Answer:
The 3rd one
Explanation:
Intellectual property refers to creations of the mind: inventions; literary and artistic works; and symbols, names and images used in commerce. Intellectual property is divided into two categories: Industrial Property includes patents for inventions, trademarks, industrial designs and geographical indications.
Answer:
Troubleshooting
Explanation:
These actions are called troubleshooting.
Troubleshooting is used to diagnose the unexpected error while you are performing some action on the computer. For example
You are running skype, and a one-day mic or sound performing unexpected error. What will you do? You have to perform the troubleshooting for MIC and sound to diagnose the problem.
During troubleshooting, you will wizard through steps of the procedure to diagnose the problem step by step. If the problem will be identified, the solution will be suggested.
You may experience sometimes your Wifi router at home not working. For this to identify the unexpected error you will perform the troubleshooting.
In short, troubleshooting is used to diagnose unexpected error while performing some action on the computer. If troubleshooting does not work, then close all the programs running on your machine, then shut down your computer. Wait a couple of minutes, and then start your computer and see, the problem may have been alleviated.
Option A because the environment should be selected for which the changes are to be applied. In a time Force IDE has many project environments for example maybe a java project and C++ project would be there on sandbox, so the environment selection is important.
Option B because the related changed sets should be specified so that other developers that have access to the project can see the changes being made.
Option D The data fields that are needed to be deployed should also be provided so that the updated version can be seen by other developers.
Rejected Options :
Option C user name and password has nothing to do with the production environment because if the user has it only then it can come and make changes.
Answer:
C code for half()
#include<stdio.h>
void half(float *pv);
int main()
{
float value=5.0; //value is initialized
printf ("Value before half: %4.1f\n", value); // Prints 5.0
half(&value); // the function call takes the address of the variable.
printf("Value after half: %4.1f\n", value); // Prints 2.5
}
void half(float *pv) //In function definition pointer pv will hold the address of variable passed.
{
*pv=*pv/2; //pointer value is accessed through * operator.
}
- This method is called call-by-reference method.
- Here when we call a function, we pass the address of the variable instead of passing the value of the variable.
- The address of “value” is passed from the “half” function within main(), then in called “half” function we store the address in float pointer ‘pv.’ Now inside the half(), we can manipulate the value pointed by pointer ‘pv’. That will reflect in the main().
- Inside half() we write *pv=*pv/2, which means the value of variable pointed by ‘pv’ will be the half of its value, so after returning from half function value of variable “value” inside main will be 2.5.
Output:
Output is given as image.
Maybe Encouragement? I don't know, are there any choices to choose from?