1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
HACTEHA [7]
4 years ago
7

There exists a data type Date with member function Increment that increments the current Date object by one. The ++ operator is

being overloaded to postincrement an object of type Date. Select the correct implementation:
1.Date Date::operator++( int ){Date temp = *this;Increment();return *temp;}2.Date Date::operator++( int ){Increment();Date temp = *this;return temp;}3.Date Date::operator++( int ){Date temp = *this;return this;temp.Increment();}4.Date Date::operator++( int ){Date temp = *this;Increment();return temp;}
Computers and Technology
1 answer:
nalin [4]4 years ago
3 0

Answer:

Date Date::operator++( int )

{

Date temp = *this;

Increment();

return temp;

}

Explanation:

Of options 1 through 4, only option 4 correctly implement the post increment of the ++ operator.

Interpreting each line of option for and comparing it to other options

Line 1: Date Date::operator++( int )

This declares the data type and its ++ operator

This is same for all options

Line 2: The Date type needs to be declared

In option 4, it was declared correctly as Date temp = *this;  using a pointer variable *this.

Here, option 2 is removed from the list of possible options.

Comparing other options

Line 3: The member increment option needs to be declared after the declaration of the date type variable.

This is correctly declared as Increment();  in option 4

Here, option 3 is removed from the list of possible options.

Comparing other options

Line 4: The value declared variable temp needs to be returned the way it was declared (without pointer indicator)

Hence, option 4 is best appropriate

You might be interested in
A date consists of a month, day, and year. Consider the class Date of such dates. Suppose that Date represents the month, day, a
Dominik [7]

Answer:

#include <iostream>

#include <cmath>

using namespace std;

class Date

{

public:

Date ();

Date ( int mn, int day, int yr); // constructor

void display(); // function to display date

int GetMonth();

void SetMonth(int mn);

~Date();

private:

int month, day, year;

};

// constructor definition

Date::Date ()

{

month = day = year = 1;

}

Date::Date (int mn, int dy, int yr)

{

static int length[] = { 0, 31, 28, 31, 30, 31, 30, 31, 31, 30, 31, 30, 31 };

month = mn;

day = dy;

year = yr;

}

void Date::display()

{

static string name[] = {"nothing", "January", "February", "March", "April",

"May", "June", "July", "August", "September", "October",

"November", "December" };

cout << '\n' << name[month] << ' ' << day << "," << year << '\n';

}

Date::~Date()

{

cout << "Thank You for using DateLine Services and have a nice date\n";

}

int Date::GetMonth()

{

return month;

}

// Precondition: 1 <= mn <= 12

void Date::SetMonth(int mn)

{

month = mn;

}

int main()

{

Date mydate(1, 2, 1993);

Date date2(4,12,1994);

Date date3;

mydate.display();

date2.display();

date3.display();

}

Explanation:

4 0
3 years ago
The __________ clash of clans and candy crush saga are video games that exploit the real world–digital world convergence by buil
solmaris [256]
The  game play of the clash of clans and candy crush saga are video games that exploit the real world–digital world convergence by building huge personal-rewards psychology for players.<span>The Candy Crush game app exploits some well known weaknesses in the human brain to keep us playing</span>
5 0
3 years ago
How many keys are utilized in symmetric cryptography?A. OneB. TwoC. ThreeD. Four
eimsori [14]

Answer:

A. One

Explanation:

Symmetric key cryptography makes use of one key. The same key is used for both encryption and decryption. This is different from asymmetric cryptography where separate keys are used for the two operations. Some examples of symmetric cryptography include:

  • Advanced Encryption Standard (AES)
  • Data Encryption Standard (DES)
  • Triple Data Encryption Standard (3DES)
  • Blowfish
7 0
3 years ago
Access your Practice Lab titles Access your exercise content Reports and files Access your settings Access help and support Comp
Degger [83]

Answer:

The extension for a shell script in windows ends with a .ps1 and for the extension for linux it is .sh, not quite sure for OSX.

4 0
3 years ago
Virtualization:
dimaraw [331]
The answer: A

If you would like to understand more on this, I have found an excellent quizlet.
Search this up: Using IS for Bus. Problems chp.5 practice quiz
8 0
3 years ago
Other questions:
  • After an extruded feature has been created, you can always go back and edit the feature. When you edit an existing extrude featu
    11·1 answer
  • Write a program to help you feed your friends at a party by doing some math about square pizzas. Assume the grader defines a str
    12·1 answer
  • Constructors ________. initialize instance variables when overloaded, can have identical argument lists when overloaded, are sel
    11·1 answer
  • Web 2.0 has led to a shift just from consuming content towards what
    6·1 answer
  • Which code will allow Joe to print Coding is fun. on the screen? print("Coding is fun.") print(Coding is fun.) print = (Coding i
    10·2 answers
  • Ted knows that macros can be helpful to him in his work with Excel spreadsheets,but he also knows they have their hazards,so he
    15·1 answer
  • Suppose a computer has 1GB of memory. Operating System takes 256 MB of memory. Imagine each task takes up 196 MB of memory and t
    12·1 answer
  • In classical conditioning, _____ means that the CS and US are presented closely together, whereas _____ means that the CS is a g
    6·1 answer
  • Which item is used for formatting in responsive web design?
    14·2 answers
  • For each of the innovations below. Decide if it is a computing innovation or not. Part 3 Continued.
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!