When you swap variables, you need to use a(n) ____________________ variable.
Fill in the blank(s) with the appropriate word(s).
temp
Computer Science & Information Technology
You might also like to view...
The self-replicating virus that does not need a host to travel is a ________
A) script scam B) worm C) bot D) zombie
Computer Science & Information Technology
In the classic __________ overflow, the attacker overwrites a buffer located in the local variable area of a stack frame and then overwrites the saved frame pointer and return address.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology