1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ZanzabumX [31]
3 years ago
6

Composition means ________. a)that data fields should be declared private b)that a class extends another class c)that a variable

of supertype refers to a subtype object d)that a class contains a data field e)that references another object
Computers and Technology
1 answer:
zlopas [31]3 years ago
3 0

Answer:

The answer is "Option d".

Explanation:

In programming, Composition is a method, which is used to applying multiplicating and additive probability laws to evaluate the probabilities, It is a unique method, that uses math function, it also use to include data field, and other choices are wrong, that can be described as follows:

  • In option a, It uses an access modifier, that's why it is wrong.
  • In option b, This process is called inheritance, that's why it is wrong.
  • In option c, It uses in part of typecasting, that's why it is wrong.
  • In option e, It is incorrect because it refers to another object.

You might be interested in
A transcript must bear a(n)___ to be considered official
harkovskaia [24]
A transcript must have a signature or school stamp. 
7 0
3 years ago
Read 2 more answers
what are the main technologies that have contributed to be growth and commercialization of the Internet
iren [92.7K]

hope it helps have a good day

5 0
2 years ago
Write a program that uses an STL List of integers. a. The program will insert two integers, 5 and 6, at the end of the list. Nex
poizon [28]

Answer:

answer:

#include <iostream>

#include<list>

using namespace std;

bool Greater(int x) { return x>3; } int main() { list<int>l; /*Declare the list of integers*/ l.push_back(5); l.push_back(6); /*Insert 5 and 6 at the end of list*/ l.push_front(1); l.push_front(2); /*Insert 1 and 2 in front of the list*/ list<int>::iterator it = l.begin(); advance(it, 2); l.insert(it, 4); /*Insert 4 at position 3*/ for(list<int>::iterator i = l.begin();i != l.end();i++) cout<< *i << " "; /*Display the list*/ cout<<endl; l.erase(it); /*Delete the element 4 inserted at position 3*/ for(list<int>::iterator i = l.begin();i != l.end();i++) cout<< *i << " "; /*Display the list*/ cout<<endl;

l.remove_if(Greater); for(list<int>::iterator i = l.begin();i != l.end();i++) cout<< *i << " ";

/*Display the list*/

cout<<endl; return 0;

}

5 0
3 years ago
Read 2 more answers
Ximena noticed that Sofia had created a network bridge on her new laptop between the unsecured wireless network and the organiza
ratelena [41]

Answer:

A bridge could permit access to the secure wired network from the unsecured wireless network

Explanation:

A bridge is connecting device in networking that connects two different network devices. This device is suitable to connect a secure network with an unsecured network.

8 0
3 years ago
A security administrator wants to empty the DNS cache after a suspected attack that may have corrupted the DNS server. The serve
sattari [20]

Answer:

IPCONFIG Pls mark brainliest

Explanation:

3 0
2 years ago
Other questions:
  • Jill is setting up a presentation and wants to use a built-in equation, such as the area of a triangle. To insert this in her pr
    14·2 answers
  • When performing actions between your computer and one that is infected with a virus, which of the following offers NO risk of yo
    11·1 answer
  • A picture of kitchen sink draining system​
    15·2 answers
  • Explain three specific &amp; major security threats to internet users. In each case, address whether or not the vulnerabilities
    15·1 answer
  • How does a film establish the setting?
    14·1 answer
  • Which one of these do you need to become president of the US ?
    6·2 answers
  • True or False: The major advantage of Arrays over ArrayLists in Java is the fact that while ArrayLists are fixed in size, an Arr
    15·1 answer
  • If the three operations were combined, O(logN) + O(N) * O(logN) + 1, the overall algorithm cost would be:________
    6·1 answer
  • Write IF() function for student 3, If total mark is greater than 10 then print
    12·1 answer
  • What company was affected by the cloudbleed vulnerability?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!