Browse Definitions :
Reference

C, C# and C++ Cheat Sheets

We've gathered cheat sheets for fast reference to C-related information. You'll find information about C, structured programming, object-oriented programming and more. Do you have a favorite C cheat sheet? Let us know!

Need more background information before you get started? See our definitions for C, C++, C# and VB.NET.

 

C Cheat Sheets

 C

  • C Quick Reference Sheet (PDF) -- This guide offers an introduction to the C programming language.
  • C Reference Card - ANSI (PDF) -- This fast reference card includes functions, data types, pointers, arrays and standard libraries, among other essential knowledge.

 C# and VB.NET

  • Core C# and .NET Quick Reference (PDF) -- This two-page guide lists the basics for C and .NET programming.
  • C# and VB.NET Comparison (PDF) -- This cheat sheets lists the most important syntactical differences between C# and Visual Basic .NET.
  • Casting in VB.NET and C# -- This reference lists operations related to casting and type in C# and VB.NET.
  • String Formatting in C# -- This quick reference to .NET string formatting using the String.Format() function also includes a FAQ.

 C++

  • C++ Containers -- This cheat sheet covers information related to containers in C++.
  • C++ Language Summary -- This introductory reference covers the basic concepts in C++ programming.
  • STL Quick Reference Card (PDF) -- This eight-page guide takes you from notations through to functions and iterators.

We've got lots more!

Check out the full collection of Our Favorite Cheat Sheets for fast help on a wide range of subjects. You'll find cheat sheets for other programming languages, blogging, browser shortcuts, and search engine optimization as well as a wide variety of other subjects.

For more in-depth information, see our our collection of learning guides. Then test your knowledge with all our quizzes.

This was last updated in June 2010
SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • hardware security module (HSM)

    A hardware security module (HSM) is a physical device that provides extra security for sensitive data.

  • buffer overflow

    A buffer overflow occurs when a program or process attempts to write more data to a fixed-length block of memory, or buffer, than...

  • biometric verification

    Biometric verification is any means by which a person can be uniquely identified by evaluating one or more distinguishing ...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

SearchStorage
  • What is RAID 6?

    RAID 6, also known as double-parity RAID, uses two parity stripes on each disk. It allows for two disk failures within the RAID ...

  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.

  • VRAM (video RAM)

    VRAM (video RAM) refers to any type of random access memory (RAM) specifically used to store image data for a computer display.

Close