The algorithms provided by the STL are implemented as __________ and perform various operations on elements of containers.

a. virtual functions
b. function templates
c. global variables
d. private data members
e. None of these


b. function templates

Computer Science & Information Technology

You might also like to view...

A sender's private key is used to acknowledge a document, and that key, along with the contents of the document, generates a unique _____.

A. ?data report B. ?business report C. ?digital signature D. ?digital quotient

Computer Science & Information Technology

By default automatic updates of links are ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

Named after two protocols, _________________ is really several subprotocols, designed to work together.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

To make a margin change that is not on the list, choose Custom Margin Style

Indicate whether the statement is true or false

Computer Science & Information Technology