In a(n) ____ copy, two or more pointers have their own data.

A. indirect
B. direct
C. deep
D. shallow


Answer: C

Computer Science & Information Technology

You might also like to view...

In the Gallery, you can mouse over a piece of clip art to view its description and name in a(n) ________

A) ScreenTip B) separate document C) clip art field D) illustration pane

Computer Science & Information Technology

To open the feature in the accompanying figure, click Window on the Application bar, point to Buttons Archive, and then click Buttons.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Discuss the difficulties in defending against distributed attacks.

What will be an ideal response?

Computer Science & Information Technology

What type of device can be used to block unwanted traffic initiated from the Internet and can also restrict Internet access from an internal network?

A. hub B. switch C. firewall D. VPN

Computer Science & Information Technology