1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
stiks02 [169]
3 years ago
8

.When an argument is passed ______________, the called method can access and modify the caller’s original data directly.

Computers and Technology
1 answer:
wel3 years ago
6 0

Answer:

c.using keyword ref

Explanation:

In C# when we have pass any variable by reference we use the ref keyword. When we pass a variable by reference in the function the changes done in the function are directly happening on the original variables.

When a variable is  passed by value a copy of these variable is created in the function and the operation is done on those copies.No changes can be seen on the original variables.

Hence the answer is option c.

You might be interested in
Gloria is adding footers to a PowerPoint template for students to use in a literature class. Each student must choose an author
sleet_krkn [62]

Answer:

Its D

Explanation:

On edg

4 0
4 years ago
Read 2 more answers
Two ways of calculating average returns are ______ and ______. Multiple select question. the arithmetic average the progressive
joja [24]

Answer:

"Geometric Average Return Example. Jennifer has invested $5,000 into a money market that earns 10% in year one, 6% in year two, and 2% in year three. If you were to calculate this using the arithmetic mean return, you would add the rates together and divide them by three, giving you an average of 6%."

Explanation:

6 0
2 years ago
​which type of cryptography provides the most security?
Doss [256]

Answer B: Asymmetric cryptography, because the receiver has its own decryption key and cannot create encrypted messages, because he doesn't have the encryption key.

About the other answers:

A: Private keys are always involved, there has to be some secret to do encryption, so this answer doesn't say very much.

C: Digital signatures can be used to verify/prove some data comes from some person (the signer) in an unaltered way. It is not about encryption, so is not about the security of your message. You use it in combination with encryption.

D: Like A, this doesn't say very much. Shared secret keys (symmetric keys) can be used for encryption, but they are less secure since the keys have to exist in more than one place (sender and receiver).



4 0
3 years ago
Which part of the website address is its top-level domain name?
mr Goodwill [35]
The top-level domain is usually .com, .org, .net, and many more.
4 0
3 years ago
True / False<br> 1. A byte is a standardized unit of measure that is always 8-bits.
Anna11 [10]

Answer:

TRUE

Explanation:

In telecommunication and computing, there are different units of data storage. The most commonly used units are the bit and the byte.

A bit is the capacity of the system having only two states.

Whereas, the byte, also known as octet, is equal to eight bits. The unit symbol for Byte is B. In many computers, it is the smallest addressable unit of memory.

Therefore, <u>the given statement is TRUE</u>.

6 0
4 years ago
Other questions:
  • A(n) _____ of an class is where the services or behaviors of the class is defined. (Points : 6) operation
    6·1 answer
  • Excel attempts to guess which cells you want to include in the function by looking for ranges that are adjacent to the selected
    13·1 answer
  • 15. In cell D6, enter a formula to calculate the percentage of High Priority Customers Sales out of All Customers 2016 sales. (T
    11·1 answer
  • C. you have already verified the routing table entries for r1, now execute the show run | section interface command to verify vl
    11·1 answer
  • Which bus slot provides highest video performance​
    13·1 answer
  • Which broad area of data mining applications analyzes data, forming rules to distinguish between defined classes?
    13·1 answer
  • All of the following are strategies to help you prepare for standardized test except <br>​
    5·1 answer
  • Write a function square_evens(values) that takes a list of integers called values, and that modifies the list so that all of its
    9·1 answer
  • Discuss briefly general-purpose graphicsprimitives that contain 2D graphics library.
    15·1 answer
  • I really need help with this question
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!