To follow the principle of least privilege, the selectionSort function should receive the array to be sorted as:

a. A nonconstant pointer to nonconstant data.
b. A nonconstant pointer to constant data.
c. A constant pointer to nonconstant data.
d. A constant pointer to constant data.

c. A constant pointer to nonconstant data.

Computer Science & Information Technology

You might also like to view...

An administrator notices an unused cable behind a cabinet that is terminated with a DB-9 connector. Which of the following protocols was MOST likely used on this cable?

A. RS-232 B. 802.3 C. ATM D. Token ring

Computer Science & Information Technology

Which of the following protocols is the MOST susceptible to a packet sniffer?

A. SFTP B. SSH C. HTTPS D. SNMPv2

Computer Science & Information Technology