When a structure must be passed to a function, we can use pointers to constant data to get the performance of a call by __________ and the protection of a call by __________.

a) value, value
b) value, reference
c) reference, value
d) reference, reference

c) reference, value

Computer Science & Information Technology

You might also like to view...

Two types of hyperlinks, to a(n) ________ or an e-mail address, link the audience to these Internet resources

Fill in the blank(s) with correct word

Computer Science & Information Technology

Dialog boxes look similar to windows, and also contain the window control buttons that allow them to be resized.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology