When you swap variables, you need to use a(n) ____________________ variable.

Fill in the blank(s) with the appropriate word(s).

temp

Computer Science & Information Technology

You might also like to view...

The self-replicating virus that does not need a host to travel is a ________

A) script scam B) worm C) bot D) zombie

Computer Science & Information Technology

In the classic __________ overflow, the attacker overwrites a buffer located in the local variable area of a stack frame and then overwrites the saved frame pointer and return address.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology