1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
12345 [234]
1 year ago
15

What type casting mechanism should be used if you want to safely change (cast) a pointer type for pointing to a different object

in an inheritance hierarchy?
Computers and Technology
1 answer:
Reil [10]1 year ago
8 0

A<u> dynamic caste</u> casting mechanism should be employed if you want to safely change (cast) a pointer type for meaning to a different object in an inheritance hierarchy.

<h3>What is dynamic type casting?</h3>

The dynamic type cast transforms a pointer (or reference) to one class T1 into a pointer (reference) to another class T2 . T1 and T2 must be part of the same order, the classes must be accessible (via public derivation), and the modification must not be ambiguous.

<h3>What is casting mechanism?</h3>

Casting methods involve the use of molten material, usually metal. This molten material is then poured into a mold cavity that takes the form of the completed part. The molten material then cools, with heat naturally being extracted via the mould, until it solidifies into the desired shape.

To learn more about dynamic caste, refer

brainly.com/question/12634265

#SPJ4

You might be interested in
Creating a map of your current knowledge is called __________.
poizon [28]

Answer:

D - Concept-mapping

Explanation:

3 0
3 years ago
You realize your computer has been infected with malware. It seems as if someone is controlling your computer from a remote loca
lara [203]

Answer:

Worm malware

Explanation:

The worm operates destructively as it replicates itself and keeps spreading within a computer or network. It takes advantage of software and security vulnerabilities.

Once a computer or network is infected, worms replicate themselves, therefore using up the computer and network resources. Among others, one of the major missions of worms is to create a backdoor into a network, to be able to enable the attacker to carry out a more devastating attack.

Since worms take advantage of weak security in the Operating system, it is very important to constantly update the security features of the Operating system. Users must be careful of the emails they open and attachments they download.

6 0
3 years ago
What type of font color should Kim select if she chooses a dark-colored design theme for her presentation?
enot [183]

white or light colors

5 0
3 years ago
Read 2 more answers
Complete the sentence. <br><br> ____ Is the study and use of very small technology units
kondor19780726 [428]

Answer:

nanotechnology

Explanation:

I just took the test

3 0
3 years ago
FREE POINTS FIRST TO ANSWER GETS BRANLIEST!!! :)
kicyunya [14]

Answer:

THX

Explanation:

4 0
3 years ago
Read 2 more answers
Other questions:
  • What is industry 4.0 -automation revolution-, what is your opinion about the direction this revolution is taking the industry in
    8·1 answer
  • Throughout the course we have covered a lot of topics in relation to information systems. Select one or two of the major topics
    14·1 answer
  • What does the headgear of a mine do
    6·2 answers
  • What is sun and what does it do?
    12·2 answers
  • What is a programming language?
    11·1 answer
  • Write a program that simulates flipping a coin to make decisions. The input is how many decisions are needed, and the output is
    14·1 answer
  • Creating an accurate inventory is a challenge, given the speed at which data files are created, deleted, moved, and changed. It
    12·1 answer
  • I dunno what to write my memo thing about ⁻³⁻
    10·2 answers
  • Write python code that does the following: Ask the user to enter as many as number they want; Then find the sum and the average
    10·1 answer
  • What are the features of a computer speaker​
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!