1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sophie [7]
3 years ago
15

When you pass an array name as an argument to the function what is actually being passed

Computers and Technology
1 answer:
Allushta [10]3 years ago
6 0

Answer:

The Base address of the array is being passed

You might be interested in
A chief Information Security Officer (CISO) is performing a BIA for the organization in case of a natural disaster. Which of the
nataly862011 [7]

Answer:

The correct answer is option (D) Identify the impact on safety of the property

Explanation:

Solution

In every Business Impact Analysis, the first and the most important step is for the CISO is to identify and estimate the impact of the aftereffects on the business and property of an organization that may be occurred from the disaster.

Physical security is very important, but it is not noticed by most organizations. It is important if you do not want anyone to take  away your information or destroy it, in case of natural calamity. the reason could be that, the intruder is  doing it for his personal achievement, financial gain,or seeking revenge or when one is taken unaware and becomes a target. If this security is not maintained properly all the safety measures will not be useful once the attacker gets through by gaining physical access.

Example of property can be software, equipment, facilities, company’s assets.

4 0
3 years ago
Plsss help me<br><br>1)give 2 examples of systems that you use or see in your day-to-day life​
Gnoma [55]

Answer:

The modern world has numerous kinds of systems that influence daily life. Some examples include transport systems; solar systems; telephone systems; the Dewey Decimal System; weapons systems; ecological systems; space systems; etc.

5 0
2 years ago
Today's consoles and games have audio features that rival cinematic audio.<br> True or False?
Angelina_Jolie [31]

Answer:

true

Explanation:

4 0
2 years ago
Read 2 more answers
The most common schedule for tape-based backup is a _____ backup, either incremental or differential, with a weekly off-site ful
sergejj [24]

The most common schedule for tape-based backup is called the daily on-site backup.

<h3>What is daily backup?</h3>

The daily backup is known to be a kind of backs up of only files that were were said to be modified that day.

A full backup is known to be a full and complete backup of the whole system, such as all applications, operating systems components, etc.

Learn more about  backup from

brainly.com/question/86807

8 0
2 years ago
In ipv4 addressing, an ip address whose first octet is in the range of 192–223 belongs to a class ____ network.
pishuonlain [190]

I guess the correct answer is class C network.

In IPv4 addressing, an IP address whose first octet is in the range of 192–223 belongs to a class C network.

4 0
3 years ago
Other questions:
  • Sean is white hat hacker, who is demonstrating a network level session hijack attacks and as part of it, he has injected malicio
    6·1 answer
  • A ____ document identifies the purpose of the program being developed, the application title, the procedures to be followed when
    11·1 answer
  • Assume that play_list refers to a non-empty list, and that all its elements are integers. Write a statement that associates a ne
    7·1 answer
  • Write a function named times_ten. the function should accept an argument and display the product of its argument multiplied time
    13·1 answer
  • Data_____is defined as the condition in which all of the data in the database are consistent with the real-world events and cond
    9·1 answer
  • What are the useful techniques in program design?
    12·1 answer
  • Suppose you are an ISP that owns a / 22 IPv4 address block. Can you accommodate requests from six customers who need addresses f
    8·1 answer
  • Which ribbon tab is not a default in Outlook 2016's main interface?
    13·2 answers
  • A _______ attack uses software to try thousands of common words sequentially in an attempt to gain unauthorized access to a user
    9·2 answers
  • Think of some local businesses that have websites. Look online and identify two different websites for businesses or services in
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!