Solved

using pointers

Posted on 2006-11-07
3
156 Views
Last Modified: 2010-04-24
Hi Experts!

I wrote this program and wanted to ask if I did it correctly according to the following instructions:

Write a complete program to swap two integer variables using pointers. It must be a program that uses functions to do the task.

#include <iostream>
using namespace std;

void swap(int *i, int *j)
{
    int t;

    t=*i;
    *i=*j;
    *j=t;
}

int main()
{
    int a,b;

    a=5;
    b=10;
    cout << a <<" " << b << endl;
    swap(&a,&b);
    cout << a <<" " << b << endl;
      system ("pause");
      return 0;

}
0
Comment
Question by:manz2
  • 2
3 Comments
 
LVL 45

Accepted Solution

by:
sunnycoder earned 500 total points
ID: 17895511
It is correct indeed
0
 

Author Comment

by:manz2
ID: 17895533
Hey sunnycoder, nice seeing you again and glad I did it right.
0
 
LVL 45

Expert Comment

by:sunnycoder
ID: 17895537
:) .. thanks
0

Featured Post

ScreenConnect 6.0 Free Trial

Check out the updates in one game-changing release, ScreenConnect 6.0, based on partner feedback. New features include a redesigned UI that improves session organization and overall user experience. See the enhancements for yourself!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
__FILE__ 6 177
How to 4 51
bullzip printer only saves PDF in black and white. 5 90
Map drive is not recognized by my application in windows 8, 8.1 and windows 10 15 92
The following diagram presents a diamond class hierarchy: As depicted, diamond inheritance denotes when two classes (e.g., CDerived1 and CDerived2), separately extending a common base class (e.g., CBase), are sub classed simultaneously by a fourt…
In Easy String Encryption Using CryptoAPI in C++ (http://www.experts-exchange.com/viewArticle.jsp?aid=1193) I described how to encrypt text and recommended that the encrypted text be stored as a series of hexadecimal digits -- because cyphertext may…
This Micro Tutorial demonstrates using Microsoft Excel pivot tables, how to reverse engineer competitors' marketing strategies through backlinks.
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

773 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question