1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ronch [10]
4 years ago
13

Change the function definition for myint so that xyzfunc uses the same memory locations for myint as in the calling program.

Computers and Technology
1 answer:
sattari [20]4 years ago
8 0

Answer:

b) void xyzfunc (int &myint);

Explanation:

To use the same memory location as the variable in the calling function we have to pass the variable by reference means passing the same address to the function.So to do that we have use & operator which stands for address.

We will do this as following:-

void xyzfunc (int * myint);

Hence the answer is option b.

You might be interested in
Which disc store compacity for full lenght movie? dvd or cd
galben [10]
DVDS have a lot more available bytes for use compared to a CD. Movies are typically take up a LOT of space- so DVDS are your best option
5 0
3 years ago
I am a non-volatile type of built-in memory. I store my contents long-term. My job is to store critical programs that the comput
AlexFokin [52]

Answer:

read only memory (ROM)

Explanation:

Examples of non-volatile memory include read-only memory (see ROM), flash memory, most types of magnetic computer storage devices (e.g. hard disks, floppy discs and magnetic tape), optical discs, and early computer storage methods such as paper tape and punched cards.

7 0
3 years ago
The cold war actually helped in the development of the internet true or false
Wewaii [24]

False is the corret answer.

7 0
3 years ago
Janet manages the security of the database servers at the mortgage company where she works. The servers are Windows Server 2016;
Mariulka [41]

Answer:

encrypted file system (EFS)

Explanation:

The Encrypting File System (EFS) on windows is a Microsoft feature that help store sensitive file or information on a hard disk in an encrypted format so as to protect it from attackers or any other unauthorize individual. The EFS uses a combination symmetric key encryption and public key technology to protect the files, it is then encrypted with a symmetric algorithm known as DESX.

3 0
4 years ago
1. A cell is identified by its ........
earnstyle [38]
Answers:
1- cell address ( i think)
5 0
3 years ago
Other questions:
  • What does FTP stand for?
    15·2 answers
  • To keep from overwriting existing fields with your Lookup you can use the ____________ clause.
    14·2 answers
  • Choose two browsers and compare their security features.
    5·1 answer
  • Voice authentication requires speech to text capability Facial recognition may be used for authentication The human iris is uniq
    6·1 answer
  • What is copy and paste?
    13·2 answers
  • Stephanie would like to know the average number of regular hours worked by her employees. In cell B11, create a formula using th
    8·1 answer
  • D State Six Impact of ICT the society​
    7·1 answer
  • how does a demilitarized zone (dmz) work. A.By preventing a private network from sending malicious traffic to external networks
    10·1 answer
  • Why do meteorologists use data such as temperature, wind speed, and air
    9·1 answer
  • China sends a computer virus that shuts down telephone service in the United States. In retaliation, the United States hacks int
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!