1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
stiv31 [10]
1 year ago
9

what happens to a local variable when a function call completes (and control returns to the calling statement)

Computers and Technology
1 answer:
Liono4ka [1.6K]1 year ago
7 0

When a function call completes (and control returns to the calling statement) the local variable is undefined.

After the function call is finished, the local variable can be utilized outside of the function at any time. Until the function is called again, a local variable holds onto its value.

While local variables are those that are defined inside a function and have a scope that is specific to that function only, global variables are those that are defined outside of function having global scope.

Local variables are exclusive to a given function and are produced within that function. It cannot be accessed elsewhere other than the function.

Since there are no local variables, the value from the global variables will be used; however, you must ensure that the names of the local and global variables match.

If a variable is modified or created inside of a function but isn't declared a global variable, it is considered local variable.

To learn more about local variable click here:

brainly.com/question/27840441

#SPJ4

You might be interested in
The use of IDPS sensors and analysis systems can be quite complex. One very common approach is to use an open source software pr
lawyer [7]

Answer:

IDP sensors can be complicated.An open-source software program called snort program.

Explanation:

Snort is an open-source network intrusion detection system (IDS) and prevention system. It is created in 1998 by Martin. Snort's open source network-based can perform analysis and packet logging on an Internet Protocol network.

The snort program can be used to detect probes or attacks. Snort configured three modes

sniffer

pocket logger

network intrusion detection.

6 0
3 years ago
Read 2 more answers
The viewer of an OLAP report can change its format. Which term implies this capability?
amm1812

Answer:

The answer is "Option D".

Explanation:

OLAP reports stands for Online Analytical Processing reports, These reports provide a platform that behind many application use in Business Intelligence. and other options are incorrect that can be described as follows:

  • In option A, It is used to store the data into the OLAP report, that's why it is not correct.
  • In option B, It is software that is used for analytics data, that's why it is not correct.
  • In option C, It is used for finding index values in the 2D array that's why it is not correct.
3 0
3 years ago
Read 2 more answers
To select more than one sketched entity, you need to press and hold down the ________ key on the keyboard while selecting the en
almond37 [142]

Answer:

The answer to this question is Control(ctrl).

Explanation:

We use control(ctrl) key when we need to select multiple entities.

So when we want to select more than one sketched entity we need to press and hold the control key on the keyboard when we are selecting the items.

Hence we conclude that the answer to this question is Control(ctrl).

6 0
3 years ago
Write the SQL commands to obtain the following information from the system catalog:
netineya [11]

The SQL commands to obtain the information from the system catalog is illustrated below.

<h3>How to illustrate the the SQL commands?</h3>

It should be noted that SQL commands are instructions to communicate with a database to perform a task.

List every table that you created. - SHOW TABLES

List every field in the Client table and its associated data type. - SHOW COLUMNS FROM CUSTOMER

List every table that contains a field named TaskID. - SELECT TBNAME FROM SYSCOLUMNS WHERE COLNAME = 'TaskID'

Learn more about SQL on:

brainly.com/question/25694408

#SPJ1

3 0
2 years ago
which software application offers a variety of templates for creating reports, flyers and newsletters that you can access within
sp2606 [1]
Presentation Softwares
4 0
3 years ago
Other questions:
  • When computers connect to one another to share information, but are not dependent on each other to work, they are connected thro
    7·1 answer
  • . Given an initially empty stack s that accepts integers, the following operations are performed: s.push (10) s.push (20) s.push
    13·1 answer
  • What is netbeans and what is it for??
    9·1 answer
  • Which party controlled the White House and politics in the late 1800s, except for Grover
    6·2 answers
  • In your opinion is it more beneficial to have many folders or is it better to nest subfolders
    12·1 answer
  • What are the most commonly found items in the trash according to the Municipal Solid Waste report?
    12·2 answers
  • What time is spellrd the same forwards and backwards​
    11·1 answer
  • நெறி என்னும் சொல்லின் பொருள்___ *​
    14·1 answer
  • Most spyware programs are benign in that they do not perform malicious acts or steal data. group of answer choices true false
    15·1 answer
  • Active directory and 389 directory server are both compatible with which directory access protocol?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!