1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
anygoal [31]
3 years ago
6

Run-time parameters passed to a function allow you to use different values each time the function is called.

Computers and Technology
1 answer:
stich3 [128]3 years ago
8 0

Answer:

True

Explanation:

Run-time parameters passed to a function allow you to use different values each time the function is called. Let us consider an example:

int add(int a,int b){

   return a+b;

}

Now we can execute the same function with different parameters at runtime:

add(3,4) returns 7.

add(1,2) return 3.

add (10,1) return 11.

During each invocation , the formal function parameters are substituted by actual runtime values and the function code is executed.

You might be interested in
In a proper webpage, which tag holds all of a webpages visble HTML
Furkat [3]
If I remember correctly, I believe it's <body></body>
6 0
3 years ago
Read 2 more answers
Discuss the use of distributed (federated) authentication systems in use at your institution. If no such system is in use, then
aleksklad [387]

Answer:

Check the explanation

Explanation:

Distributed (federated) authentication system:

  1. • Federal identity in a information technology is a process of linking a person's identity and the attributes in multiple distinct identity management system.
  2. • It uses a single sign-on authentication; it means that one authentication credential is used to access multiple applications or the accounts.

Use of distributed (federated) authentication systems in institutions

In the institution the educational resources and other splices are offered via online, the faculty, students, alumni or other users using are accessing the resources from the various locations.

Different devices like mobile, tablet, laptop, desktop are used to access those resources.

The distributed or federated authentication identity management permits the institution to provide the access in a trustworthy, protected manner without n explosion a credentials.

• She distributed or federated authentication identity management permits the institution or individual faculty to control the access of research or other data easily and enables new level of academic collaboration

• It support the institutional policies to emend the access of valuable resources to a specific groups a use, and the incorporation of identity management across the academic government and commercial add and it make wider the possibility for interdisciplinary, inter-institutional scholarship.

BENEFITS

Students

• Make them to remember to single user id and password.

• Makes to access the educational resources across the institution and world.

• Personal information's are securely protected.

Teachers and Researchers

• flaps to create learning and research tools.

• It makes the control to access the restricted crown .

• It follows the Federal regulations and streamlines the access to the federal grant system

IT

• It eliminate the data and system redundancy

• Provides a strong and secure identity and access management.

4 0
3 years ago
 In which part of a professional email should you try to be brief, but highly descriptive? 
quester [9]
The subject line should be a brief message explaining some of the contents of the email.
4 0
3 years ago
Hey how was your day 50 points
lakkis [162]

Answer:

bad

Explanation:

3 0
3 years ago
Read 2 more answers
Explain the ten characteristics of a digital computers​
Paul [167]

Answer:

The major characteristics of computers are the following:

Speed : A powerful computer is capable of executing about 3 million calculations per second.

Accuracy : A computer's accuracy is consistently high; if there are errors, they are due to errors in instructions given by the programmer.

Reliability : The output generated by the computer is very reliable as long as the data is reliable.

Memory/Storage Capacity : The computer can store large volumes of data and makes the retrieval of data an easy task.

Versatility: The computer can accomplish many different things. It can accept information through various input-output devices, perform arithmetic and logic operations, generate a variety of outputs in a variety of forms, etc.

Automation: Once the instructions are fed into computer it works automatically without any human intervention.

Diligence: A computer will never fail to perform its task due to distraction or laziness.

Convenience: Computers are usually easy to access, and allow people to find information easily that without a computer would be very difficult.

Flexibility: Computers can be used for entertainment, for business, by people who hold different ideals or who have varied goals. Almost anyone can use a computer, and computers can be used to assist with almost any goal.

<em>I hope it helps you!!!!</em>

6 0
3 years ago
Other questions:
  • Elvis has asked Bonnie out on a date to a baseball game. Elvis is a friend of Bonnie's classmate Ginger and she has met him a fe
    5·2 answers
  • Which of the following is not considered as part of technology literacy?
    8·1 answer
  • The main benefit of encryption of a hard drive is to make part of an ROI report.
    15·1 answer
  • Which feature is an interface between the user and the file system of a computer?
    6·2 answers
  • What does media saturation mean?
    15·1 answer
  • Most smartphones use operating systems developed by ________. Select one: A. Symbian and Apple B. Apple and Microsoft C. Microso
    13·1 answer
  • Imagine that you have a friend who has expressed interest in designing and programming video games. He loves to play video games
    10·1 answer
  • Which command can be used to find errors on a hard drive​
    6·1 answer
  • What is the importance of effectiveness in communication?
    14·1 answer
  • A printer is considered to be in the category of
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!