When a structure must be passed to a function, we can use pointers to constant data to get the performance of a call by __________ and the protection of a call by __________.
a) value, value
b) value, reference
c) reference, value
d) reference, reference
c) reference, value
Computer Science & Information Technology
You might also like to view...
Two types of hyperlinks, to a(n) ________ or an e-mail address, link the audience to these Internet resources
Fill in the blank(s) with correct word
Computer Science & Information Technology
Dialog boxes look similar to windows, and also contain the window control buttons that allow them to be resized.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology