1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lys-0071 [83]
3 years ago
14

In a shallow copy, ____. the values of two or more pointers are copied into a list two or more pointers of the same type point t

o the same memory location two or more pointers of differing types point to the same memory location two or more pointers of the same type point to different memory locations
Computers and Technology
2 answers:
strojnjashka [21]3 years ago
8 0

Answer:

Explanation:

A Shallow copy is a bit-wise (unit of data) copy of an object that can be found/used in an object-oriented programming language code, the copy contains all of the same exact values that exist within the original object. In a shallow copy, two or more pointers of the same type point to the same memory location.

Misha Larkins [42]3 years ago
3 0

Answer:

two or more pointers of the same type point to the same memory

Explanation:

A shallow copy is a bit wise copy of another object. in this practice a new exact copy of an original object is created also if any of the fields of the original object is referenced to another object, while creating the shallow copy only the memory address of that field is copied.

A shallow copy is used in object oriented programming languages like C++, Java, python, SQL  .................... etc A shallow copy is very efficient because it helps to create copies of already created objects instead of having to create new objects everything .

You might be interested in
How serious are the risks to your computer security?
ASHA 777 [7]

The seriousness of  the risks to your computer security is not to be a severe one. This is because Computer security risks  are due to the handwork of  malware such as, bad software, that can infect a  computer, and make the hacker to destroy your files, steal your data, or even  have access to your system without one's knowledge or authorization.

<h3>What are the risk results for information and computer security?</h3>

The term “information security risk” is known to be those  damage that occurs due to  an attacks against IT systems. IT risk is made up of a wide range of potential events, such as data breaches, regulatory enforcement actions, financial costs, and a lot more.

Some Examples of malware are viruses, worms, ransomware, spyware, and a lot others.

Hence, The seriousness of  the risks to your computer security is not to be a severe one. This is because Computer security risks  are due to the handwork of  malware such as, bad software, that can infect a  computer, and make the hacker to destroy your files, steal your data, or even  have access to your system without one's knowledge or authorization.

Learn more about computer security from

brainly.com/question/12010892

#SPJ1

6 0
2 years ago
Let's get into some looping. Sometimes it is nice to generate your own data. Now let's take our first stab at it.
valkas [14]

Answer:

55

Explanation:

3 0
3 years ago
By default, the document has a (blank) margin on all four sides
Brut [27]
The normal margin is 1 inch on all sides
6 0
3 years ago
Read 2 more answers
1. Realizați o schemă logică pentru un algoritm care sa calculeze suma primelor
DIA [1.3K]

Explanation:

The clear rendering reads;

"1. Make a logic diagram for an algorithm to calculate the sum of premiums 100 natural numbers.

2. Make a logic diagram that displays a maximum of 2 natural numbers.

3. Make a logic diagram that displays the square of a natural number".

4 0
3 years ago
3. Which of these paste options is commonly available from the Paste Options button? A. Paste as content only B. Use the destina
Murljashka [212]
In my experience, the correct answer is C) Keep the embedded data formatting. This is because it makes the computer do less work.

7 0
3 years ago
Other questions:
  • A(n) _______ allows an attacker to use a network structure to send large volumes of packets to a victim.
    5·1 answer
  • Answers please !!!!!!!!!!!!!!!!!!!!!!!!!!!
    8·1 answer
  • Instagram
    9·1 answer
  • Which devices typically generate computer output ?
    8·2 answers
  • You currently are IT support for Richman Investments, a brokerage firm that employs 20 brokers. Each broker has their own client
    12·1 answer
  • Which option on the Format tab is used to modify particular portions of the chart?
    12·1 answer
  • What is the point of brainy when other people have to answer your questions but not the cumputer
    9·1 answer
  • What is the importance of different camera angles ?
    9·2 answers
  • Write the line of Python code that calculates and prints the answer to the following arithmetic expressions.
    7·1 answer
  • Data security issues that must be addressed by hipaa implementation teams include:__________
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!