Browse Definitions :
Reference

C, C# and C++ Cheat Sheets

We've gathered cheat sheets for fast reference to C-related information. You'll find information about C, structured programming, object-oriented programming and more. Do you have a favorite C cheat sheet? Let us know!

Need more background information before you get started? See our definitions for C, C++, C# and VB.NET.

 

C Cheat Sheets

 C

 C# and VB.NET

 C++

We've got lots more!

Check out the full collection of Our Favorite Cheat Sheets for fast help on a wide range of subjects. You'll find cheat sheets for other programming languages, blogging, browser shortcuts, and search engine optimization as well as a wide variety of other subjects.

For more in-depth information, see our our collection of learning guides. Then test your knowledge with all our quizzes.

This was last updated in June 2010

Join the conversation

1 comment

Send me notifications when other members comment.

Please create a username to comment.

Do you have permission to post links of other's people links and include paid advertising? I don't like seeing my work here used this way. Please correct this or I will report it to Google digital rights violation. Thank you.
Cancel

-ADS BY GOOGLE

File Extensions and File Formats

SearchCompliance

  • regulatory compliance

    Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business...

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

  • smart contract

    A smart contract, also known as a cryptocontract, is a computer program that directly controls the transfer of digital currencies...

SearchSecurity

  • RSA algorithm (Rivest-Shamir-Adleman)

    The RSA algorithm is the basis of a cryptosystem -- a suite of cryptographic algorithms that are used for specific security ...

  • remote access

    Remote access is the ability to access a computer or a network remotely through a network connection.

  • IP Spoofing

    IP spoofing is the crafting of Internet Protocol (IP) packets with a source IP address that has been modified to impersonate ...

SearchHealthIT

SearchDisasterRecovery

  • virtual disaster recovery

    Virtual disaster recovery is a type of DR that typically involves replication and allows a user to fail over to virtualized ...

  • tabletop exercise (TTX)

    A tabletop exercise (TTX) is a disaster preparedness activity that takes participants through the process of dealing with a ...

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a data center.

SearchStorage

  • disk array

    A disk array, also called a storage array, is a data storage system used for block-based storage, file-based storage or object ...

  • enterprise storage

    Enterprise storage is a centralized repository for business information that provides common data management, protection and data...

  • optical storage

    Optical storage is any storage type in which data is written and read with a laser. Typically, data is written to optical media, ...

Close