1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
enyata [817]
3 years ago
9

When you make a pointer variable im C++, is star label a must?

Computers and Technology
1 answer:
netineya [11]3 years ago
3 0
I'm not really working with C++ but variables I do know a lot about variables in that programming languages. I wouldn't say a star label is a must for pointer variables but it is strongly recommend that you use star labels.
You might be interested in
Direct solar power is when:
creativ13 [48]
The answer is c the sun is used to directly do a job 
4 0
3 years ago
Fryshta is using the Help window in PowerPoint to learn about inserting Smart Shapes into a presentation. She currently has a He
Rainbow [258]

Answer: Pin

Explanation:

Pin button is the button that is used for sticking or saving the ideas from the windows or web on that very place.This feature helps in reviewing or getting the idea back later anytime from the window as per users need. User use this button for saving any food recipe, steps of any process, guidelines etc.

  • According to the question, Fryshta can use pin button from the help window for sticking or pinning the steps of inserting shapes in her presentation.She can have a look at the steps whenever she want.
8 0
3 years ago
Give four examples of devices which are both<br>Input and Output to a Computer.​
myrzilka [38]

Answer:

HDMI ,I only have one answer to this question

4 0
3 years ago
Which of the following scan only works if operating system’s TCP/IP implementation is based on RFC 793?
Shkiper50 [21]

Answer:NULL Scan

Explanation:RFC 793(Request for comments) is a type of RFC command labeled with the number 793 which can operate with the TCP protocol.They are sort of document form which is from IETF( Internet Engineering Task Force ).

The null scan is scanning protocol used by legal as well as illegal hackers for working in the transfer control protocol architecture. It is used for the identification of the the ports and holes in TCP servers.they can also have the negative impact if used by the illegal hackers.

5 0
2 years ago
List 3 characteristics of the ideal encryption scheme
JulsSmile [24]
Three characteristics of an ideal encrytion scheme are:
1. The encryption sheme should be strong: the algorithm is imprevious to direct attack and attempts are derived.
2. The encryption scheme should create unique ciphertext from the same plaintext for each key permutation, among other traits.
3. It should take at least millions of years to break ideal encryption scheme, based on mathematical predictions.
6 0
3 years ago
Read 2 more answers
Other questions:
  • There are a variety of common user interfaces. How would you decide which interface to use and on what should this decision be b
    11·1 answer
  • ________ is the application of statistical techniques to find patterns and relationships among data for classification and predi
    14·1 answer
  • Which of the following would be a tradeoff of a scientific advancement that enables us to catch fish from the ocean faster than
    5·1 answer
  • Rebooting the computer is a good troubleshooting technique.<br><br> True<br> False
    6·2 answers
  • List of steps to apply bold and italic formatting to a word​
    9·2 answers
  • You have answered 4 of 18 questions.
    12·2 answers
  • What is an advantage of a computer network ? networked
    13·2 answers
  • Why did the i have a dream speech happen
    8·1 answer
  • Three primary types of data that a forensic investigator must collect, in this order: 1.Volatile data 2.Temporary data 3.Persist
    11·1 answer
  • Why does the position of drawCircle(x, y, r) in the answer choices matter?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!