When a structure must be passed to a function, we can use pointers to constant data to get the performance of a call by __________ and the protection of a call by __________.

a) value, value
b) value, reference
c) reference, value
d) reference, reference


c) reference, value

Computer Science & Information Technology

You might also like to view...

Network layer protocol functionality on hosts is mostly deployed as software in the form of which of the following?

A. ASICs B. NICs C. firmware D. drivers

Computer Science & Information Technology

Sequences never include ____.

A. terminations B. tasks C. decisions D. steps

Computer Science & Information Technology

In a three-tier architecture, the ____ tier ensures that valid data is entered into the program.

A. business B. persistence C. presentation D. validation

Computer Science & Information Technology

________ tools gather information from sources such as e-mails, text messages, and tweets and make the information instantly and publicly available for use in emergencies.

A. Social networking B. Crowdsourcing C. Crisis-mapping D. Affective computing

Computer Science & Information Technology