1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
AfilCa [17]
3 years ago
7

Consider the function definition void Demo( int& intVal, float floatVal ) { intVal = intVal * 2; floatVal = float(intVal) +

3.5; } Suppose that the caller has variables myInt and myFloat whose values are 20 and 4.8, respectively. What are the values of myInt and myFloat after return from the following function call? Demo(myInt, myFloat);
Computers and Technology
1 answer:
Fynjy0 [20]3 years ago
5 0

Answer:

myInt=40

myFloat=4.8

Explanation:

First look at the function definition .It has two arguments intVal is passed by reference while floatVal is passed by value.So the changes done on the myInt variable will be reflected on the original argument because when a variable is passed by reference the the changes are reflected on the original argument but when a variable is passed by value the function created a duplicate copy of it and work on them so changes are not reflected on the original argument.So myInt will get doubled while myFloat will remain the same.

You might be interested in
1. You are given a database to create, however, you realize that in the instructions you are told to create relationships betwee
Alik [6]

Answer:

In your table create statement, you can reference a primary key of another table. This is called a foreign key.

The syntax varies per database type.

6 0
3 years ago
The following is an example of what kind of loop?
My name is Ann [436]
Step by step equation
5 0
3 years ago
Read 2 more answers
A(n) _____ is a type of man-in-the-middle attack where an attacker captures the data that is being transmitted, records it, and
professor190 [17]

Answer:

wireless replay attack

Explanation:

Based on the scenario being described within the question it can be said that the type of attack that is being described is known as a wireless replay attack. Like mentioned in the question this is a network attack where an individual hijacks data in the middle of it being sent in order to copy it before the data reaches the intended recipient. This information can then be used for whatever the attacker intends.

6 0
3 years ago
Read 2 more answers
A computer is defined by 4 specific criteri. Select all 4.*
VikaD [51]

Answer:

Explanation:

Receive input, produce output, store information, process information

8 0
3 years ago
The ________ contains the central electronic components of the computer. select one:
Sati [7]
The motherboard contains the central electronic components of the computer.
6 0
3 years ago
Other questions:
  • What must be done if the intended destination hardware is not supported by the chosen OS?
    6·1 answer
  • Match the items.
    15·1 answer
  • By default, windows does not display ____________________ in windows explorer.
    8·1 answer
  • Is it possible to learn java s. and c# at the same time? if so I need help who can assist me.
    5·1 answer
  • To what would you compare the transport layer?
    14·1 answer
  • In which of the security mechanism does the file containing data of the users/user groups have inbuilt security?
    6·1 answer
  • Sorting table rows is based on the data in the selected        A. cell range.   B. cell.   C. column.   D. row.
    12·2 answers
  • You have this code in your program.
    7·1 answer
  • How would you define the term technology
    8·1 answer
  • From which country samsung is​
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!