1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alina [70]
3 years ago
13

Which of the following statements is TRUE? C++ functions can return a value of type array if it is returned as a base address va

lue. C++ functions can return a value of type array. C++ functions can return a value of type array if the array is local to that function. C++ functions cannot return a value of type array.
Computers and Technology
1 answer:
lesantik [10]3 years ago
3 0

Answer:

The answer to this question is "C++ functions can't return array type value".

Explanation:

In C++ language the method is a collection of declarations executing a process together. It is a statement, that tells the compiler to return and accept parameters of a function. In C++, it includes many standardized functions, which can be called by the software, and other choices were wrong, which can be described as follows:

  • In c++ function can't return array type always.  
  • function is not address based.  
  • If array is local to function, but function will not return array value.
You might be interested in
What is a digital certificate? Select one: a. It is a means of establishing the validity of an offer from a person, entity, web
a_sh-v [17]

Option D is the answer because Digital Certificate is an entity that generates electronic and distributes them upon proving their identity sufficiently. In early days there was issues with people using the certificates that were not even issued by the organizations. Today it's a cryptographic technique which uses digital signatures and gives users a digital certificate that can be authenticated anytime online by any organization and is unique for every user having it.

Option A cannot be the answer because it has nothing to do with the identity of person but rather it is for specific fields.

Option B is not answer because it has no key and score matter to do with it.

Option C Web transactions has nothing to do with the certificates.

8 0
3 years ago
Ndcdeviceid?????????????????????​
butalik [34]

YESS

Explanation:

YESSssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssss

7 0
2 years ago
The method main of a class is called when you instantiate an object of that class like this: Box myBox = new Box();
WINSTONCH [101]

Answer:

The answer is "Option A"

Explanation:

In the OOPs programming language, the class and object concept is used, in which class is a collection of data members, and member function and object is known as real-time entity. In the class when the main method is created, so inside this method class object is created that's why the answer to this question is true.

7 0
3 years ago
A data structure used to bind an authenticated individual to a public key is the definition of ________.
patriot [66]

Answer:

Digital Certificate is the correct answer of this question.

Explanation:

Digital certificates are always for encryption and identification for transmitting public keys.The concept of digital certificate is a data structure used for linking an authenticated person to a public key. It is used to cryptographically attach public key rights to the organization that controls it.

<u>For example</u>:- Verisign, Entrust, etc.

  • An appendix to an electronic document that is used for authentication purposes.
  • A digital certificate's most frequent use is to confirm that an user sending a message is who he or she appears to be, and provide the recipient with the means to encode a response.

4 0
3 years ago
What class of attacks use innovative attack tools and once a system is infected it silently extracts data over an extended perio
KatRina [158]

Answer:

Advanced persistent threat.

Explanation:

Advanced persistent threat is a threat actor implemented by either a government supported or private group to intrude a network or system and stays undetected, collecting information over a period of time.

It is used by cyber terrorist group to facilitate massive attacks based on the information retrieved. National or government group use the concept to promote national security.

7 0
3 years ago
Other questions:
  • The tone a writer takes is referred to as the writing _____.
    7·2 answers
  • What is a common method for testing a spot weld?
    13·1 answer
  • Whats the size of a short bond paper in microsoft word?
    10·1 answer
  • People using commercially available software are usually asked to read and agree to a(n) _____
    10·1 answer
  • My speaker on my phone is not working, when I try and play music and videos the sound dosen't work. However my alarm works. Can
    9·2 answers
  • The 0-1 knapsack problem is the following. A thief robbing a store finds n items. The ith item is worth vi dollars and weighs wi
    14·1 answer
  • Var words = ["apple", "bug","car", "dream", "ear", "food"]
    6·2 answers
  • Why would a user want to resend a message? Check all that apply.
    7·2 answers
  • Write long answer to the following question. a. Define microcomputer. Explain the types of microcomputers in detail.​
    5·2 answers
  • Place the steps for attaching a file to a message in order from top to bottom.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!