1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Andrews [41]
4 years ago
7

If the derived class does not override a public member function of the base class, you may specify a call to that public member

function by using the name of the function and the appropriate parameter list. True or False?
Computers and Technology
1 answer:
Jlenok [28]4 years ago
5 0

Answer:

The answer to this question is "True".

Explanation:

The term function overriding is a part of the object-oriented programming language. The overriding refers to override the method which is defined in the base class for override the same method we use the inheritance.

In overriding if a derive class(child class) does not allows us to override a function to there base class (parent class).So, we call this method in main method.

For example:

#include <iostream> //header file.

using namespace std;

class base  //define class base.  

{

public:

void display(string s)  //define method display.

{ //method body.

cout<<"hello.."<<s;  //print value.

}

};

class child:public base  //define class child that inherit base class

{

public:

void display(string s)  //override method display.  

{

cout<<"Hii....!"<<s; //print value.

}

};

int main()  //main method.

{

string s="XXX";

child ob;  //create child class object.

ob.display(s);  //call method.

return 0;

}

Output:

Hii....! XXX

That's why the answer to this question is "True".

You might be interested in
_______ refers to the poitically, religiously, or ideologically motivated use of computers (or related technology) by an individ
Anettt [7]

Answer:

The answer of the following blank is Cyberterrorism .

Explanation:

Cyberterrorism is the violent act by the use of an internet that results in the threat of any important files or the loss of life or the significance of the bodily harms, to achieve an ideological or political gains through the threat or the intimidation.

6 0
3 years ago
Carla needs to list the role for each consultant. Those with four or more years of 26 15 experience take the Lead role. Otherwis
saveliy_v [14]

Answer :

The output is attached below

Explanation:

The following formula needs to be entered into cell N5:

=IF($M5>=4,"Lead","Associate")

4 0
3 years ago
​which type of cryptography provides the most security?
Doss [256]

Answer B: Asymmetric cryptography, because the receiver has its own decryption key and cannot create encrypted messages, because he doesn't have the encryption key.

About the other answers:

A: Private keys are always involved, there has to be some secret to do encryption, so this answer doesn't say very much.

C: Digital signatures can be used to verify/prove some data comes from some person (the signer) in an unaltered way. It is not about encryption, so is not about the security of your message. You use it in combination with encryption.

D: Like A, this doesn't say very much. Shared secret keys (symmetric keys) can be used for encryption, but they are less secure since the keys have to exist in more than one place (sender and receiver).



4 0
3 years ago
Which type of collaborative tool allows people to communicate using the
frosja888 [35]
D because people can communicate using video conferencing
7 0
3 years ago
Lol who look at this so funny
seraphim [82]

Answer:

wow my humor is bad then.

6 0
3 years ago
Other questions:
  • In the u.s.all financial institutions are required to conduct business at a physical location only
    9·1 answer
  • Which network protocol is used to route IP addresses?<br>A. TCP<br>B. UDP<br>C. IP<br>D. ICMP
    15·1 answer
  • Vertebrates first arrived during the _________________.
    9·1 answer
  • By including ______
    15·2 answers
  • What are the text or graphics that are lighter than the main text located in a document's background called?
    10·1 answer
  • What is different between a pc mouse and a real mouse
    12·2 answers
  • Successful implementation of an effective MRP system depends upon (1) the recognition of the difference between independent and
    13·1 answer
  • How are XY coordinates utilized in construct ?
    15·1 answer
  • Of the following choices what was the best thing to do with electronic equipment you no longer want
    7·1 answer
  • 1. (01.03 MC) What is a string in Python
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!