A(n) ____________ works like a reference parameter, but the argument does not have to be set to a value before it is passed into the parameter.

a. parameter list
b. named argument
c. output parameter
d. named constant

c. output parameter

Computer Science & Information Technology

You might also like to view...

The role of ____ is to ensure that information resources that are needed to underwrite a particular business strategy are kept confidential, correct, and available.

A. governance B. assurance C. risk analysis D. cybersecurity

Computer Science & Information Technology

The capability of a system to fulfill its mission, in a timely manner, in the presence of attacks, failures, or accidents is known as ____.

A. attack resistance B. attack survivability C. system recovery D. system survivability

Computer Science & Information Technology