1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Oxana [17]
3 years ago
7

Describe the Pointer with example?​

Computers and Technology
2 answers:
kodGreya [7K]3 years ago
7 0

Answer:

A pointer is a variable that stores the address of another variable. Unlike other variables that hold values of a certain type, pointer holds the address of a variable. For example, an integer variable holds (or you can say stores) an integer value, however an integer pointer holds the address of a integer variable.

mina [271]3 years ago
3 0

Answer: A pointer is a variable that stores the address of another variable. Unlike other variables that hold values of a certain type, the pointer holds the address of a variable. For example, an integer variable holds (or you can say stores) an integer value, however, an integer pointer holds the address of an integer variable.

Explanation:

You might be interested in
Define the types of objects that can be stored in active directory, such as user or computer accounts.
nevsk [136]
<span>Schema classes define all objects that AD can handle.</span>
8 0
4 years ago
Assume that the classes listed in the Java Quick Reference have been imported where appropriate.
Georgia [21]

rcre2nvijrnv

u1bcihdebc

nn

8 0
4 years ago
An animal shelter recently held an adoption event and found homes for 48 of their shelter animals. If they found home for 80% of
vredina [299]

Answer:

9.6

Explanation:

4 0
3 years ago
Read 2 more answers
6.5 Code Practice
o-na [289]

Answer: tried using stack over flow and GitHub. The have most of the codes for everything

Explanation:

4 0
3 years ago
Please explain what steps you will take to prevent hackers from getting access to your personal information.
yuradex [85]
The steps I would take are 1. Making a strong password with symbols and numbers. 2. I will set up a 2 way authentication ther for if someone would be trying to hack me I would get an alert in order to stop the attempt. 3 I will not use the same password each time.
4 0
3 years ago
Other questions:
  • What is the significance of both RAID and IP technologies as precursors to the SAN environment?
    11·1 answer
  • Of the three types of mutating malware, what type changes its internal code to one of a set number of predefined mutations whene
    9·1 answer
  • Suppose that we have a set of activities to schedule among a large number of lecture halls, where any activity can take place in
    8·1 answer
  • (Solved—15 Lines) In many jurisdictions a small deposit is added to drink containers to encourage people to recycle them. In one
    5·1 answer
  • Which of the following statements are valid in Java? (Assume that console is Scanner object initialized to the standard input de
    15·1 answer
  • Sarah is a busy real estate agent with a growing clientele. She is looking to purchase a new computer and software so that she c
    15·1 answer
  • Type the correct answer in the box. Spell all words correctly.
    7·2 answers
  • 3<br> Select the correct answer.<br> What is the output of the following HTML code?<br>Please
    8·2 answers
  • Write an algorithm to calculate the average<br> value of array of integer elements
    13·1 answer
  • If given program is executed, what will be output?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!