1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Valentin [98]
3 years ago
12

In the following statement:

Computers and Technology
1 answer:
inna [77]3 years ago
5 0

Answer: A. Car

Explanation:

Here  the base class member is being protected which is Vehicle. The base class is the Vehicle class and the derived class is Car class.

As the derived class is created or derived from another existing class. So here the class Car has been created through the process of inheritance from the base class which is vehicle. All the methods and variables in Vehicle class are in protected so the only the derived class is able to get access to those variables and methods.

class Car : protected Vehicle

The class Vehicle has been defined earlier and the class Car is created.

The left side is for derived and right side is for base class.

You might be interested in
Only one person can receive the same email at the same time true or false
nasty-shy [4]

Answer:

false

Explanation:

5 0
3 years ago
What is the Windows command to see the IP configuration of the PC?
lisov135 [29]
The answer is ipconfig
4 0
3 years ago
Application software developed by the user or at the user’s request is called ____ software.
Zolol [24]
End-User Software. Because it is not professional

4 0
3 years ago
What are the trinity of the computer system
barxatty [35]

Answer:

I think the answers are input, processes, output

6 0
3 years ago
Make a list of any four computer that were used in the history of computer.​
blondinia [14]

Answer:

ENIAC, UNIVAC, EDVAC and IMB 1401 are the list of computers used in history of computer

Explanation:

hope it helps

plz make it brainliest ans

7 0
3 years ago
Other questions:
  • Which type of JPEG image records the most information in the digital file? Medium Low Fine Expert
    6·2 answers
  • 1. To type a capital "C", you would use the ring finger of your left hand.
    15·2 answers
  • Given the function definition below, what is the effect of thecall:
    7·2 answers
  • Which feature enables you to make changes to all the slides of your presentation at the same time?
    15·2 answers
  • High capacity circuits are limited by the least capable network link, which is typically the user connection. As such, it is imp
    11·1 answer
  • _____ provides vital protection and maintenance services for system hardware and software, including enterprise computing system
    12·1 answer
  • CHALLENGE 7.1.1: Initialize a list. ACTIVITY Initialize the list short.names with strings 'Gus', Bob, and 'Ann'. Sample output f
    9·1 answer
  • Pls help I will give points
    7·1 answer
  • In Subtractive empathy, the counselor responses gives back less (or distorts) than what the client has said. slightly add someth
    14·1 answer
  • What is computer viras? Loist 2 preventive measures against it​
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!