How should a programmer decide whether to use a macro or a
subroutine to accomplish a given logical function

Answer Posted / sumegha sharma

if a programmer wants to call a function by call by
reference method then he should use macro or if by call by
value method then he should use subroutine.

Is This Answer Correct ?    8 Yes 11 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

how to generate dsnless connectivity in j2ee

1529


For a binary tree with n nodes, How many nodes are there which has got both a parent and a child?

3192


WS-NUM PIC S9(05)V(02) SIGN TRAILING SEPARATE MOVE '0050000+' TO WS-NUM The value stored is 00500,00+ MOVE '0050000-' TO WS-NUM Then what is the value will be stored in WS-NUM? Am getting '-00500,00'.....>>> What should I declare to WS-NUM so that I can get correct values for both + & - signs.

1852


purpose of abstraction and interface

1530


How do you initialize a static member of a class with return value of some function?

672






What is autocall macro and how to create autocall macro? what is the use of it?

1501


how can we implement locks in plsql?

1794


What is WEB 3.0? What are the features their in WEB3.0

1578


Given an array all of whose elements are positive numbers, find the maximum sum of a subsequence with the constraint that no 2 numbers in the sequence should be adjacent in the array. So 3 2 7 10 should return 13 (sum of 3 and 10) or 3 2 5 10 7 should return 15 (sum of 3, 5 and 7)

763


How to get the index of the clicked field in reports in ABAP?

1160


how many types of operating system are avaliable?

1821


You are given some denominations of coins in an array (int denom[])and infinite supply of all of them. Given an amount (int amount), find the minimum number of coins required to get the exact amount. What is the method called?

609


1. Consider the following code in our example assembly language: ; an example bit of assembly code ROOT: W FATHER FATHER: W SON1 W SON2 SON1: W NIL W NIL ; ---------------------- SON2: W GRANDSON W NIL GRANDSON: W NIL W NIL NIL = 0 Assemble this code carefully following the two pass model, and show the symbol table at the point marked by the dashed line during each pass.

1822


in network security,how we identified threat?some one say we found threat according to it's signature,but how we get signature or pattern of the virus?

1522


Find out the list of roles which gives access to GUI activities? thanks in advance

1728