When an argument is passed to a method and a copy of the argument’s value has been passed to the method, this is known as _________ .
a) pass-by-call
b) pass-by-value
c) pass-by-reference
d) pass-by-method
b) pass-by-value
Computer Science & Information Technology
You might also like to view...
Which of the following can be used to ensure that sensitive records stored on a backend server can only be accessed by a front end server with the appropriate record key?
A. File encryption B. Storage encryption C. Database encryption D. Full disk encryption
Computer Science & Information Technology
A(n) _________________________ is a collection of graphically displayed choices and commands, such as those involving colors, brushes, actions, or layers.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology