1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
s2008m [1.1K]
3 years ago
8

1. What are the built-in operations on classes?

Computers and Technology
1 answer:
Kobotan [32]3 years ago
6 0

Answer:

Assignment Operator

Member Selection Operator

Explanation:

Assignment Operator is useful to assign some value to the instance variables of classes. We can use this operator directly on the class.

example:

Simple s=new Simple();

s.salary=9000;

Member Selection operator is useful to select a member of the class.

below code explains Member Selection operator

example:

Test s;

Test *pS = new Test();

s.f() ;  //call function using non-pointer object

pS->f();

You might be interested in
_ is the adherence to a personal code of principles.
trapecia [35]

Answer: Ethics

Explanation:

 Ethics is the basic principle for the personal code. The code of the ethics is basically designed for outline the values in the organization with honesty and integrity.

The ethics is basically depend upon the principle of core value of the organization. The code of the ethics basically guide the core value in the organization and breaking the rule of ethics can also cause termination from the organization.

Morality, integrity and honesty are all the sub part of the ethics vale in the organization. Therefore, ethics is the correct option.  

3 0
3 years ago
What action should you take when using removable media in a scif?
inysia [295]

Explanation:

What actions should you take when printing classified material within a Sensitive Compartmented Information Facility (SCIF)? Retrieve classified documents promptly from printers.

7 0
2 years ago
Explain how chord works. To increasing the fault tolerance in chord, each node maintains a successor list (finger table) instead
andrew11 [14]

Answer:

Chord is a set of rules for a peer-to-peer distributed hash table it collects key-value sets by allotting keys to several computers (known as "nodes"); a node will collect the values for all the keys for which that is reliable. Chord defines how keys are allocated to the nodes, and how a node can determine the value for a distributed key by first locating the node liable for such key.

Explanation:

A chord is a peer-to-peer lookup service. It Resolves the difficulty of establishing a data item in a combination of shared nodes, considering various node arrivals and removals The most crucial operation in most peer-to-peer method is the efficient position of data objects.

It is able of supporting only one operation i.e. given a key, it maps the key on a link.

Algorithm:

Algorithm shows working of the chord:

// x is a node used to find successor of id

x.find_successor(id)

if (id (x; successor])

return successor;

else

// query is being delivered around the circle

entrance successor.find_successor(id);

6 0
3 years ago
Answer is LOLOLyour so dumb jk its a i got it right
Aleksandr-060686 [28]
Ah well yes I know I’m dumb
4 0
3 years ago
How is unemployment rate in America ?
bekas [8.4K]

Answer:

today it's past 20% and over 30mil jobs lost, but this is mostly due to the coronavirus and not an average of the united states economy

7 0
3 years ago
Read 2 more answers
Other questions:
  • The value 8/10 in a cell refers to which of these?
    5·2 answers
  • Broker Ray is closely acquainted with the Subdivision Heights neighborhood of his town. Over the year, Ray has made it a practic
    7·1 answer
  • The technology (software) that automatically downloads website information to your computer is called ________.'
    15·1 answer
  • 23. For the 16-bit binary number 1001 0101 1100 0011, show the effect of: a. A right shift of 4 bits with zero fill. b. A right
    13·2 answers
  • Carlos, an algebra teacher, is creating a series of PowerPoint presentations to use during class lectures. After writing, format
    15·1 answer
  • Only business writing requires an editing stage
    8·1 answer
  • In the Stop-and-Wait flow-control protocol, what best describes the sender’s (S) and receiver’s (R) respective window sizes?
    14·1 answer
  • Continuous data
    13·1 answer
  • State the stages step by step in the production of plastic​
    10·1 answer
  • Hello safiya77 this is for you
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!