The algorithms provided by the STL are implemented as __________ and perform various operations on elements of containers.
a. virtual functions
b. function templates
c. global variables
d. private data members
e. None of these
b. function templates
Computer Science & Information Technology
You might also like to view...
A sender's private key is used to acknowledge a document, and that key, along with the contents of the document, generates a unique _____.
A. ?data report B. ?business report C. ?digital signature D. ?digital quotient
Computer Science & Information Technology
By default automatic updates of links are ________
Fill in the blank(s) with correct word
Computer Science & Information Technology
Named after two protocols, _________________ is really several subprotocols, designed to work together.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
To make a margin change that is not on the list, choose Custom Margin Style
Indicate whether the statement is true or false
Computer Science & Information Technology