The manipulation of addresses using pointers ____ knowledge of the actual addresses.

A. requires
B. generally does not require
C. often requires
D. never requires

Answer: B

Computer Science & Information Technology

You might also like to view...

In addition to granting and revoking access rights to a table, in a ___________ administration the owner of the table may grant and revoke authorization rights to other users, allowing them to grant and revoke access rights to the table.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

The typical values for the socket type are_______ (for stream sockets) and_______ (for datagram sockets).

a) SOCK_STREAM, SOCK_DGRAM. b) SOCK_TCP, SOCK_UDP. c) STREAM, DGRAM. d) None of the above.

Computer Science & Information Technology