The ____ function is used to interchange the contents of two string variables.

A. iterator
B. traverse
C. swap
D. change


Answer: C

Computer Science & Information Technology

You might also like to view...

Explain why consistency is a threat to the operation of networks.

What will be an ideal response?

Computer Science & Information Technology

Vulnerability ________ is an important tool for information security management as it identifies all the security weaknesses before an attacker can exploit them.

A. assessment B. scoring C. reporting D. research

Computer Science & Information Technology

When we insert data into a queue with data already in it, the only pointer that needs to be updated is the rear pointer, which is set to point to the new node.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Match the following special keys with their action

I. Esc II. NumLock III. Ctrl IV. Shift V. CapsLock A. Cancel B. Turns capitalization on/off C. Modifies the behavior of a key press D. Activates uppercase or alternate-key assignment E. Turns numbers on/off

Computer Science & Information Technology