7cf078154213350dbf851e1fd377467a21f2f06e440a225c0641724a327bf754  arrays.exe
3c58fd68197a17898c22fc45077e537a14b007d21dce10affccc0f7ff8273636  environment.exe
2a481be32b79c89ccb8026e72b0897de9b7f15f62d177c0784fc166637fcbe17  if-statement.exe
a31ce34d0226b209673f972b9acd8702d5247d99a72d8a2d24b5c93ec16e9d52  loops.exe
0377a6093b59733ecdbc05eb5248209f7716378b0937940cff6ca844bcd95733  nested-if.exe
efc5a46a7310d8c01eadbb76e15e39548864cb0739d2bd94681952ce9718d0e5  pointers.exe
774a6db20fc657aaf0ec05f301a3ed65a7f1dd6598bbeabef5e3064e19d86881  pointers_malloc.exe
183d8c6591bd3e75b8b8bf4874811a8096f54352b9d65e147d5ca0a38db06c2d  simple_password.exe
b07410ab713ed7f86bbf624ecf9a1324e6248466918cee9862214da6cb18e21a  stack-intro.exe
6a1b99b6c1974ed877cd2c1134e26e96b3901c263ab69be0f497d57003467070  string_manipulation.exe
2ad6a293685f69ef6d6ee8870fa01a392add56d7f5b2e299c21839dc96814820  struct_members.exe
3de7402ffc6dd7b297a3f5749649e6c45bb412e6c7f57d22f342b20135fa4de8  structs.exe
4640e36c9bd2ba0fcf98f9f8029f1f55898866bf5706ad0bccabb2285c31e02c  switch.exe