When a structure must be passed to a function, we can use pointers to constant data to get the performance of a call by __________ and the protection of a call by __________.
a) value, value
b) value, reference
c) reference, value
d) reference, reference
c) reference, value
You might also like to view...
Network layer protocol functionality on hosts is mostly deployed as software in the form of which of the following?
A. ASICs B. NICs C. firmware D. drivers
Sequences never include ____.
A. terminations B. tasks C. decisions D. steps
In a three-tier architecture, the ____ tier ensures that valid data is entered into the program.
A. business B. persistence C. presentation D. validation
________ tools gather information from sources such as e-mails, text messages, and tweets and make the information instantly and publicly available for use in emergencies.
A. Social networking B. Crowdsourcing C. Crisis-mapping D. Affective computing