When an argument is passed to a method and a copy of the argument’s value has been passed to the method, this is known as _________ .

a) pass-by-call
b) pass-by-value
c) pass-by-reference
d) pass-by-method

b) pass-by-value

Computer Science & Information Technology

You might also like to view...

Which of the following can be used to ensure that sensitive records stored on a backend server can only be accessed by a front end server with the appropriate record key?

A. File encryption B. Storage encryption C. Database encryption D. Full disk encryption

Computer Science & Information Technology

A(n) _________________________ is a collection of graphically displayed choices and commands, such as those involving colors, brushes, actions, or layers.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology