Here's the full question;
<em>Assume the following partial declarations have been made, with default (no parameter) constructors for the classes.</em>
<em />
<em>public abstract class Player</em>
<em>public class ComputerPlayer extends Player;</em>
<em>public class SmartComputerPlayer extends ComputerPlayer;</em>
<em />
<em>Consider the following declarations.</em>
<em />
<em>I. ComputerPlayer playerA = new SmartComputerPlayer();</em>
<em>II. Player playerB = new SmartComputerPlayer();</em>
<em>III. Player playerC = new Player();</em>
<em />
<em>Which of these declarations will compile correctly?</em>
A.) I only
B.) II only
C.) III only
D.) I and II
E.) II and III
<u>Answer:</u>
<u>C)</u>
Explanation:
One of the rules of Java programming is that it must have a class which is a blueprint that informs about the behavior that the object of that class support.
If we go by the strict rules of Java programming only the class declaration;
Player playerC = new Player();
would compile correctly.
All other options would result in compiler error.
Explanation:
#include<iostream>
#include<string.h>
using namespace std;
char *removestring(char str[80])
{
int i,j,len;
len = strlen(str);
for( i = 0; i < len; i++)
{
if (str[i] == ' ')
{
for (j = i; j < len; j++)
str[j] = str[j+1];
len--;
}
}
return str;
}
int main ()
{
char str[80];
cout << "Enter a string : ";
cin.getline(str, 80);
strcpy(removestring(str), str);
cout << "Resultant string : " << str;
return 0;
}
In this program the input is obtained as an character array using getline(). Then it is passed to the user-defined function, then each character is analyzed and if space is found, then it is not copied.
C++ does not allow to return character array. So Character pointer is returned and the content is copied to the character array using "strcpy()". This is a built in function to copy pointer to array.
I m pretty sure its A . the size section of the insert table dialog box
Answer:
security
Explanation:
One technical issue that arises from this is security. Many times the information that is being transferred is private or even valuable, therefore grabbing the attention of hackers/thief's that want this information. This makes security highly important, but making sure that the information is completely secure is impossible. The best that can be done is adding certain safety measures to secure the information as much as possible, which in term is a technical challenge.
Answer:
35:7 can be written as 5:1