1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Leya [2.2K]
3 years ago
6

Arrays of structures ________. Group of answer choices None of the above. are automatically passed by reference cannot be passed

by reference are automatically passed by value
Computers and Technology
1 answer:
Travka [436]3 years ago
3 0

Answer:

are automatically passed by reference.

Explanation:

A parameter can be defined as a value that can be passed to a function. Thus, a parameter refers to a value that must be passed into a function, subroutine or procedure when it is called.

This value can be passed to a function either by reference or by value.

This ultimately implies that, parameter variable stores information which is passed from the location of the method call directly to the method that is called by the program.

Basically, parameters can serve as a model for a function; when used as an input, such as for passing a value to a function and when used as an output, such as for retrieving a value from the same function.

In Computer programming, an array can be defined as data structure which comprises of a fixed-size collection of variables each typically holding a piece of data and belonging to the same data type such as strings or integers.

This ultimately implies that, when a programmer wishes to store a group of related data (elements) of the same type, he or she should use an array.

A character positions in arrays start counting with the number 0 not 1.

Hence, an array uses a zero-based indexing and as such the numbering or position of the characters (elements) starts from number 0. Thus, the first character (element) in an array occupies position zero (0), the second number one (1), the third number two (2) and so on.

Generally, arrays of structures are automatically passed by reference through the use of a REPLICATE function.

You might be interested in
A company is executing a strategy to encrypt and sign all proprietary data in transit. The company recently deployed PKI service
Softa [21]

Answer:

A. S/MIME

B. TLS

C. Kerberos

Explanation:

PKI : Public Key Infrastructure is a technique which will allow services or applications to communicate securely across the unsecured network or internet.

PKI mainly consist of CA or Certificate Authority who can issue digital certificates or they are also known as trusted CA.  exmaples are godaddy, digicert, verizone, symmantec, etc.. and RA also known as Registration Authorities and they verify if the requested certificates can be stored at CA. Keys will be stored in the central directory.It will also consists of certificate management system and the policies governing PKI.

S/MIME : Secure/Multipurpose Internet Mail Extensions which use assymentric cryptography and sign the MIME data.   S/MIME will provide services like  Authentication, Encryption , Integrity, Privacy and Non repudiation for messaging applications

SMIME uses certificates which can be self signed or CA certified. It specifies MIME type as  application/pkcs7-mime  while transmitting the data.

TLS : Transport Layer Security. the earlier versions used to be known as SSL ( Secure Socket Layer) SSLv3 got depreciated and TLSv1.2/1.3 are popularly used to provide encryption, authentication, Integrity and Hashing for client to server side communication.

Most of the applications communicate securely using TLS.  They will establish secure TCP connection using SSL Handshake. During the Handshake they will exchange supported versions, ciphersuites and certificates. Applications which uses TLS always uses CA certificates and Inhouse applications can communicate using self signed certificate or even with CA certificates.

HTTPS which is also known as HTTP over SSL is widely used for almost all the web services to communicate securely across the internet.

Kerberos : It is a protocol used to prove the identity for two nodes which are communicating with each other. Kerberos uses both symmetric key cryptography and assymetric key cryptography. However, symmetric key cryptography is used widely and public key cryptography is used optionally.

Authentication server which is also known as AS is used to authenticate the requesting client.  It further forwards the user credentials to key distribution center. KDC further issues to TGT ( ticket granting ticket) and it uses TGS's secret key to encrypt. User will receive a encrypted output.  

When a User Login then The client authenticates itself to the Authentication Server (AS) which forwards the username to a key distribution center (KDC). The KDC issues a ticket-granting ticket (TGT), which is time stamped and encrypts it using the ticket-granting service's (TGS) secret key and returns the encrypted result to the user's workstation. Sessions will be renewed and managed by users session manager.

4 0
3 years ago
) A stub network has ______. (Points : 2) one backup route
jeyben [28]

Answer: One backup router

Explanation:

 A stub network is the type of the packet network that basically describe the computer notwork. It typically capable for sending the complex data in the single network path when the network aware about its destination.

A stub network contain the one backup router as the stub routing is the typically designed for conserve the resources of the local router like the central processing unit (CPU) and the memory. It basically improve the stability of the network in the system.

6 0
3 years ago
To stay motivated as you work toward​ long-term goals you​ can
DIA [1.3K]

Answer:

think of how its going to pay off in the end or find motivation in the people around you

Explanation:

7 0
3 years ago
Cheryl has several concepts for mobile apps for smartphones. A friend suggests that she develop her apps for an open-source oper
Flura [38]

Answer:

Personally, I would focus on an open-source operating system because that is a simpler OS to code with. It is also free on some websites to code.

I hope this helped!

7 0
4 years ago
In thinking ahead to the future of technological innovation, what new technology products or digital software do you/would you l
OlgaM077 [116]

Answer: Flying cars with jet propulsion in the wheels to lift it up in the air.

6 0
3 years ago
Other questions:
  • which student organization helps students with career development by having them become interms to sponsor conferences?
    9·1 answer
  • 20 points/ When creating a storyboard, in which section do you mention how you move from one shot to the next?
    11·1 answer
  • What kind of testing is basically checking whether a game or feature works as expected by the developers?
    10·1 answer
  • Given that ∠XQR = 180° and ∠LQM = 180°, which equation could be used to solve problems involving the relationships between ∠XQM
    6·1 answer
  • What is the troubleshooting process?
    5·1 answer
  • Do the shape of a sign gives you a clue about the information contained on the sign
    7·1 answer
  • How many answers do you need to be able to write messages on here??
    6·1 answer
  • Which of these components is a part of the Central Processing Unit (CPU) of a computer?
    11·2 answers
  • Write a program that administers and grades quizzes. A quiz consists of questions. There are four types of questions: text quest
    13·1 answer
  • Read the scenario and then answer the question using only the information provided.
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!