1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ivanzaharov [21]
3 years ago
11

How can the function abcfunc change the address in its local copy of intpoint?

Computers and Technology
1 answer:
Sophie [7]3 years ago
7 0

Answer:

the correct answer is it cannot

You might be interested in
(15 POINTS + BRAINLIEST) My friend is trying to make an account on brainly, but she can't sign in. All it just says is, “We cann
julia-pushkina [17]
Try a different email and see if that works :)
5 0
3 years ago
Read 2 more answers
Which protocol below is used to email clients to send email
AVprozaik [17]

The Internet Message Access Protocol (IMAP) is a mail protocol used for accessing email on a remote web server from a local client. IMAP and POP3 are the two most commonly used Internet mail protocols for retrieving emails

4 0
3 years ago
Consider the following statement, which is intended to create an ArrayList named a to store only elements of type Thing. Assume
bogdanovich [222]

Answer:

B: new ArrayList()

Explanation:

When dealing with Java syntax you always need to initialize an ArrayList object with its constructor. From the options listed the only correct option would be B: new ArrayList(). This would correctly initialize the ArrayList object but is not necessarily the recommended way of doing this. The truly recommended way would be the following

ArrayList<Thing> a = new ArrayList<Thing>()

7 0
3 years ago
Assume you have a variable sales of type Money where the latter is a structured type with two int fields, dollars and cents. Wri
7nadin3 [17]

Answer:

The answer to the question is included in your question. I guess you need an explanation or clarification.

See Explanation Below

Explanation:

struct Money

{

int dollars,cents;

};

int x,y;

cin>>x>>y;

sales.dollars= x;

sales.cents= y;

The code segment is written in C++ programming language

On Line 1 of the code segment;

The struct keyword is used in c++ and other c type programming to define structure. The name of the structure is Money.

It defines a data type such that the data type is a collection of system and user defined data types

The Money structure defines two integer variables; dollars and cents on line 3.

On line 6, two integer variables x and y are declared.

On line 7, the two variables received inputs from the user.

On line 8, the value of variable x is assigned to dollar

On line 9, the value of variable x is assigned to cent

8 0
3 years ago
Read 2 more answers
True / False: The Session File in Pro Tools saves actions that were created using the GUI (Graphic User Interface). The Session
Leokris [45]

Answer:

The correct answer to the following question will be "True".

Explanation:

A Pro Tools session is essentially a music file containing most the sound and Multimedia files, connector-ins, and settings of the plugin for all of your songs.

  • Also, Pro Tools session documents don't have sound data; rather, they only have the audio tracks connected to it.
  • You will need to configure a session to operate before you can do enough filming, cutting, or blending with Pro Tools.

4 0
3 years ago
Other questions:
  • The largest value (in hex) that can be loaded into Register A of HCS12 is (Points : 2) 0x8.
    9·1 answer
  • The practice of texting is most popular and what age group
    12·2 answers
  • During spring in Colorado, ice on the mountain tops melts into water. Some of this water gets trapped in cracks in the mountain
    12·3 answers
  • 2. A well designed high-volume system will minimize _________ inventory and reduce _____________for the product or service. a) w
    7·1 answer
  • Can change the tab colors of the worksheets in excel
    13·1 answer
  • domain controllers store local user accounts within a sam database and domain user accounts within active directory. true or fal
    10·1 answer
  • Question #8
    13·1 answer
  • 3 ways that can be used to connect computers to a network
    5·1 answer
  • ________ take advantage of vulnerabilities in software. Group of answer choices Blended threats Bots Trojan horses Direct-propag
    6·1 answer
  • Please help me I don’t know what I’m doing wrong.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!