With pointer variables you can __________ manipulate data stored in other variables.

a. never
b. seldom
c. indirectly
d. All of these
e. None of these


c. indirectly

Computer Science & Information Technology

You might also like to view...

A web service’s methods can be called by methods on other machines using ___________.

a) Representational State Transfer (REST) architecture b) Simple Object Access Protocol c) Both (a) and (b). d) None of the above.

Computer Science & Information Technology

A language using a text-based syntax intended to extend the power of HTML by separating data from presentation is called _______.

a. DHTML b. XML c. XHTML d. SGML

Computer Science & Information Technology

Answer the following statements true (T) or false (F)

1. The top-down approach provides the systems group with a ready-made division of users into task forces for subsystems. 2. The fewer data couples and control flags in the system, the more difficult it is to change the system. 3. On-line manuals on websites should include a FAQ page and downloadable updates. 4. When a system is tested with normal transactions, variations are added, including invalid data used to ensure that the system can properly detect errors.

Computer Science & Information Technology

The original message or data that is fed into the algorithm is __________.

A. encryption algorithm B. secret key C. decryption algorithm D. plaintext

Computer Science & Information Technology