1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sveta_85 [38]
3 years ago
6

)Dynamically allocate an object of Banana, using the pointer variable daco.

Computers and Technology
1 answer:
zepelin [54]3 years ago
5 0

Answer:

d) daco = new Banana;

Explanation:

Dynamically allocated variables have their memory allocated in the heap memory.We declare a dynamical variable like this:-

int *a=new int ;

It means a pointer a is created on the stack memory which hold the address of the block that hold the value of variable a in heap memory.

We already have the pointer daco. We just have to initialize with keyword new.

It will be like daco=new Banana; which matches the option d.

You might be interested in
On the Loan worksheet in cell c9 enter PMT function to calculate the monthly payment for the Altamonte springs 2018 facilities l
Delicious77 [7]

Answer and Explanation:

First of all we should have to know about PMT

PMT

stands for payment .payment that you want to send and receive.It is used in financial calculators and equation. It is a payment that return the periodic payment for a loan.

From the given statement we have to calculate the PMT  for this purpose .

let us consider example where we take loan amount and have some interest and then calculate it.

loan of amount = $6000.00

Interest rate = 4.20%

period per year=15

period = 60

then monthly payment = $ 111.40

Using Excel then we get the monthly payment in cell C9

as calculations has been shown in the excel.

where you can get function who returns a positive value.

6 0
3 years ago
Define cyber law and cyber crime with examples.​
kifflom [539]

Answer:

Cyber crime is unlawful acts where the computer is either a tool or target or both. An example of such would be theft, fraud, forgery, etc. Cyberlaw on the other hand encompasses cybercrime.

4 0
3 years ago
UML is a graphical language that is used for designing and documenting software created within the _____________ framework. (a)
stealth61 [152]

Answer:

The answer is "option d".

Explanation:

UML stands for Unified Modeling Language. It is an OOPs based language that is used to design a graphic by software developers. This language can also be used to build diagrams and provide some tools to ready-to-use, interactive templates for users and other options are not correct that can be described as:

  • In option a, The Top-down approach is not followed by UML.
  • In option b, UML uses an object-oriented programming language that follows a bottom-up approach. It refers to a style of programming.
  • In option c, It does not use structured programming because it uses procedural languages.

7 0
3 years ago
you have an ipv4 network that has two IPv6-only hosts that need to be able to communicate with each other. You want to implement
Soloha48 [4]

Answer:

Teredo tunnelling

Explanation:

The tunnelling method that will fit best in the situation is teredo tunnelling. The reason are embedded in its characteristics, they include;

Teredo tunneling has the following characteristics: Its tunnel endpoints are configured on hosts. The hosts are dual stack hosts and perform tunneling of ipv6 to send on the ipv4 network works through NAT the only solution that allows ipv4-only hosts to communicate with ipv6-only hosts is NAT-PT.

7 0
3 years ago
The mechanism for preventing traffic that is perceived to be dangerous to the network is known as a a0.
nikklg [1K]
I would go with firewall
6 0
3 years ago
Other questions:
  • You can deselect multiple selected sheets beginning with the sheet1 tab by pressing the ____ key and clicking the sheet1 tab.
    15·1 answer
  • Strobe lights can become more yellow as they age true or false
    8·1 answer
  • Suppose that we are using PDDL to describe facts and actions in a certain world called JUNGLE. In the JUNGLE world there are 4 p
    7·1 answer
  • Last bittttt of points
    8·1 answer
  • Consider the following code: x = 9 y = -2 z = 2 print (x + y * z) What is output? 9 13 14 5
    5·1 answer
  • What is a text based language that can be used to build all kinds of things ????
    9·1 answer
  • How do l write a program which countdown from 10 to 3​
    6·1 answer
  • For which tasks would Excel be useful? Check all that apply.
    7·1 answer
  • PLEASE HELP THIS IS CONFUSING ME
    8·2 answers
  • Html specifications that are not included when newer specifications are released or are not included in the xhtml specification
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!