Program to Convert Celsius to Fahrenheit in C Language

This article will show you the C program to convert temperature in Celsius to Fahrenheit. The Formula for conversion is: 1.8 * C + 32 Code: #include<stdio.h> void main(){ int a; float i=1; printf(“\n********************************\nprogram to convert Celsius to Fahrenheit\n***********************************\n\n”); printf(“Enter Temperature in Celsius: “); scanf(“%d”,&a); i=(1.8 * a) +32; printf(“Fahrenheit […]

Advertisements

Program to find GCD of two numbers in C language

The following program is to find the GCD or HCF of a number using C Language. GCD is the Greatest Common Divisor that divides a particular number. #include<stdio.h> void main(){ int a,b,i,j; printf(“\n****************************\nprogram to find GCD of 2 Numbers\n*****************************\n\n”); printf(“Enter two numbers: “); scanf(“%d%d”,&a,&b); printf(“Common Factors for %d and %d […]

Advertisements

OVERTHEWIRE:BANDIT WALKTHROUGH SERIES 5-12 LEVELS

This article is continuation of the over the wire bandit series. In case you haven’t read that here it is¬†OVERTHEWIRE:BANDIT WALKTHROUGH SERIES 1-5 LEVELS. So let’s start with the level 6. I logged in level 6 with the credentials I gained in level 5. > level 5-6 ssh bandit5@bandit.labs.overthewire.org -p […]

Advertisements

Diffie Hellman Key Exchange: What it is?

What is Diffie Hellman? It is an asymmetric key exchange algorithm which allows two parties to agree upon a shared secret key in such a way that no other person can eavesdrop on the communication. It uses two different keys for the exchanging purpose i.e, Public key and Private key. […]

Advertisements

Caesar Cipher Program in C

What is Caesar Cipher? Caesar Cipher is a Symmetric Cryptography model, with the term Symmetric, I mean that that key which is used for both encryption and decryption are same. This is the earliest model which is used by Julius Caesar. It involves replacement of the current character with the […]

Advertisements

How to become a Hacker?

Hacker is a person who can gain unauthorized access to¬† a device. Many people have this question in their mind, “How to become one?”. Before I give answer to this question, I would like to explain the concept of everything related to hacking. Hacking is a vast field, it consist […]

Advertisements