?
Solved

using pointers

Posted on 2006-11-07
3
Medium Priority
?
163 Views
Last Modified: 2010-04-24
Hi Experts!

I wrote this program and wanted to ask if I did it correctly according to the following instructions:

Write a complete program to swap two integer variables using pointers. It must be a program that uses functions to do the task.

#include <iostream>
using namespace std;

void swap(int *i, int *j)
{
    int t;

    t=*i;
    *i=*j;
    *j=t;
}

int main()
{
    int a,b;

    a=5;
    b=10;
    cout << a <<" " << b << endl;
    swap(&a,&b);
    cout << a <<" " << b << endl;
      system ("pause");
      return 0;

}
0
Comment
Question by:manz2
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 45

Accepted Solution

by:
sunnycoder earned 2000 total points
ID: 17895511
It is correct indeed
0
 

Author Comment

by:manz2
ID: 17895533
Hey sunnycoder, nice seeing you again and glad I did it right.
0
 
LVL 45

Expert Comment

by:sunnycoder
ID: 17895537
:) .. thanks
0

Featured Post

Free Tool: Path Explorer

An intuitive utility to help find the CSS path to UI elements on a webpage. These paths are used frequently in a variety of front-end development and QA automation tasks.

One of a set of tools we're offering as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

The following diagram presents a diamond class hierarchy: As depicted, diamond inheritance denotes when two classes (e.g., CDerived1 and CDerived2), separately extending a common base class (e.g., CBase), are sub classed simultaneously by a fourt…
In Easy String Encryption Using CryptoAPI in C++ (http://www.experts-exchange.com/viewArticle.jsp?aid=1193) I described how to encrypt text and recommended that the encrypted text be stored as a series of hexadecimal digits -- because cyphertext may…
Michael from AdRem Software explains how to view the most utilized and worst performing nodes in your network, by accessing the Top Charts view in NetCrunch network monitor (https://www.adremsoft.com/). Top Charts is a view in which you can set seve…
Do you want to know how to make a graph with Microsoft Access? First, create a query with the data for the chart. Then make a blank form and add a chart control. This video also shows how to change what data is displayed on the graph as well as form…

801 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question