The ____ function is used to interchange the contents of two string variables.
A. iterator
B. traverse
C. swap
D. change
Answer: C
You might also like to view...
Explain why consistency is a threat to the operation of networks.
What will be an ideal response?
Vulnerability ________ is an important tool for information security management as it identifies all the security weaknesses before an attacker can exploit them.
A. assessment B. scoring C. reporting D. research
When we insert data into a queue with data already in it, the only pointer that needs to be updated is the rear pointer, which is set to point to the new node.
Answer the following statement true (T) or false (F)
Match the following special keys with their action
I. Esc II. NumLock III. Ctrl IV. Shift V. CapsLock A. Cancel B. Turns capitalization on/off C. Modifies the behavior of a key press D. Activates uppercase or alternate-key assignment E. Turns numbers on/off