1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Degger [83]
3 years ago
12

If a variable uses more than one byte of memory, for pointer purposes its address is: Group of answer choices the address of the

last byte of storage the average of the addresses used to store the variable the address of the first byte of storage general delivery None of these
Computers and Technology
1 answer:
Molodets [167]3 years ago
5 0

Answer:

the address of the first byte of storage.

Explanation:

If a variable uses more than one byte of memory, for pointer purposes its address is the address of the first byte of storage.

A buffer in computer technology can be defined as a temporary area set aside for data storage. Buffers reside in the random access memory (RAM). In the event that, a system process or program places more data (much more than what was originally or initially intended to be allocated for data storage) in a buffer, the extra data overflows. Consequently, this would result in having some of the data to flow into other buffers and thus, causing the data to be overwritten or corruption of the data being held in that buffer.

For instance, we can liken a buffer-overflow to pouring water (data) into a container (program memory), once it is filled the water begins to overflow as the container has reached its maximum amount.

You might be interested in
Time
weeeeeb [17]

Answer:

Time

TARDIS

Gel electrophores

outile

here exterior and

side

ower Resembles even with more

common that there size what

Time

า (

esem

e they

end interior of

4 0
3 years ago
I need to figure out exactly how to make this figure while coding.
erastova [34]

Answer:

class Main {

 public static void main(String[] args) {

   System.out.println("   _");

   System.out.println(" /   \\");

   System.out.println("|     |");

   System.out.println(" \\ _ /");

 }

}

Explanation:

Backslashes have a special meaning in string literals. You have to escape them with a backslash, hence the double backslash.

7 0
4 years ago
While technology has impacted many aspects of marketing. it has had little effect on database marketing
grigory [225]
The answer you’re looking for is “false.”
8 0
4 years ago
Read 2 more answers
An administrator has added a firewall within an Azure virtual network. What do we know for sure about the firewall?
slavikrds [6]

Answer:

its a host based firewall

Explanation:

because the administrator put it ntentionally and the only way do disable the firewall is by signing in as the admin (if you're the admin) and turn it off manualy

or if you're not the admin, ask them to do so.

5 0
3 years ago
Use a while loop to repeatedly take input from the user and calculate a sum. The user will only be allowed to type in numbers, b
aev [14]

Answer and Explanation:

#take input from user

n = int(input("Enter any number: "))

#sum variable to store sum

sum=0

#condition to exit from loop

while n!=-999:

   #adding entered number in sum variable

  sum=sum+n

  #take input from user

  n = int(input("Enter any number : "))

#print the sum  

print("sum =",sum)

output:

Enter any number: 10

Enter any number : 100

Enter any number : -999

sum = 110

3 0
3 years ago
Other questions:
  • Which of the following makes videos appear smoother and more fluid?
    9·2 answers
  • 3.A customer has a system with a Gigabyte B450 Aorus Pro motherboard. He wants to upgrade the processor from the AMD Athlon X4 9
    11·1 answer
  • What are all the folders located on the DOCK called?
    11·1 answer
  • Review the following statements and select the ones that are correct regarding sorting accounts from the Adjusted Trial Balance
    5·1 answer
  • Which formal security-related process should take place at the beginning of the code creation project? Group of answer choices R
    13·1 answer
  • Availability is an essential part of ________ security, and user behavior analysis and application analysis provide the data nee
    14·1 answer
  • What are the two ways to print a document?
    11·1 answer
  • Work-based learning can be defined as educational experiences that focus on
    11·1 answer
  • What is the first step you should take when you want to open a savings account make your initial deposit go to the bank and fill
    9·1 answer
  • What is a primary risk to the Workstation Domain, the Local Area Network (LAN) Domain, and the System/Application Domain
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!