1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
romanna [79]
3 years ago
6

The _____ of a local variable is the function in which the variable is created.

Computers and Technology
1 answer:
inn [45]3 years ago
8 0
The scope <span>of a local variable is the function in which the variable is created.</span>
You might be interested in
Which is a tool that allows you to copy formatting from one place and apply it to other places?
ruslelena [56]

Answer:

copy and paste

Explanation:

highlight, right click, then go to where you want it, then right click again, and paste. and done

8 0
4 years ago
a hacker who plants a rogue wireless access point on a network in order to sniff the traffic on the wired network from outside t
charle [14.2K]

Answer: a)Physical access

Explanation: Physical access is the function that permits the accessing of the  computer system in a physical way. This access work on the building, It organization and other physical buildings.This access make the system prone to high amount of corruption and hacking .

Other options are incorrect because technical access is for the accessing the technical parts,operational access is for controlling the functions and remote access is for accessing the system from remote area.Thus the correct option is option (a).

6 0
3 years ago
What do you use to put information into a computer?
OlgaM077 [116]
D, D,A,t,C,CA,D,t, D
5 0
3 years ago
Read 2 more answers
13. A 2-sided coin has an equal likelihood of landing on each side. One side is called "heads" and the other is called "tails".
serious [3.7K]

Answer: c

Explanation:

only reasonable answer

7 0
3 years ago
github Portfolio Balances An investor opens a new account and wants to invest in a number of assets. Each asset begins with a ba
OLEGan [10]

The following code will be used to determine the maximum amount invested

<u>Explanation:</u>

long maxValue(int n, int rounds_rows, int rounds_columns, int into rounds)

{

   // Define the variable to store

   // the maximum amount invested.

   long max = 0;

   

   // Define an array of size n,

   // to store the n investments.

   long *investments = (long*)malloc(sizeof(long)*n);

   int i=0;  

   // Initially set all

   // the investments to 0.

   for(i=0;i<n;i++)

   {

       investments[i] = 0;

   }

   i=0;

   // Run the loop to

   // perform the rounds.

   while(i<rounds_rows)

   {

       // Get the left value

       // of the current round.

       int left = rounds[i][0];

       

       // Get the right value

       // of the current round.

       int right = rounds[i][1];

       // Get the contribution

       // for the current round.

       int contribution = rounds[i][2];

       // Since the user uses 1-based

       // indexing, subtract 1 from left

       // and right as the program uses

       // 0-based indexing. That is, the

       // investments in the array start

       // from 0 and not 1.

       right = right - 1;

       int j=0;

       // Run the loop to add the

       // contribution to all the investments

       // between left and right, both inclusive.

       for(j=left; j<=right; j++)

       {

           investments[j] += contribution;

       }

       i++;

   }

   // Traverse the investments array

   // to find the maximum element.

   max = investments[0];

   for(i=1; i<n;i++)

   {

       if(investments[i]>max)

       {

           max = investments[i];

       }

   }

   // Return the

   // maximum investment.

   return max;  

}

6 0
4 years ago
Other questions:
  • Alison retrieved data from a company database containing personal information on customers. When she looks at the SSN field, she
    14·1 answer
  • ________ is an open-source program supported by the Apache Foundation that manages thousands of computers and implements MapRedu
    5·1 answer
  • A mobile device is freezing almost daily. The device remains powered on and the screen illuminated. The user restarts the device
    13·1 answer
  • It is important to create an IT security program structure that aligns with program and organizational goals and describes the o
    6·1 answer
  • What kind of information can be found in a ROM:
    14·1 answer
  • Eight what makes one character
    14·1 answer
  • In this chapter, you subnetted a Class C private network into six subnets. In this project, you work with a Class B private netw
    10·1 answer
  • In the movie, Willy Wonka and the Chocolate Factory, Augustus Gloop leans over the chocolate river to get a drink and falls in.
    11·1 answer
  • What language below is used to view and manipulate data that is stored in a relational database?
    6·1 answer
  • Which type of relationship is responsible for teaching you values and how to communicate?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!