If we wanted to write lines 3-6 tersely using the ternary operator, they would look like this:
```
1 float p( float x, int n )
2 {
3 if ( n == 0 )
4 return 1;
5 else
6 return x p( x, n – 1 );
7 }
```
A. return ( n != 0 )? 1 : x p( x, n – 1 );
B. return ( n == 0 )? x p( x, n – 1 ) : 1;
C. return ( n == 0 )? 1 : x p( x, n – 1 );
D. return ( n != 0 )? x p( x, n – 1 );
D
You might also like to view...
Microsoft Internet Explorer and Mozilla Firefox are different types of ________
A) Exchange servers B) Web browsers C) network software D) SharePoint Designers
Which of the following best describes role-based access control?
A. The information owner decides who has access to resources. B. Access to resources is determined based on the need to know principle. C. Access to resources is decided by the system based on the concept of subjects, objects, and labels. D. Users are grouped based on a common access need, such as job function.