Write a program to check whether a given word is a palindrome or not?
# include
void main()
{
char word[10];
int length=0,mid,count=0;
clrscr();
printf("\tEnter the Word :\> ");
gets(word); printf("\n\n\n"); while(word[count]!='\0')
length++;
count++;
}
mid = length/2;
for(count=0;count<=mid;count++)
if (word[count]!=word[(length-1)-count])
printf("\t\n\nGiven String is Not a Palindrome");
getch();
exit();
printf("\t\n\nGiven String is a Palindrome");
Design a easy (text-based/ graphical) UI for your program. The user should be encouraged for parameter values for the particular protocol simulation. For example, the user sho
write a program to find the area under the curve y=f(x) between x=a and y=b integrate y=f(x) between the limits of a and b. the area under a curve between two points can be found b
What is an "on input filed" statements? ON INPUT The ABAP/4 module is known as only if a field having the Value other than the initial Value. This initial Value is explain
What are Language Processor Development Tools (LPDTs)? LPDT that is Language processor development tools focuses upon generation of the analysis phase of language processors. T
This method is used to make sure that Swing components are updated by the event-dispatching thread.
Q. State any three properties of the neutrons. (i) A Neutrons are the constituent particles of all nuclei except hydrogen. (ii) As they are neutral particles they aren't de
Q. Define Point-to-point Communication? The simplest form of message is a point to point communication. A message is sent from the transmitting processor to a receiving process
Explain various steps for analysing an algorithm. The several steps involved in analysis of an algorithm are: 1. For any algorithm, the first step should be to show that it
Windows Authentication This provider utilizes the authentication capabilities of IIS. After IIS completes its authentication, ASP.NET uses the authenticated identity's token to
Q. Show example of COPY command? This COPY command copies the REPORT file from the drive C to the disk in drive A. after copying the file in drive A, it will name the new file
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +1-415-670-9521
Phone: +1-415-670-9521
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd