To follow the principle of least privilege, the selectionSort function should receive the array to be sorted as:
a. A nonconstant pointer to nonconstant data.
b. A nonconstant pointer to constant data.
c. A constant pointer to nonconstant data.
d. A constant pointer to constant data.
c. A constant pointer to nonconstant data.
Computer Science & Information Technology
You might also like to view...
An administrator notices an unused cable behind a cabinet that is terminated with a DB-9 connector. Which of the following protocols was MOST likely used on this cable?
A. RS-232 B. 802.3 C. ATM D. Token ring
Computer Science & Information Technology
Which of the following protocols is the MOST susceptible to a packet sniffer?
A. SFTP B. SSH C. HTTPS D. SNMPv2
Computer Science & Information Technology