1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
alekssr [168]
1 year ago
12

When an object of a derived class is instantiated, the __________ constructor initializes the _________ members

Computers and Technology
1 answer:
AnnZ [28]1 year ago
3 0

When an object of a derived class is instantiated, the base class constructor initializes the base class members.

<h3>What is the meaning of basic class?</h3>
  • A base class is a course, in object-oriented programming terminology, from which other classes are derived.
  • It allows the design of other types that can reuse the code implicitly inherited from the base class (except constructors and Destructo
  • A class that is a parent of another class, or from which other classes can be derived, is understood as a base type.
  • Diagram of a class legacy order that has numerous examples of the CollectibleString base class

To learn more about base class , refer to:

brainly.com/question/27791611

#SPJ4

You might be interested in
You are the senior nurse on the unit and you are orienting a new graduate LVN/LPN. One of the subjects you want to cover today i
dem82 [27]

Answer:

The correct answer to the following question will be Option D (Homans sign).

Explanation:

To medicine, the symptom of Homans is considered a sign of thrombosis by some physicians. John Homans described Homans as an annoyance under the knee of the foot to 1941 after forced dorsification.

  • Inspect the limbs for edema, pulse equality, and capillary refill.
  • Check to sign Homans.
  • Feel any warmth or redness along the Calf area.
  • Bilateral calves should be equal in size and warmth.
  • There must be no swollen, sore places, and when the woman is moving, there will be no pain in the calves.

Therefore, Option D is the right answer.

4 0
3 years ago
Help need urgently answer ​
skad [1K]

Answer:

Explanation:

b

6 0
3 years ago
Read 2 more answers
The ideal light to use is?
alekssr [168]

Answer:

i think that the idea light to use is a front light?

it can lighten a dark room depending on the radius of the light or the refletor, im not sure if this is 100% right but i hope this helps you in some way!

×║hope this helps!║×

6 0
3 years ago
5. Many large organizations have had their database system hacked and customer data stolen. How should the security for the data
yawa3891 [41]

Answer:

Security is very crucial for any system. Vulnerability can be exposed on different levels which includes database breach, network level attacks and application level attacks. Different kinds of attacks can be carried out for different components. Attacks carried out on databases are different from other kinds of attacks.  

Attacks on databases can be because of any of the following exposed vulnerability.  

  • Poor system design and weak architecture
  • Incorrect configurations  
  • SQL injection attacks  
  • Weak Authentication
  • Brute Force attacks on user credentials
  • Improper privilege mechanisms  
  • Privilege abuse and excessive access.  
  • Poor design and flaws in programming
  • Data loss and information corruption

Security of database systems should be designed by considering best database security design practices. Network security will ensures that all the networks level attacks are detected and mitigated which includes DDOS attacks, Syn flood attacks, Session Attacks, DOS attacks and web security will focus on detecting and protecting attacks on web applications and on application layer attacks. This includes XSS attacks, XML attacks DOS attacks, DDOS attacks, Slow DDOS attacks, JSON violations, Protocol violations etc. However, Security of database will be different than the rest of security and should be based on following best practices

 

  • Physical and Network Access Security.
  • Access control by managing the database access strictly.
  • Encryption of Data
  • Authentication  
  • Web Application Firewalls  
  • Controlling Database Integrations
  • Manual and Scheduled Backups through secured channels.  
  • Auditing and Logging
  • Reporting and Monitoring

Explanation:

<em>Physical and Network Access Security is essential </em>as the database will be hosted on many physical servers or cloud servers. If the databases are hosted on web or cloud servers and gaining access to such servers will eventually give out root user permissions.

Attackers can have control access of databases as root users if they succeed in getting into physical servers.Use of network firewalls and Intrusion detection and prevention systems will provide security against physical system access.

<em>Access control </em> will allow only specific users to access the database. User Based access control will give restricted or policy based privileges to different users. An user will be allowed to perform only certain actions in such cases which will avoid user-access abuse.  

<em> </em><em>Data encryption</em><em> </em>will make sure that eves dropper will not be able to read any data during transmission or during inter process calls. Authentication mechanisms will help to use strong cryptic authentications for users. Use of great encryption, key exchange and hashing algorithms will harden the security and will make databases robust.  

<em> Web Application firewalls</em> will provide a strong security against SQL injection attacks, database connection flood attacks, other web related attacks which will safeguard the databases at the cloud storage and also will block the attacker by flagging them.  

<em>Best coding practices</em> and vulnerability scanning and assessment will secure all the database integrations. <em>Database integrations</em><em> </em>with other components needs to be carried out with utmost care by making sure to analyse all the impacted areas.  

It is always a good practice to have <em>scheduled and manual backup of databases</em> which will be useful against data corruption because of erroneous user actions. This will ensure that data is safe and can be recovered during toxic situations. This will help to control the damage.  

<em> Auditing of logs</em> to verify all the actions performed on the database by different users is necessary as it will help to analyse any misbehavior or compromised user access. <em>Monitoring and reporting</em> will make sure that only the right user has the right access and also it will alert any attacks on the database system.

8 0
4 years ago
Give three reasons why you think Clip Art is so widely used in many different types of documents.
irinina [24]
Well Here Are Some Advantages To Clip Art,
There Is A Large Variety Of Clip Art To Choose From.
You Don't Need To Buy Any Special Equipment Like A Scanner.
It Takes No Artistic Skills To Produce.
Most Clip Art Is Royalty And Copyright Free.
It Doesn't Have To Be Developed From Scratch.
Hope I Helped
6 0
3 years ago
Read 2 more answers
Other questions:
  • Algorithm for converting decimal into binary.
    7·1 answer
  • An enterprise DBMS is automatically capable of serving as a mobile DBMS. There are no special issues raised by mobility. True Fa
    11·1 answer
  • Can you answer your own question on brainly?
    12·2 answers
  • Which of the following Internet protocols is MOST important in reassembling packets and requesting missing packets to form compl
    11·1 answer
  • A certain string-processing language offers a primitive operation which splits a string into two pieces. Since this operation in
    10·1 answer
  • Assume that the string oldSeq has been properly declared and initialized and contains the string segment. Write a code segment t
    6·1 answer
  • Create an algorithm that will convert dog years to human years using the assumption that 1 dog year = 7 human years. Prompt the
    8·1 answer
  • Who is the owner of apple company??​
    13·2 answers
  • Project: Design and Development Research Project
    14·1 answer
  • A hacker is trying to gain remote access to a company computer by trying brute force password attacks using a few common passwor
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!