1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Dimas [21]
3 years ago
8

All members within a class are by default

Computers and Technology
1 answer:
miv72 [106K]3 years ago
8 0

Answer:

All the members within a class are by default are private. Private function in a class can access public function within a similar class. Private member formed the implementation of the class and also form the private interface of members within the class.

All the member of class can be access by function inside the class when it is declare as private.

For example:

class test

{     private:

   int a; // when test:a is private

     public:

   test() : a()  // a is accessible in test class  

}

You might be interested in
What's the technique of drawing a 3D object with one vanishing point?​
zepelin [54]
I don’t no it brother n I was searching for this answer can u plz tell me
7 0
3 years ago
Read 2 more answers
1. Implement the function dict_intersect, which takes two dictionaries as parameters d1 and d2, and returns a new dictionary whi
stich3 [128]

Answer:

1  

def dict_intersect(d1,d2): #create dictionary

  d3={} #dictionaries

  for key1,value1 in d1.items():       #iterate through the loop  

      if key1 in d2:   #checking condition

          d3[key1]=(d1[key1],d2[key1])   #add the items into the dictionary  

  return d 3

print(dict_intersect({'a': 'apple', 'b': 'banana'}, {'b': 'bee', 'c': 'cat'})) #display

2

def consolidate(*l1):  #create consolidate

  d3={} # create dictionary

  for k in l1:       #iterate through the loop

      for number in k:   #iterate through  the loop                               d3[number]=d3.get(number,0)+1   #increment the value

             return d 3 #return

print(consolidate([1,2,3], [1,1,1], [2,4], [1])) #display

Explanation:

1

Following are  the description of program

  • Create a dictionary i.e"dict_intersect(d1,d2) "   in this dictionary created a dictionary d3 .
  • After that iterated the loop and check the condition .
  • If the condition is true then add the items into the dictionary and return the dictionary d3 .
  • Finally print them that are specified in the given question .

2

Following are  the description of program

  • Create a dictionary  consolidate inside that created a dictionary "d3" .
  • After that iterated the loop outer as well as inner loop and increment the value of items .
  • Return the d3 dictionary and print the dictionary as specified in the given question .

5 0
4 years ago
In ipv4, datagram fragment might be fragmented again at the next router. re-assembly of these sub-fragments is handled by?
s2008m [1.1K]

In IPv4, the following router could fragment the datagram fragment once more. This sub-fragment reassembling is done by the first router.

<h3>What is ipv4?</h3>
  • The fourth iteration of the Internet Protocol is known as IPv4.
  • The Internet and other packet-switched networks use it as one of its primary core protocols for internetworking.
  • The first production-ready release of IPv4 was made available on the SATNET in 1982 and the ARPANET in January 1983.
  • A protocol for usage on packet-switched Link Layer networks is the Internet Protocol version 4 (IPv4) (e.g. Ethernet).
  • A capacity of roughly 4.3 billion addresses is offered by IPv4.

To learn more about ipv4, refer to:

brainly.com/question/28432421

#SPJ4

5 0
1 year ago
Which of the following statements is true of intrapreneurs
chubhunter [2.5K]

<u>Answer is:</u>

They take risks, but not with their own investments.

<u>Explanation:</u>

Intrapreneurship is the act of behaving like an entrepreneur while working within a large organization. Intrapreneurship is known as the practice of a corporate management style that integrates risk-taking and innovation approaches, as well as the reward and motivational techniques, that are more traditionally thought of as being the province of entrepreneurship.


<u>Example:</u>

One of the most well-known examples of intrapreneurship is the "Skunk Works" group at Lockheed Martin. The group was originally named after a reference in a cartoon, and was first brought together in 1943 to build the P-80 fighter jet. Because the project was to eventually become a part of the war effort, the project was internally protected and secretive. Kelly Johnson, later famous for Kelly's 14 rules of intrapreneurship, was the director of this group.

4 0
4 years ago
open your browser and enter the address of this ftp site in the address box: ftp.cengage. if your browser supports ftp, a logon
Licemer1 [7]

FTP access is available from other companies, but access is constrained unless the user first authenticates by supplying a user name and potentially a password.

The files are frequently intended for specific uses rather than for public release. For instance, you must send a letter house your consumer address list. Both businesses would not want the public to have access to these materials in this situation. Software is a collection of instructions, data, or computer programs that are used to run machines and carry out particular activities. It is the antithesis of hardware, which refers to a computer's external components. A device's running programs, scripts, and applications are collectively referred to as "software" in this context. Software refers to the processes and programs that enable a computer or other electrical device to function.

Learn more about software here-

brainly.com/question/985406

#SPJ4

7 0
1 year ago
Other questions:
  • Design the below using an array// Sunrise Freight charges standard// per-pound shipping prices to the five states they serve// –
    6·1 answer
  • Security measures are sometimes described as a combination of physical, technical, and administrative (PTA) safeguards. Which of
    12·1 answer
  • Which of the following statements is false? A constructor is similar to a method but is called implicitly by the new operator to
    6·1 answer
  • How do you represent the decimal integer 50 in binary?
    14·1 answer
  • Why do i get message notifications but when i click on it it says i have no new messages?
    7·1 answer
  • Yo need help can someone plz help
    7·1 answer
  • (Giving brainliest to best answer, don't make an answer if you don't know or its jumble)
    11·2 answers
  • Most presentations use text:
    5·1 answer
  • Examples of hybrid computer​
    9·2 answers
  • 8. Software ____ are individual programs that can be purchased, installed, and run separately, but extract data from the common
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!