The first line will contain a message prompt to input the integer.
The second line contains "Positive" if the integer is positive, or "Negative" if it isn't.
Enter·n:·-12
Negative
write program to construct binary search tree from given in-order and post-order sequence of leaves . also delete a node from it
Given an array A of N integers and two integers X and Y, find the number of integers in the array that are both less than or equal to X and divisible by Y.
create a doubly linked list in c , in which each node stores a string . on inserting a node , node previous to it , current node and next node should be printed . also write a function to delete a specified node . write a function to return node which is n steps forward and n steps backward to current node .
Pass your marks of CA-1, CA-2, and CA-3, of course, INT102 to the function with header high
(float, float, float). Write a function that should return the highest CA mark
. An organization wants to transmit data securely over telephone, but they are
concerned that their phone may be tapped. All the data are transmitted as five
digit integers (numbers). The organization wants to encrypt (hide the actual five
digit number by encoding) the actual five digit number so that it can be
transmitted more securely. The encryption or encoding method is as follows.
Each digit in the number will be replaced by adding 7 and modulo 10.
Program must contain function to_encode(int) which takes (as input) a series of
five digit numbers and produce the encrypted or encoded numbers.
When will the ‘while’ loop be preferred over the for loop? Mention the scenario and write the
programme to demonstrate this.
You have to write a menu-driven programme to create a bill for the item(s) selected by the user.
Keep asking the user for selecting available items with their price list until the user inputs ‘N’ for No.
Do this with the help of while loop and switch statement. Finally, you have to display the bill amount
of all those selected items.
construct a binary search tree by taking inorder and postorder from user and also a function for deleting a node .
The challenge response protocol generates unique substring key to a user. The authenticated users can share their files in social networks and the unique key are partially generated key uses all combination of random substrings from a user’s given answer to a secrete question. Design a C program to find all substring of a string using dynamic memory allocation