Which of the following are potential problems when we assign pointer variables:

a) inaccessible heap memory
b) dangling pointers
c) uninitialized pointers
d) NULL pointers


a) inaccessible heap memory

Computer Science & Information Technology

You might also like to view...

Give an example of an application where the second version would be preferable.

What will be an ideal response?

Computer Science & Information Technology

The aim of a ____ is to effectively ensure the coordinated implementation of all of the relevant compliance policies across the entire organization.

A. formal policy framework B. control framework C. control policy framework D. comprehensive policy framework

Computer Science & Information Technology

List the kinds of regular shape solids available in Rhino.

What will be an ideal response?

Computer Science & Information Technology

The vi commands sequence: dd G p

a: deletes the current line and saves it in the G buffer b: deletes the current line and place it after the letter G c: deletes two lines and place them in the G buffer d: move s the current line to the end of the file e: deletes the letter G

Computer Science & Information Technology