1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
12345 [234]
1 year ago
15

What type casting mechanism should be used if you want to safely change (cast) a pointer type for pointing to a different object

in an inheritance hierarchy?
Computers and Technology
1 answer:
Reil [10]1 year ago
8 0

A<u> dynamic caste</u> casting mechanism should be employed if you want to safely change (cast) a pointer type for meaning to a different object in an inheritance hierarchy.

<h3>What is dynamic type casting?</h3>

The dynamic type cast transforms a pointer (or reference) to one class T1 into a pointer (reference) to another class T2 . T1 and T2 must be part of the same order, the classes must be accessible (via public derivation), and the modification must not be ambiguous.

<h3>What is casting mechanism?</h3>

Casting methods involve the use of molten material, usually metal. This molten material is then poured into a mold cavity that takes the form of the completed part. The molten material then cools, with heat naturally being extracted via the mould, until it solidifies into the desired shape.

To learn more about dynamic caste, refer

brainly.com/question/12634265

#SPJ4

You might be interested in
In the wireless telecommunications industry, different technical standards are found in different parts of the world. A technica
Serhud [2]

Answer:

A varying infrastructure.

Explanation:

The competitive pressure it creates for multinational companies in the industry is one of difference in infrastructure because different technical standards are found in different parts of the world.

For instance, A technical standard known as Global Systems for Mobile (GSM) is common in Europe, and an alternative standard, Code Division Multiple Access (CDMA), is more common in the United States and parts of Asia.

Consequently, equipment designed for GSM will not work on a CDMA network and vice versa as a result of varying infrastructure, so companies would be innovative in order to improve on their products.

3 0
3 years ago
A computer emergency response team is called at midnight to investigate a case in which a mail server was restarted. After an in
ANEK [815]

<u>Answer</u>:   B. Identify the source of the active connection

<em>Any problem can be fixed only finding of the source of it. We can fix a problem in ‘n’ number of ways but it might again come back if source of it is not identified.</em>

<u>Explanation:</u>

Identify the source of the active connection is the NEXT step the team should take. It is very similar to our human body.

If the infection is coming in the body again and again and gets fixed in the treatment, the reason for come - back will be identified so that it does not <em>lead to unnecessary treatment. </em>

In a similar way, if source are identified then the problem of come-back can be avoided. <em>So option B would be the right choice.</em>

4 0
3 years ago
An organization's IRP prioritizes containment over eradication. An incident has been discovered where an attacker outside of the
djyliett [7]

Answer:

a. Remove the affected servers from the network.

Explanation:

An organization's incident response process (IRP) can be defined as all of the process involved in the cleanup and recovery of data when they fall victim to an attack or cybersecurity breach. The incident response process comprises of six (6) important stages and these are;

1. Preparation.

2. Detection and analysis (identification).

3. Containment.

4. Eradication.

5. Recovery.

6. Review of incident activities.

When an organization's IRP prioritizes containment over eradication and an incident is discovered, where an attacker outside the organization installed a crypto-currency mining software on the organization's web servers. Given the organization's stated priorities, the cybersecurity engineer should remove the affected servers from the network.

A containment process is focused on taking steps to eliminate or contain the attack. It basically involves acting swiftly in response to the attack, so as to prevent it from spreading across board or in order to mitigate the damage already caused.

In this context, the cybersecurity engineer should remove the affected servers from the network in accordance with the organization's IRP priority (containment).

<em>Furthermore, he could take a step further to contain the attack by installing a firewall and updating their policies in the Intrusion Prevention System (IPS) of the organization. </em>

5 0
3 years ago
_____ is responsible for packet forwarding. a. Transmission Control Protocol b. User Datagram Protocol c. Extensible Authenticat
Mazyrski [523]

Answer:

d. Internet Protocol

Explanation:

Internet Protocols suite  are used to transport packets from the host network across other networks. This task is usually performed by optimizing the size of each available packet, which are then forwarded through the internet protocol (IP) address.

Therefore, Internet Protocol is responsible for packet forwarding.

6 0
3 years ago
In the following code segment, assume that the ArrayList numList has been properly declared and initialized to contain the Integ
KATRIN_1 [288]

Answer:

e. 4

Explanation:

The code segment will not work as intended if the value of the variable val is 4. This is because the while loop is comparing the value of the variable val to the value of each element within the numList. Since there is no element that is bigger than or equal to the number 4, this means that if the variable val is given the value of 4 it will become an infinite loop. This would cause the program to crash and not work as intended.

8 0
3 years ago
Other questions:
  • List three types of cardinalities for relationships within a relational database.
    9·1 answer
  • An individual is first with the network before they are authorized to access resources on the network A. countermeasure B. vulne
    11·1 answer
  • If you are driving at night, you should not use high-beam headlights within _________ of oncoming vehicles. Florida Road Rules 4
    9·2 answers
  • Computer program allowing the computer to communicate<br> with a hardware device
    13·1 answer
  • Explain why the game of economics has no winner
    8·1 answer
  • HELP ASAP
    9·1 answer
  • Which segment of society introduced the grunge look?
    5·2 answers
  • Please help it would mean to world to me❤️ (WORD)
    13·1 answer
  • What do financial planning skills ultimately enable an individual to do?
    10·2 answers
  • Some Tiny College staff employees are information technology (IT) personnel.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!