A ________ variable is declared outside all functions.

A) local
B) global
C) static
D) counter
E) constant


B) global

Computer Science & Information Technology

You might also like to view...

In a typical transaction, a proxy server intercepts a request from a user on the internal network and passes it along to a destination computer on the Internet. What steps are involved in this process?

What will be an ideal response?

Computer Science & Information Technology

Terminal Services client computers can log on using the ____ client.

A. Remote Access Connection (RAC) B. Remote Access Services (RAS) C. Remote Desktop Connection (RDC) D. Remote Desktop Services (RDS)

Computer Science & Information Technology

The computer process through which data are arranged according to their values is selection.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

An organization needs to keep determined intruders away from its facility. The organization should install:

a. Fencing that is six to seven feet high b. Fencing that is six to seven feet high with three strands of barbed wire c. Fencing that is six to seven feet high with three strands of razor wire d. Fencing at least eight feet high with three strands of razor wire

Computer Science & Information Technology