Pointers cannot be used to:
a. Contain memory addresses.
b. Reference values directly.
c. Pass an argument by reference.
d. Manipulate dynamic data structures.
b. Reference values directly.
Computer Science & Information Technology
You might also like to view...
Which of the following is NOT true regarding second normal form?
A) The second normal form requires that the table has no fields with partial dependencies on a composite or concatenated key. B) The table satisfies 1NF. C) The table may contain a transitive dependency. D) The table could have a partial dependency.
Computer Science & Information Technology
People in your Windows Live network can share files that you save in your ________ folder
Fill in the blank(s) with correct word
Computer Science & Information Technology