1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lys-0071 [83]
2 years ago
14

In a shallow copy, ____. the values of two or more pointers are copied into a list two or more pointers of the same type point t

o the same memory location two or more pointers of differing types point to the same memory location two or more pointers of the same type point to different memory locations
Computers and Technology
2 answers:
strojnjashka [21]2 years ago
8 0

Answer:

Explanation:

A Shallow copy is a bit-wise (unit of data) copy of an object that can be found/used in an object-oriented programming language code, the copy contains all of the same exact values that exist within the original object. In a shallow copy, two or more pointers of the same type point to the same memory location.

Misha Larkins [42]2 years ago
3 0

Answer:

two or more pointers of the same type point to the same memory

Explanation:

A shallow copy is a bit wise copy of another object. in this practice a new exact copy of an original object is created also if any of the fields of the original object is referenced to another object, while creating the shallow copy only the memory address of that field is copied.

A shallow copy is used in object oriented programming languages like C++, Java, python, SQL  .................... etc A shallow copy is very efficient because it helps to create copies of already created objects instead of having to create new objects everything .

You might be interested in
Calculate the number of telephone
olchik [2.2K]

Answer:

yho

Explanation:

hayi no ntwana.... lala boy

6 0
2 years ago
listen to exam instructions a small business called widgets, inc. has hired you to evaluate their wireless network security prac
Alex

Following actions could you most likely advise the client taking to strengthen the security of their wireless network-

  • Change the default SSID to anything different.
  • Turn off SSID broadcasting.
<h3>Explain the term wireless network security?</h3>
  • Designing, putting into practice, and ensuring security on such a wireless computer network are all parts of wireless network security.
  • A wireless computer network is further protected by this subset of network security.
  • Wireless security is another name for wireless network security.

For the stated question-

  • Disabling SSID broadcast and changing the network name are advised.
  • By disabling SSID, the network name won't be displayed on devices looking for a network can connect to, and so by changing the name, it will be impossible for anyone who already knows the old name to connect.
  • Both of which significantly boost security.

To know more about the wireless network security, here

brainly.com/question/28257213

#SPJ4

3 0
1 year ago
When you need to switch on an electrical current at a remote location, would you use a relay or an amplifier?
ahrayia [7]

Answer:

Relay

Explanation:

They both perform similar functions in terms of control of voltage and current but the relay would be better because although it cannot produce a variable output like that of an amplifier, it has the capacity to isolate its input from its output.

7 0
2 years ago
Please help I have errors codes and don’t know that they are.<br> Please help thank You.
gizmo_the_mogwai [7]
Refresh, power off and repeat
4 0
2 years ago
Read 2 more answers
Which selection below has the greatest storage capacity
shutvik [7]
Where is the selection?

Message me when you have the full question.
8 0
2 years ago
Other questions:
  • What are the core scripting and coding technolies used to build ai platforms?
    14·1 answer
  • Why OSI is called open system?
    8·1 answer
  • Contemporary operation of networking technology is possible only through the usage of open-use technology and layering approache
    13·1 answer
  • _____ is used to temporarily hold small units of program instructions and data immediately before, during, and after execution b
    10·1 answer
  • When an organization uses cloud computing, they do not have to buy and maintain expensive hardware. Group of answer choices True
    6·1 answer
  • Su now wants to modify the text box that contains her numbered list. She accesses the Format Shape pane. In what ways can Su mod
    7·2 answers
  • Explain the following terms <br><br>copyleft:<br><br>creative Commons:<br><br>GNU/GPL:​
    8·1 answer
  • Submit your business presentation that clearly compares and contrasts three different cell phone service plans. I have TO HAVE I
    14·1 answer
  • Write a description of the photograph to someone who cannot see the photograph. Be sure to include the title of the photograph a
    5·1 answer
  • Select the correct answer.
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!