Call-by-reference can achieve the security of call-by-value when:

a. The value being passed is small.
b. A large argument is passed in order to improve performance.
c. A pointer to the argument is used.
d. The const qualifier is used.


d. The const qualifier is used.

Computer Science & Information Technology

You might also like to view...

List and briefly describe at least six different ActionScript 3.0 programming concepts.

What will be an ideal response?

Computer Science & Information Technology

In Reading view, the status bar includes navigation buttons to move to the next or previous slide in a presentation

Indicate whether the statement is true or false

Computer Science & Information Technology

What three items must a network have to share and access resources?

What will be an ideal response?

Computer Science & Information Technology

Today's mobile phones and some PCs use a touch user interface called a _____ to allow people to control the personal computer.

A. multiprocessing user interface B. command-based user interface C. speech recognition user interface D. natural user interface

Computer Science & Information Technology