Which of the following statements correctly returns the memory from the dynamic array pointer to by p1 to the freestore?

a. delete [] p1;
b. delete p1[];
c. delete *p1;
d. delete p1;


a. delete [] p1;

Computer Science & Information Technology

You might also like to view...

Transport Layer Security (TLS) and ________ are two protocols that provide data integrity and security for Internet transmission

Fill in the blank(s) with correct word

Computer Science & Information Technology

If no media type is defined in a style sheet, the styles appear to all media types for which they are applicable.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Symmetric key algorithms require a secure initial exchange of one or more secret keys

Indicate whether the statement is true or false

Computer Science & Information Technology

All dual core or higher processors and all motherboards sold today support what technology capable of enhancing the processor support for virtual machines?

A. 128-bit processing B. hardware-assisted virtualization C. enhanced multimedia instruction set D. execute disable bit

Computer Science & Information Technology