1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Effectus [21]
4 years ago
14

C++ programming true or false questions

Computers and Technology
1 answer:
Lostsunrise [7]4 years ago
7 0

Answer:

a. True

b. False

Explanation:

Constructor is used to initialize the object of the class.

Rules of constructor:

1. Constructor name must same as the class name. it means, if the class name is animalType, then constructor name must be animalType.

2. Constructor does not have any return type. it means, it does not return anythings.

Therefore, part (a) is true,  Constructor name must same as the class name.

and part (b) is false, because constructor does not have any return type.

You might be interested in
Features present in most GUIs include _____.
atroni [7]
Forms, Icons, Menus, Windows
3 0
4 years ago
Read 2 more answers
The term which refers to the attempt to gain unauthorized access to systems and computers used bya telephone company to operate
Alex787 [66]

Answer: Phreaker

Explanation:

Phreaker is defined as the unauthorized attack on  authorized communication system for stealing and manipulation phone networks.

  • Exploring,searching and identifying telecommunication field with help of technologies,equipment,tools etc is done to exploit the system and resources .
  • Other options are incorrect because phone hacking is attacking phone device, [email protected] is also hacking source and hacktivist hacks system to impact social and political field.
  • Thus, the correct option is option(d)
8 0
3 years ago
Please help me with this question. I don’t get it
IRISSAK [1]

Answer:

d

Explanation:

i took the test

3 0
3 years ago
Read 2 more answers
Which topology connects multiple star-topology networks using a bus topology?
Oliga [24]

Answer:

Mesh

Explanation:

Hope it will help

<h2><em>p</em><em>l</em><em>e</em><em>a</em><em>s</em><em>e</em><em> </em><em>m</em><em>a</em><em>r</em><em>k</em><em> </em><em>a</em><em>s</em><em> </em><em>a</em><em> </em><em>b</em><em>r</em><em>a</em><em>i</em><em>n</em><em>l</em><em>i</em><em>s</em><em>t</em><em>s</em></h2>
3 0
3 years ago
In the Northern Hemisphere, large south-facing windows receive more total sunlight during the day and would be a part of a ___ s
9966 [12]

Answer:

Passive solar heating system

Explanation:

The goal of passive solar heating systems usually refers to the system in which the energy provided by the sun is used for heating and cooling of the living places in a house.

When sunlight falls on the house, the building elements capture the heat energy of the sun and it later releases back this heat when the sun is not there. The main objective of this system is to regulate the room temperature. It is comprised of two main elements, one is the glasses that face towards the south and a thermal mass that is used for heat absorption, storing and distribution of heat.

6 0
4 years ago
Other questions:
  • The physical components of a computer are called what?
    8·1 answer
  • C programming: loading a dictionary into a trie data structure. Why am I segfaulting?
    8·1 answer
  • A video streaming website uses 32-bit integers to count the number of times each video is played. in anticipation of some videos
    14·1 answer
  • Create a function named CountVowels() that takes one parameter name epsilon
    10·1 answer
  • Which of the following can help organize your email messages? Select all that apply.
    13·2 answers
  • Write a program that takes two decimal numbers as input and print the largest. If the numbers are equal, print one of them.
    13·1 answer
  • Which technological tool is important for storing critical files?.
    12·1 answer
  • How do you declare variables in c program
    14·1 answer
  • A company has employees who write down passwords, which should be kept private, on sticky notes. Given this scenario, what shoul
    12·1 answer
  • How to find HCF and LCM of a number in Q Basic program?? ​
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!