1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anna [14]
3 years ago
10

. Constructors can / cannot (circle correct choice) be called explicitly as if they were regular member functions.

Computers and Technology
1 answer:
Sunny_sXe [5.5K]3 years ago
3 0

Answer:

Constructor can be called as explicitly, when the compiler create the nameless and temporary object and then it get immediately get destroyed. As constructor is the special type of function which typically creates the instance of class.

The special member function in the constructor can be called as explicitly by the programmer. The main purpose of the constructor is initializing the object of the class while executing the code in the method for performing various task.

You might be interested in
What are examples of people who own the copyrights of their property? Check all that apply.
jolli1 [7]
"Nevaeh thinks of a name for her new company", "Alexis thinks of an idea for a new product" and "Josiah writes a poem" are open to copyright because they can claim that their work is original and cannot be reproduced without their consent. 
3 0
3 years ago
Read 2 more answers
What help the ict in your life?and write own idea three or four sentence
My name is Ann [436]

Answer:

I am a software engineering student

computers have createed an impact in my life because through computers i work, I do research and many more

7 0
2 years ago
Organizations should communicate with system users throughout the development of the security program, letting them know that ch
Fed [463]

Answer:

Yes it is true.The organization should indeed communicate with a system user throughout the development of a security program. A corporation needs a security policy that must be developed by management at all levels, including organization and employees at the operational level. For a corporate security plan, it is essential to reduce the resistance of the expected changes and define the objective.

Explanation:

Three objectives of the security plan in an organization are:

  • Identify the sensitive system and plan
  • Create and define the strategy and control of the system.
  • Develop and implement the training programs.

Security Information is one of the essential factors in the organization.For an organization, the information should be protected.

7 0
3 years ago
To use an automated teller machine (ATM), a customer must enter his or her four-digit Personal Identification Number (PIN). How
schepotkina [342]

Answer:

10000 possible PINs.

Explanation:

Considering the fact that only numbers are permitted (0 - 9) which gives 10 characters and also that the digits can be repeated, the total number of possible PINs that are possible is 10 x 10 x 10 x 10 = 10000

6 0
3 years ago
to save a revised document as the original name and in the original file location, a user should select _____. save as file new
Schach [20]
The answer is just save
5 0
3 years ago
Read 2 more answers
Other questions:
  • Theresa is a certified teacher. She just had a baby and would like to stay home, but still wants to teach. Which career would be
    11·2 answers
  • Nick’s computer has been restarting on its own. what action should he take to solve this issue?
    14·1 answer
  • A process that allows software-based networked computers to run multiple operating systems and programs and share storage is cal
    5·1 answer
  • Which type of network topology is the most common and easiest to use?
    10·1 answer
  • Plz answer me will mark as brainliest picture included ​
    15·1 answer
  • Marla wants to transfer photos from her digital camera to her computer. She has plugged the camera's cord into the USB port. Wha
    11·2 answers
  • Write a program that reads a file called 'test.txt' and prints out the contents on the screen after removing all spaces and newl
    7·1 answer
  • Question # 6
    11·2 answers
  • Explain how AI smartphone software in the rental car can be a threat to privacy.
    14·1 answer
  • How can you have internet without subscribing to cable?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!