1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
12345 [234]
1 year ago
15

What type casting mechanism should be used if you want to safely change (cast) a pointer type for pointing to a different object

in an inheritance hierarchy?
Computers and Technology
1 answer:
Reil [10]1 year ago
8 0

A<u> dynamic caste</u> casting mechanism should be employed if you want to safely change (cast) a pointer type for meaning to a different object in an inheritance hierarchy.

<h3>What is dynamic type casting?</h3>

The dynamic type cast transforms a pointer (or reference) to one class T1 into a pointer (reference) to another class T2 . T1 and T2 must be part of the same order, the classes must be accessible (via public derivation), and the modification must not be ambiguous.

<h3>What is casting mechanism?</h3>

Casting methods involve the use of molten material, usually metal. This molten material is then poured into a mold cavity that takes the form of the completed part. The molten material then cools, with heat naturally being extracted via the mould, until it solidifies into the desired shape.

To learn more about dynamic caste, refer

brainly.com/question/12634265

#SPJ4

You might be interested in
What is the chief ethical concern concerning all the new sources of data available through new technological means like internet
Kryger [21]
The chief ethical concern is "Privacy". 

A negative aspect of an enormous number of sources available on internet is the concerns about privacy. Web privacy includes the privilege or command of individual protection concerning the sorting, re-purposing, arrangement to outsiders, and showing of data relating to someone through the Internet.Internet security is a subset of data privacy. Privacy concerns have been enunciated from the beginnings of substantial scale PC sharing.
6 0
3 years ago
Please answer quick:))))
Anika [276]
I think B and the second one C
8 0
3 years ago
A form of Internet identity theft involving phony e-mail messages asking customers to update their credit card numbers, account
irina [24]

Answer: Phishing

Explanation:

Phishing is a form of identity theft involving phony email messages asking customers to update credit, debit, cards, accounts passwords, and all whole of personal information. It is still one of the relevant form of identity theft whereby personal information is taken away in form of electronic communication or messages.

One example could be when a person receives a mail from xyz.com and ask him/her to click on a page. upon clicking on it the person will be redirected to another page. in that page several details would be there such as username and password, bank account details. So once all these details are entered in the web page all our personnel information will leaked into the servers of the hackers and could lead to serious troubles. Sometimes phishing is also in form of fake social networking website which resembles exactly to that of the original one.

So Phishing is a for of identity theft.

3 0
3 years ago
Determine the number of cache sets (S), tag bits (t), set index bits (s), and block offset bits (b) for a 40964096-byte cache us
pogonyaev

Complete Question:

Determine the number of cache sets (S), tag bits (t), set  index bits (s), and block offset bits (b) for a 4096-byte cache using 32-bit memory addresses, 8-byte cache blocks and a 8-way associative design. The cache has :

Cache size = 1024 bytes, sets t = 26.8, tag bits, s = 3.2, set index bit =2

Answer:

Check below for explanations

Explanation:

Cache size = 4096 bytes = 2¹² bytes

Memory address bit = 32

Block size = 8 bytes = 2³ bytes

Cache line = (cache size)/(Block size)

Cache line = \frac{2^{12} }{2^{3} }

Cache line = 2⁹

Block offset = 3 (From 2³)

Tag = (Memory address bit - block offset - Cache line bit)

Tag = (32 - 3 - 9)

Tag = 20

Total number of sets = 2⁹ = 512

3 0
3 years ago
Where do today's computers store almost all motherboard configuration data?
sergij07 [2.7K]
In the mother board of the back door next to the restroom 5 steps left
3 0
3 years ago
Other questions:
  • How does the discussion of “Luddites,” “Marx,” and “John Maynard Keynes” in paragraph 21 contribute to the development of the id
    7·1 answer
  • The Circle of Growth
    10·1 answer
  • What is the answer and why?
    12·1 answer
  • What percentage of people with internet access use emojis?
    11·1 answer
  • The way a program is proceed is know as control flow and are :Sequence(one line after the other), Decision-making(either this or
    8·1 answer
  • Digital printing is not suitable for printing what
    11·1 answer
  • Project manager George is defining project management to his team. How should he define project management in one sentence?
    7·1 answer
  • NEED FIVE QUESTIONS ANSWERED!!!
    7·1 answer
  • Aisha designed a web site for her school FBLA club and tested it to see how well it would resize on different systems and device
    5·1 answer
  • What is the shortcut key to create a new desktop ​
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!