Call-by-reference can achieve the security of call-by-value when:
a. The value being passed is small.
b. A large argument is passed in order to improve performance.
c. A pointer to the argument is used.
d. The const qualifier is used.
d. The const qualifier is used.
You might also like to view...
List and briefly describe at least six different ActionScript 3.0 programming concepts.
What will be an ideal response?
In Reading view, the status bar includes navigation buttons to move to the next or previous slide in a presentation
Indicate whether the statement is true or false
What three items must a network have to share and access resources?
What will be an ideal response?
Today's mobile phones and some PCs use a touch user interface called a _____ to allow people to control the personal computer.
A. multiprocessing user interface B. command-based user interface C. speech recognition user interface D. natural user interface