1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
katrin [286]
3 years ago
14

A function may return a pointer, but the programmer must ensure that the pointer:

Computers and Technology
1 answer:
elena-14-01-66 [18.8K]3 years ago
4 0
Hello i am kust gere to answer the qustions nothing else
You might be interested in
What is payload?
Elina [12.6K]

Answer:

a block of data inside the paket

4 0
3 years ago
Which organization provides a free, online html5 validator application to ensure that a webpage's html tags follow the rules for
SashulF [63]

The organization provides a free, online html5 validator application to ensure that a webpage's html tags follow the rules for html5 is the W3C.

<h3>What does the W3C do?</h3>

The W3C's is known to help to create protocols and rules that makes sure that long-term  development of the Web.

Therefore, we can say that The organization provides a free, online html5 validator application to ensure that a webpage's html tags follow the rules for html5 is the W3C.

Learn more about The W3C  from

brainly.com/question/11179793

#SPJ1

3 0
2 years ago
You have implemented a network where each device provides shared files with all other devices, what kind of network is it?
Reil [10]

It is a Peer-to-peer type of network when you have implemented a network where each device provides shared files with all other devices.

So the answer is Peer-to-peer.

8 0
3 years ago
Jnhj hjibfnufnbfjbnkfv fj v
kirill [66]

Answer: baller.

Explanation:

6 0
2 years ago
The best defense against injection attacks is to
Sergeeva-Olga [200]
The best defense against injection attacks is to develop secure habits and adopt policies and procedures that minimize vulnerabilities. Staying aware of the types of attacks you're vulnerable to because of your programming languages, operating systems and database management systems is critical.
5 0
2 years ago
Other questions:
  • In a relational database model, a(n) _____ operation pares down a table by eliminating columns according to certain criteria. in
    8·1 answer
  • Which group on the sparkline tools design tab would you choose if you wanted to change the data source of the sparkline? (1 poin
    10·1 answer
  • How can I code this in Python with only if-statements? (Only allowed to use the built-in functions int(), float(), and str().)
    8·1 answer
  • Interactive television with video-on-demand capabilities changes how people watch television and how consumers access the Intern
    8·1 answer
  • Write the definition of a class WeatherForecast that provides the following behavior (methods): A method called set_skies that h
    13·1 answer
  • What is the purpose of a mutator?
    8·1 answer
  • Describe a situation in which a robot may have to avoid an obstacle without coming to a complete stop before turning.
    10·2 answers
  • please help me to do this computer homework I beg you all please help me to get the answers please its important please ​
    12·1 answer
  • Data elements in a relational database are organized into ____
    15·1 answer
  • all of the following are new technology-related trends in mis except: group of answer choices the mobile digital platform. iot.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!