1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Valentin [98]
4 years ago
12

In the following statement:

Computers and Technology
1 answer:
inna [77]4 years ago
5 0

Answer: A. Car

Explanation:

Here  the base class member is being protected which is Vehicle. The base class is the Vehicle class and the derived class is Car class.

As the derived class is created or derived from another existing class. So here the class Car has been created through the process of inheritance from the base class which is vehicle. All the methods and variables in Vehicle class are in protected so the only the derived class is able to get access to those variables and methods.

class Car : protected Vehicle

The class Vehicle has been defined earlier and the class Car is created.

The left side is for derived and right side is for base class.

You might be interested in
How do i build a supercomputer.?
stira [4]
You will need one head node, at least a dozen identical compute nodes, an Ethernet switch, a power distribution unit, and a rack. Determine the electrical demand, cooling and space required. Also decide on what IP address you want for your private networks, what to name the nodes, what software packages you want installed, and what technology you want to provide the parallel computing capabilities
3 0
3 years ago
Play among us with me
omeli [17]

Answer:

cool

Explanation:oof

8 0
3 years ago
Read 2 more answers
1. Isabella is a security support manager for a large enterprise. In a recent meeting, she was asked which of the standard netwo
arsen [322]

Answer:

A. router

Explanation:

Isabella is a security support manager for a large enterprise. In a recent meeting, she was asked which of the standard networking devices already present on the network could be configured to supplement the specific network security hardware devices that were recently purchased. The standard networking device Isabella would recommend is router.

3 0
3 years ago
This isn't about school but every time it tells me to watch an ad to unlock the answer to a question it prompts a survey and it
Masja [62]
Restart it than see what happens
4 0
3 years ago
Read 2 more answers
To change the size of a field or record by dragging its border a.resize b.magnify c.label d.enlarge
4vir4ik [10]
A. Resize

By dragging the border of a field or record, you are either enlarging it or compressing it. Choices "b" and "d" are only half correct, as there is always the possibility of making it smaller. Hope this helps!
6 0
3 years ago
Read 2 more answers
Other questions:
  • Which of the following are examples of algorithms? (Select all that apply, if any do.)
    15·2 answers
  • Which of the following is a programming language that permits Web site designers to run applications on the user's computer?
    15·1 answer
  • Write a program that asks a user to enter a date in month day year format (for example 10 12 2016) and displays the day of the w
    5·1 answer
  • Given N lines of input, print the 3rd character from each line as a new line of output. It is guaranteed that each of the n line
    8·1 answer
  • Potential Energy and Kinetic Energy both mean "energy in motion" True or False​
    8·2 answers
  • Write an algorithm to show whether a given number is even or odd.
    14·1 answer
  • Why does a crane need to rotate/swivel​
    9·1 answer
  • What types of activities are ideal for a robot to perform?
    6·1 answer
  • When creating an HTML document, what do we use to set aside space for content?
    14·1 answer
  • Which of the following do nylon and Kevlar fibers have in common?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!