1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
TEA [102]
3 years ago
15

Explain each kind of pointer and for what it is appropriate

Computers and Technology
2 answers:
ycow [4]3 years ago
8 0

Answer:

Explanation:

A pointer is nothing but a memory location where data is stored. A pointer is used to access the memory location. There are various types of pointers such as a null pointer, wild pointer, void pointer and other types of pointers. ... When you want to deal different variable data type, you can use a typecast void pointer.

Korolek [52]3 years ago
3 0

Answer:

A pointer is nothing but a memory location where data is stored. A pointer is used to access the memory location. There are various types of pointers such as a null pointer, wild pointer, void pointer and other types of pointers.  When you want to deal different variable data type, you can use a typecast void pointer.

You might be interested in
Capacity requirements are computed by multiplying the number of units scheduled for production at a work center by the:
podryga [215]

Answer:

.

Explanation:

5 0
3 years ago
Use System.DateTime along with System.Console to implement a simple C# program that does the following:_______.
Andre45 [30]

Answer:

5

Explanation:

I did it to and it was right

3 0
3 years ago
You realize your computer has been infected with malware. It seems as if someone is controlling your computer from a remote loca
lara [203]

Answer:

Worm malware

Explanation:

The worm operates destructively as it replicates itself and keeps spreading within a computer or network. It takes advantage of software and security vulnerabilities.

Once a computer or network is infected, worms replicate themselves, therefore using up the computer and network resources. Among others, one of the major missions of worms is to create a backdoor into a network, to be able to enable the attacker to carry out a more devastating attack.

Since worms take advantage of weak security in the Operating system, it is very important to constantly update the security features of the Operating system. Users must be careful of the emails they open and attachments they download.

6 0
3 years ago
The ____ event of a ComboBox object is triggered when the user changes the selection.?
Semmy [17]
The "Selected Index Changed" event of a ComboBox object is triggered when the user changes the selection.
8 0
3 years ago
As we discussed in class, with the explosion of huge volumes of unstructured data, a new breed of database technologies have eme
Ronch [10]

Answer:

Dynamo, Bigtable, and Cassandra are NoSQL data stores being used by some of the worlds biggest IT businesses such as Amazon.

These programs were developed to solve a specific or unique business problem. The initial plan was not to commercialize them.

 

Cheers!

5 0
3 years ago
Other questions:
  • Which port can connect you to the Internet through a telephone line?
    6·1 answer
  • Temporary storage location for cutting and pasting
    9·1 answer
  • A range in which a measuring instrument or controller does not respond is the
    12·1 answer
  • Which relationship is possible when two tables share the same primary key? one-to-one one-to-many many-to-one many-to-many
    15·2 answers
  • Which of the following actions might contribute to recommendations you see online?
    6·1 answer
  • Write a function that, given an array A of N integers, of which represents loads caused by successive processes, the function sh
    15·1 answer
  • _____________ describes the abstraction of web-based computers, resources, and services that system developers can utilize to im
    9·1 answer
  • Please help! I tried this by myself. But I am not sure if this is right.
    8·2 answers
  • Cho dãy A gồm N số nguyên a1,...aN. Hãy đếm tất cả các số âm hoặc không chia hết cho 5 trong dãy
    12·1 answer
  • In order to control access to a company's intranet and other internal networks, all communications pass through a _____ server.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!