1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ainat [17]
4 years ago
10

In class, we discussed static local variables in C. Answereach question below; if necessary, find and consult a reference on the

C language (cite your source in your answer).
(a) For a non-static local variable in a C function, what is its scopeand what is its lifetime?
(b) For a static local variable in a C function, what is its scope andwhat is its lifetime?
(c) For a non-static global variable in C, what is its scope and whatis its lifetime?
(d) For a static global variable in C, what is its scope and what is itslifetime?
Computers and Technology
1 answer:
alexira [117]4 years ago
6 0

Answer:

(a) scope: function, lifetime: duration of the function

(b) scope: function, lifetime: duration of the program

(c) scope: global (all modules),  lifetime: duration of the program

(d) scope: module (file), lifetime: duration of the program

You might be interested in
Can you answer this ?​
beks73 [17]

Answer:

Answer it yourself.

Explanation:

NO.

4 0
3 years ago
Read 2 more answers
Computer ForensicsThere are many differences between public-sector and private-sector computer investigations. What do you see a
elena55 [62]

Answer:

For a private computer investigation into cyber crime the private sector  should complete all its courses and must be certified by the relevant authorities and must also be an expert in the computer investigations. while

Public computer investigations has more aspects that involves non-certified personnel's

The private-sector computer investigations are used mostly on all the cyber crimes and hacking and loss of business data.while public-sector computer investigations are used on crimes like rapes, accidents and murders crimes

Explanation:

Computer forensics are used to resolve crimes like cyber crime, hacking, malfunctions and data interrupts.

Before a private computer investigations which is into cyber crime investigation can continue, the private sector  should complete all its courses and must be certified by the relevant authorities and must also be an expert in the computer investigations. while

Public computer investigations has more aspects that involves non-certified personnel's and the personnel's are not necessarily supposed to complete the courses

The private-sector computer investigations are used mostly on all the cyber crimes and hacking and loss of business data.while public-sector computer investigations are used on crimes like rapes, accidents and murders crimes

5 0
4 years ago
Which Windows Server 2016 feature allows a user to utilize a software environment in which an application can run but is isolate
zepelin [54]

Answer:

Windows containers is the correct answer.

Explanation:

Windows containers provide permission to the users to make use of a software or an application environment with that they individually execute because of the many other operating system and other applications. Windows containers is also the feature of the Windows server operating system. That's why the following answer is correct.

3 0
4 years ago
If you want to start a convo go here<br> https://padlet.com/beighbay000/x0q2v6qrm46j
Setler [38]

Answer:

ok

Explanation:

thx for tha points

..........

6 0
3 years ago
5. Bits are sent over a communications channel in packets of 12. (a) If the probability of a bit being corrupted over this chann
user100 [1]

Answer:

0.889

Explanation:

7 0
4 years ago
Other questions:
  • When you use the keyboard to scroll to a different position in the document, the ____ automatically moves when you press the des
    6·1 answer
  • Which directory in the FHS stores programs and configuration information that can only be executed and modified by the root user
    10·1 answer
  • John, the network administrator of XYZ Corporation, is interested in changing the format of text from the American Standard Code
    10·1 answer
  • When a crash results in property damages of any amount, the driver must notify:
    10·1 answer
  • Can Anyone put my name in binary code using these images? Bentley is my name
    8·1 answer
  • Which of the items listed is not considered to be personal protective equipment (PPE)?
    14·1 answer
  • Seeing her Daughter graduate from college is most likely a short term goal for a person of which of these ages ? A) 24 years old
    10·1 answer
  • Cui documents must be reviewed to which procedures before destruction?
    13·1 answer
  • How to delete account
    12·1 answer
  • The second purpose of government regulation is to​ _____________________.
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!